2023-01-21 20:28:28 export USER=root 2023-01-21 20:28:28 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client osu_client.c: In function ‘cmd_osu_select’: osu_client.c:2090:44: warning: ‘%s’ directive output may be truncated writing up to 985 bytes into a region of size 4 [-Wformat-truncation=] 2090 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 14); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~ osu_client.c:2090:4: note: ‘snprintf’ output between 1 and 986 bytes into a destination of size 4 2090 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 14); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2103:44: warning: ‘%s’ directive output may be truncated writing up to 994 bytes into a region of size 4 [-Wformat-truncation=] 2103 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 5); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~ osu_client.c:2103:4: note: ‘snprintf’ output between 1 and 995 bytes into a destination of size 4 2103 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 5); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2077:10: warning: ‘%s’ directive output may be truncated writing up to 990 bytes into a region of size 256 [-Wformat-truncation=] 2077 | "%s", buf + 9); | ^~ In file included from ../../src/utils/common.h:12, from osu_client.c:16: ../../src/utils/os.h:552:21: note: ‘snprintf’ output between 1 and 991 bytes into a destination of size 256 552 | #define os_snprintf snprintf osu_client.c:2076:4: note: in expansion of macro ‘os_snprintf’ 2076 | os_snprintf(last->osu_nai2, sizeof(last->osu_nai2), | ^~~~~~~~~~~ osu_client.c:2071:10: warning: ‘%s’ directive output may be truncated writing up to 991 bytes into a region of size 256 [-Wformat-truncation=] 2071 | "%s", buf + 8); | ^~ In file included from ../../src/utils/common.h:12, from osu_client.c:16: ../../src/utils/os.h:552:21: note: ‘snprintf’ output between 1 and 992 bytes into a destination of size 256 552 | #define os_snprintf snprintf osu_client.c:2070:4: note: in expansion of macro ‘os_snprintf’ 2070 | os_snprintf(last->osu_nai, sizeof(last->osu_nai), | ^~~~~~~~~~~ osu_client.c:2065:7: warning: ‘%s’ directive output may be truncated writing up to 989 bytes into a region of size 33 [-Wformat-truncation=] 2064 | snprintf(last->osu_ssid2, sizeof(last->osu_ssid2), | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2065 | "%s", buf + 10); | ~^~~~~~~~~~~~~~ osu_client.c:2064:4: note: ‘snprintf’ output between 1 and 990 bytes into a destination of size 33 2064 | snprintf(last->osu_ssid2, sizeof(last->osu_ssid2), | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2065 | "%s", buf + 10); | ~~~~~~~~~~~~~~~ osu_client.c:2059:7: warning: ‘%s’ directive output may be truncated writing up to 990 bytes into a region of size 33 [-Wformat-truncation=] 2058 | snprintf(last->osu_ssid, sizeof(last->osu_ssid), | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2059 | "%s", buf + 9); | ~^~~~~~~~~~~~~ osu_client.c:2058:4: note: ‘snprintf’ output between 1 and 991 bytes into a destination of size 33 2058 | snprintf(last->osu_ssid, sizeof(last->osu_ssid), | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2059 | "%s", buf + 9); | ~~~~~~~~~~~~~~ osu_client.c:2048:44: warning: ‘%s’ directive output may be truncated writing up to 995 bytes into a region of size 256 [-Wformat-truncation=] 2048 | snprintf(last->url, sizeof(last->url), "%s", buf + 4); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~ osu_client.c:2048:4: note: ‘snprintf’ output between 1 and 996 bytes into a destination of size 256 2048 | snprintf(last->url, sizeof(last->url), "%s", buf + 4); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2040:48: warning: ‘%s’ directive output may be truncated writing up to 986 bytes into a region of size 20 [-Wformat-truncation=] 2040 | snprintf(last->bssid, sizeof(last->bssid), "%s", | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~ 2041 | buf + 13); | ~~~~~~~~~ osu_client.c:2040:4: note: ‘snprintf’ output between 1 and 987 bytes into a destination of size 20 2040 | snprintf(last->bssid, sizeof(last->bssid), "%s", | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2041 | buf + 13); | ~~~~~~~~~ Building hostapd Building wpa_supplicant 2023-01-21 20:29:22 ./start.sh 2023-01-21 20:29:23 ./run-tests.py ap_acs_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_acs_errors 1/1 Test: Automatic channel selection failures Starting AP wlan3 Removing BSS wlan3 Starting AP wlan3 PASS ap_acs_errors 1.480714 2023-01-21 20:29:27.021831 passed all 1 test case(s) 2023-01-21 20:29:27 ./run-tests.py ap_eapol_version DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_eapol_version 1/1 Test: hostapd eapol_version configuration Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_eapol_version 2.049542 2023-01-21 20:29:29.660693 passed all 1 test case(s) 2023-01-21 20:29:29 ./run-tests.py ap_element_parse DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_element_parse 1/1 Test: Information element parsing - extra coverage Starting AP wlan3 PASS ap_element_parse 0.591448 2023-01-21 20:29:30.804533 passed all 1 test case(s) 2023-01-21 20:29:30 ./run-tests.py ap_ft_eap_cui DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_eap_cui 1/1 Test: WPA2-EAP-FT AP with CUI Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP Roaming association rejected Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 1519, in test_ap_ft_eap_cui generic_ap_ft_eap(dev, apdev, vlan=False, cui=True) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 1485, in generic_ap_ft_eap run_roams(dev[0], apdev, hapd, hapd1, ssid, passphrase, eap=True, File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 273, in run_roams dev.roam(ap1['bssid']) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1238, in roam raise Exception("Roaming association rejected") Exception: Roaming association rejected FAIL ap_ft_eap_cui 2.405507 2023-01-21 20:29:33.761610 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_ft_eap_cui 2023-01-21 20:29:33 ./run-tests.py ap_ft_many DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_many 1/1 Test: WPA2-PSK-FT AP multiple times Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP Roaming association rejected Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 437, in test_ap_ft_many run_roams(dev[0], apdev, hapd0, hapd1, ssid, passphrase, roams=50) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 273, in run_roams dev.roam(ap1['bssid']) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1238, in roam raise Exception("Roaming association rejected") Exception: Roaming association rejected FAIL ap_ft_many 2.175959 2023-01-21 20:29:36.492127 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_ft_many 2023-01-21 20:29:36 ./run-tests.py ap_ft_over_ds_unexpected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_over_ds_unexpected 1/1 Test: WPA2-PSK-FT AP over DS and unexpected response Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Foreign STA address No over-the-DS in progress Non-zero status code Foreign Target AP No IEs Invalid IEs (trigger parsing failure) Too short MDIE Mobility domain mismatch No FTIE FTIE SNonce mismatch No R0KH-ID subelem in FTIE No R0KH-ID subelem mismatch in FTIE No R1KH-ID subelem in FTIE No RSNE PASS ap_ft_over_ds_unexpected 1.591431 2023-01-21 20:29:38.637040 passed all 1 test case(s) 2023-01-21 20:29:38 ./run-tests.py ap_ft_pmf_bip_cmac_128 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_pmf_bip_cmac_128 1/1 Test: WPA2-PSK-FT AP with PMF/BIP-CMAC-128 Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP Roaming association rejected Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 549, in test_ap_ft_pmf_bip_cmac_128 run_ap_ft_pmf_bip(dev, apdev, "AES-128-CMAC") File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 579, in run_ap_ft_pmf_bip run_roams(dev[0], apdev, hapd0, hapd1, ssid, passphrase, File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 273, in run_roams dev.roam(ap1['bssid']) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1238, in roam raise Exception("Roaming association rejected") Exception: Roaming association rejected FAIL ap_ft_pmf_bip_cmac_128 2.297023 2023-01-21 20:29:41.487444 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_ft_pmf_bip_cmac_128 2023-01-21 20:29:41 ./run-tests.py ap_ft_vlan_over_ds DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_vlan_over_ds 1/1 Test: WPA2-PSK-FT AP over DS with VLAN Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_vlan_over_ds 3.913007 2023-01-21 20:29:45.956762 passed all 1 test case(s) 2023-01-21 20:29:46 ./run-tests.py ap_hs20_disallow_aps DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_disallow_aps 1/1 Test: Hotspot 2.0 connection and disallow_aps Starting AP wlan3 Verify disallow_aps bssid Verify disallow_aps ssid Verify disallow_aps clear PASS ap_hs20_disallow_aps 4.511958 2023-01-21 20:29:51.022872 passed all 1 test case(s) 2023-01-21 20:29:51 ./run-tests.py ap_hs20_username_unknown DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_username_unknown 1/1 Test: Hotspot 2.0 connection in username/password credential (no domain in cred) Starting AP wlan3 PASS ap_hs20_username_unknown 1.149453 2023-01-21 20:29:52.726187 passed all 1 test case(s) 2023-01-21 20:29:52 ./run-tests.py ap_hs20_username_unknown2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_username_unknown2 1/1 Test: Hotspot 2.0 connection in username/password credential (no domain advertized) Starting AP wlan3 PASS ap_hs20_username_unknown2 1.134705 2023-01-21 20:29:54.420394 passed all 1 test case(s) 2023-01-21 20:29:54 ./run-tests.py ap_ht_op_class_124 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht_op_class_124 1/1 Test: HT20 on operationg class 124 Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht_op_class_124 2.717779 2023-01-21 20:29:57.693918 passed all 1 test case(s) 2023-01-21 20:29:57 ./run-tests.py ap_open_disconnect_in_ps DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_disconnect_in_ps 1/1 Test: Disconnect with the client in PS to regression-test a kernel bug Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_disconnect_in_ps 1.872637 2023-01-21 20:30:00.122258 passed all 1 test case(s) 2023-01-21 20:30:00 ./run-tests.py ap_open_sta_statistics DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_sta_statistics 1/1 Test: AP with open mode and STA statistics Starting AP wlan3 Connect STA wlan0 to AP stats1: {'addr': '02:00:00:00:00:00', 'flags': '[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][HT]', 'aid': '1', 'capability': '0x421', 'listen_interval': '5', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'timeout_next': 'NULLFUNC POLL', 'rx_packets': '2', 'tx_packets': '2', 'rx_bytes': '123', 'tx_bytes': '169', 'inactive_msec': '3', 'signal': '-30', 'rx_rate_info': '0', 'tx_rate_info': '10', 'ht_mcs_bitmask': 'ffff0000000000000000', 'connected_time': '0', 'supp_op_classes': '5151525354737475767778797a7b7c7d7e7f808182', 'ht_caps_info': '0x107e', 'ext_capab': '04004a8201404040000120'} stats2: {'addr': '02:00:00:00:00:00', 'flags': '[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][HT]', 'aid': '1', 'capability': '0x421', 'listen_interval': '5', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'timeout_next': 'NULLFUNC POLL', 'rx_packets': '5', 'tx_packets': '3', 'rx_bytes': '266', 'tx_bytes': '202', 'inactive_msec': '134', 'signal': '-30', 'rx_rate_info': '130 mcs 8', 'tx_rate_info': '10', 'ht_mcs_bitmask': 'ffff0000000000000000', 'connected_time': '0', 'supp_op_classes': '5151525354737475767778797a7b7c7d7e7f808182', 'ht_caps_info': '0x107e', 'ext_capab': '04004a8201404040000120'} stats3: {'addr': '02:00:00:00:00:00', 'flags': '[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][HT]', 'aid': '1', 'capability': '0x421', 'listen_interval': '5', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'timeout_next': 'NULLFUNC POLL', 'rx_packets': '9', 'tx_packets': '5', 'rx_bytes': '3339', 'tx_bytes': '1755', 'inactive_msec': '6', 'signal': '-30', 'rx_rate_info': '130 mcs 8', 'tx_rate_info': '110', 'ht_mcs_bitmask': 'ffff0000000000000000', 'connected_time': '0', 'supp_op_classes': '5151525354737475767778797a7b7c7d7e7f808182', 'ht_caps_info': '0x107e', 'ext_capab': '04004a8201404040000120'} PASS ap_open_sta_statistics 1.164068 2023-01-21 20:30:01.840253 passed all 1 test case(s) 2023-01-21 20:30:01 ./run-tests.py ap_pmf_inject_data DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_inject_data 1/1 Test: WPA2-PSK AP with PMF and Data frame injection Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_inject_data 1.424289 2023-01-21 20:30:03.834140 passed all 1 test case(s) 2023-01-21 20:30:03 ./run-tests.py ap_qosmap_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_qosmap_invalid 1/1 Test: QoS mapping ctrl_iface error handling Starting AP wlan3 Connect STA wlan0 to AP PASS ap_qosmap_invalid 0.979165 2023-01-21 20:30:05.382543 passed all 1 test case(s) 2023-01-21 20:30:05 ./run-tests.py ap_remove_during_acs DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_remove_during_acs 1/1 Test: Remove interface during ACS Starting AP wlan3 Removing BSS wlan3 Starting AP wlan3 Removing BSS wlan3 PASS ap_remove_during_acs 7.088376 2023-01-21 20:30:13.037512 passed all 1 test case(s) 2023-01-21 20:30:13 ./run-tests.py ap_remove_during_ht_coex_scan3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_remove_during_ht_coex_scan3 1/1 Test: Remove second BSS during HT co-ex scan in multi-BSS configuration Starting AP wlan3 Removing BSS wlan3-2 PASS ap_remove_during_ht_coex_scan3 0.315667 2023-01-21 20:30:13.921111 passed all 1 test case(s) 2023-01-21 20:30:13 ./run-tests.py ap_track_sta_no_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_track_sta_no_auth 1/1 Test: Dualband AP rejecting authentication from dualband STA on 2.4 GHz Starting AP wlan3 Starting AP wlan4 Connect STA wlan1 to AP Connect STA wlan0 to AP Country code at the end: 00 PASS ap_track_sta_no_auth 2.311113 2023-01-21 20:30:16.802696 passed all 1 test case(s) 2023-01-21 20:30:16 ./run-tests.py ap_tx_queue_params_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_tx_queue_params_invalid 1/1 Test: Invalid TX queue params set (cwmin/cwmax) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_tx_queue_params_invalid 1.069206 2023-01-21 20:30:18.439182 passed all 1 test case(s) 2023-01-21 20:30:18 ./run-tests.py ap_wpa2_gtk_initial_rsc_ccmp_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_gtk_initial_rsc_ccmp_256 1/1 Test: Initial group cipher RSC (CCMP-256) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_gtk_initial_rsc_ccmp_256 11.168952 2023-01-21 20:30:30.178928 passed all 1 test case(s) 2023-01-21 20:30:30 ./run-tests.py ap_wpa2_psk_ap_control_port DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ap_control_port 1/1 Test: WPA2-PSK AP with nl80211 control port in AP mode Starting AP wlan3 AP driver flags: ['SME', 'AP', 'SET_KEYS_AFTER_ASSOC_DONE', 'HT_2040_COEX', 'P2P_CONCURRENT', 'P2P_CAPABLE', 'AP_TEARDOWN_SUPPORT', 'P2P_MGMT_AND_NON_P2P', 'VALID_ERROR_CODES', 'OFFCHANNEL_TX', 'EAPOL_TX_STATUS', 'DEAUTH_TX_STATUS', 'TDLS_SUPPORT', 'TDLS_EXTERNAL_SETUP', 'AP_UAPSD', 'AP_MLME', 'SAE', 'IBSS', 'RADAR', 'QOS_MAPPING', 'AP_CSA', 'MESH', 'HT_IBSS', 'VHT_IBSS', 'FULL_AP_CLIENT_STATE', 'SUPPORT_FILS', 'BEACON_RATE_LEGACY', 'CONTROL_PORT', 'SAFE_PTK0_REKEYS', 'BEACON_PROTECTION', 'EXTENDED_KEY_ID'] AP driver flags2: ['CONTROL_PORT_RX', 'CONTROL_PORT_TX_STATUS', 'UNKNOWN'] STA driver flags: ['SME', 'AP', 'SET_KEYS_AFTER_ASSOC_DONE', 'HT_2040_COEX', 'P2P_CONCURRENT', 'P2P_CAPABLE', 'AP_TEARDOWN_SUPPORT', 'P2P_MGMT_AND_NON_P2P', 'VALID_ERROR_CODES', 'OFFCHANNEL_TX', 'EAPOL_TX_STATUS', 'DEAUTH_TX_STATUS', 'TDLS_SUPPORT', 'TDLS_EXTERNAL_SETUP', 'AP_UAPSD', 'AP_MLME', 'SAE', 'IBSS', 'RADAR', 'QOS_MAPPING', 'AP_CSA', 'MESH', 'HT_IBSS', 'VHT_IBSS', 'FULL_AP_CLIENT_STATE', 'SUPPORT_FILS', 'BEACON_RATE_LEGACY', 'CONTROL_PORT', 'SAFE_PTK0_REKEYS', 'BEACON_PROTECTION', 'EXTENDED_KEY_ID'] STA driver flags2: ['CONTROL_PORT_RX', 'CONTROL_PORT_TX_STATUS', 'UNKNOWN'] Connect STA wlan0 to AP PASS ap_wpa2_psk_ap_control_port 1.087928 2023-01-21 20:30:31.838188 passed all 1 test case(s) 2023-01-21 20:30:31 ./run-tests.py ap_wpa2_psk_file_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_file_errors 1/1 Test: WPA2-PSK AP with various PSK file error and success cases Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_wpa2_psk_file_errors 2.707375 2023-01-21 20:30:35.116025 passed all 1 test case(s) 2023-01-21 20:30:35 ./run-tests.py ap_wpa2_psk_rsne_mismatch_ap2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_rsne_mismatch_ap2 1/1 Test: RSNE mismatch in EAPOL-Key msg 3/4 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_rsne_mismatch_ap2 0.934705 2023-01-21 20:30:36.619967 passed all 1 test case(s) 2023-01-21 20:30:36 ./run-tests.py ap_wpa2_tdls_double_tpk_m2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_tdls_double_tpk_m2 1/1 Test: Double TPK M2 during TDLS setup initiation Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Setup TDLS PASS ap_wpa2_tdls_double_tpk_m2 3.237264 2023-01-21 20:30:40.431481 passed all 1 test case(s) 2023-01-21 20:30:40 ./run-tests.py ap_wps_er_config_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_config_ap 1/1 Test: WPS ER configuring AP over UPnP Starting AP wlan3 Connect ER to the AP Connect STA wlan0 to AP WPS configuration step Connect STA wlan0 to AP WPS ER restart PASS ap_wps_er_config_ap 1.552758 2023-01-21 20:30:42.556517 passed all 1 test case(s) 2023-01-21 20:30:42 ./run-tests.py ap_wps_er_http_client_timeout DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_client_timeout 1/1 Test: WPS ER and HTTP client timeout HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 PASS ap_wps_er_http_client_timeout 33.182127 2023-01-21 20:31:16.305877 passed all 1 test case(s) 2023-01-21 20:31:16 ./run-tests.py ap_wps_http_timeout DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_http_timeout 1/1 Test: WPS AP/ER and HTTP timeout Starting AP wlan3 PASS ap_wps_http_timeout 31.566653 2023-01-21 20:31:48.427110 passed all 1 test case(s) 2023-01-21 20:31:48 ./run-tests.py ap_wps_m2_dev_passwd_id_change_pbc_to_pin DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_m2_dev_passwd_id_change_pbc_to_pin 1/1 Test: WPS and M2 with different Device Password ID (PBC to PIN) Starting AP wlan3 PASS ap_wps_m2_dev_passwd_id_change_pbc_to_pin 1.146139 2023-01-21 20:31:50.127478 passed all 1 test case(s) 2023-01-21 20:31:50 ./run-tests.py ap_wps_m2_dev_passwd_id_p2p DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_m2_dev_passwd_id_p2p 1/1 Test: WPS and M2 with different Device Password ID (P2P) Starting AP wlan3 PASS ap_wps_m2_dev_passwd_id_p2p 1.084037 2023-01-21 20:31:51.771656 passed all 1 test case(s) 2023-01-21 20:31:51 ./run-tests.py ap_wps_random_uuid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_random_uuid 1/1 Test: WPS and random UUID on Enrollee Starting AP wlan3 Seen UUIDs: ['47771db1-e906-49f5-95fc-cf5e9c9f634f', 'fbeb8380-9d68-4443-8005-808b383fdffb', 'c2391165-da52-4b65-8d93-cbf5345ab674'] PASS ap_wps_random_uuid 1.433161 2023-01-21 20:31:53.758966 passed all 1 test case(s) 2023-01-21 20:31:53 ./run-tests.py ap_wps_while_connected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_while_connected 1/1 Test: WPS PBC provisioning while connected to another AP Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP WPS provisioning step PASS ap_wps_while_connected 2.258095 2023-01-21 20:31:56.587941 passed all 1 test case(s) 2023-01-21 20:31:56 ./run-tests.py ap_wps_wsc_done_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_wsc_done_oom 1/1 Test: WPS and OOM for WSC_Done on STA Starting AP wlan3 PASS ap_wps_wsc_done_oom 1.134682 2023-01-21 20:31:58.279539 passed all 1 test case(s) 2023-01-21 20:31:58 ./run-tests.py autogo_start_during_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_start_during_scan 1/1 Test: P2P autonomous GO started during ongoing manual scan Start autonomous GO wlan0 Try to connect the client to the GO wlan1: Trying to discover peer 02:00:00:00:00:00 Client connected PASS autogo_start_during_scan 2.12039 2023-01-21 20:32:00.954567 passed all 1 test case(s) 2023-01-21 20:32:01 ./run-tests.py concurrent_invitation_channel_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START concurrent_invitation_channel_mismatch 1/1 Test: P2P persistent group invitation and channel mismatch Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group Connect to an infrastructure AP Starting AP wlan3 Connect STA wlan0 to AP wlan1: Trying to discover peer 02:00:00:00:00:00 PASS concurrent_invitation_channel_mismatch 3.460728 2023-01-21 20:32:04.971295 passed all 1 test case(s) 2023-01-21 20:32:05 ./run-tests.py dbus_p2p_discovery DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_p2p_discovery 1/1 Test: D-Bus P2P discovery wlan2: Trying to discover peer 02:00:00:00:00:00 PASS dbus_p2p_discovery 0.730954 2023-01-21 20:32:06.254183 passed all 1 test case(s) 2023-01-21 20:32:06 ./run-tests.py dfs_radar_no_ht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dfs_radar_no_ht 1/1 Test: DFS chanlist when radar is detected and no HT configured Starting AP wlan3 on DFS channel Starting AP wlan3 Trigger a simulated radar event Connect STA wlan0 to AP Country code at the end: 00 PASS dfs_radar_no_ht 5.24194 2023-01-21 20:32:12.050467 passed all 1 test case(s) 2023-01-21 20:32:12 ./run-tests.py dpp_config_jws_error_prot_hdr_no_typ DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jws_error_prot_hdr_no_typ 1/1 Test: DPP Config Object JWS error - protected header - no typ dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jws_error_prot_hdr_no_typ 0.162499 2023-01-21 20:32:12.766023 passed all 1 test case(s) 2023-01-21 20:32:12 ./run-tests.py dpp_configurator_enrollee_brainpoolP256r1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_configurator_enrollee_brainpoolP256r1 1/1 Test: DPP Configurator enrolling (brainpoolP256r1) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_configurator_enrollee_brainpoolP256r1 0.174967 2023-01-21 20:32:13.498287 passed all 1 test case(s) 2023-01-21 20:32:13 ./run-tests.py dpp_duplicated_auth_conf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_duplicated_auth_conf 1/1 Test: DPP and duplicated Authentication Confirmation PASS dpp_duplicated_auth_conf 0.166124 2023-01-21 20:32:14.219947 passed all 1 test case(s) 2023-01-21 20:32:14 ./run-tests.py dpp_pfs_connect_cmd_ap_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pfs_connect_cmd_ap_2 1/1 Test: DPP PFS and cfg80211 connect command (PFS not allowed by AP) Starting AP wlan3 Connect STA wlan5 to AP Connect STA wlan5 to AP Connect STA wlan5 to AP PASS dpp_pfs_connect_cmd_ap_2 2.250438 2023-01-21 20:32:17.026571 passed all 1 test case(s) 2023-01-21 20:32:17 ./run-tests.py dpp_pkex_code_mismatch_limit DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_code_mismatch_limit 1/1 Test: DPP and PKEX with mismatching code limit PASS dpp_pkex_code_mismatch_limit 0.177893 2023-01-21 20:32:17.760099 passed all 1 test case(s) 2023-01-21 20:32:17 ./run-tests.py dpp_pkex_hostapd_responder DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_hostapd_responder 1/1 Test: DPP PKEX with hostapd as responder Starting AP wlan3 PASS dpp_pkex_hostapd_responder 0.627775 2023-01-21 20:32:18.945160 passed all 1 test case(s) 2023-01-21 20:32:18 ./run-tests.py dpp_proto_conf_resp_no_config_obj DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_conf_resp_no_config_obj 1/1 Test: DPP protocol testing - no Config Object in Conf Resp PASS dpp_proto_conf_resp_no_config_obj 0.163546 2023-01-21 20:32:19.663340 passed all 1 test case(s) 2023-01-21 20:32:19 ./run-tests.py dpp_qr_code_config_event_initiator_set_comeback DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_config_event_initiator_set_comeback 1/1 Test: DPP QR Code and config event on Configurator Initiator (set comeback) PASS dpp_qr_code_config_event_initiator_set_comeback 0.302992 2023-01-21 20:32:20.524545 passed all 1 test case(s) 2023-01-21 20:32:20 ./run-tests.py eap_proto_gpsk_server DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_gpsk_server 1/1 Test: EAP-GPSK protocol testing for the server Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_gpsk_server 7.862013 2023-01-21 20:32:28.941460 passed all 1 test case(s) 2023-01-21 20:32:28 ./run-tests.py eap_proto_mschapv2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_mschapv2 1/1 Test: EAP-MSCHAPv2 protocol tests Starting AP wlan3 RUN: 0 Connect STA wlan0 to AP mschapv2_handler - RX 02e000090175736572 Test: Missing payload RUN: 1 Connect STA wlan0 to AP mschapv2_handler - RX 02fe00090175736572 Test: Unknown MSCHAPv2 op_code RUN: 2 Connect STA wlan0 to AP mschapv2_handler - RX 024b00090175736572 Test: Invalid ms_len and unknown MSCHAPv2 op_code RUN: 3 Connect STA wlan0 to AP mschapv2_handler - RX 02f500090175736572 Test: Success before challenge RUN: 4 Connect STA wlan0 to AP mschapv2_handler - RX 024e00090175736572 Test: Failure before challenge - required challenge field not present mschapv2_handler - RX 020600061a04 Test: Failure RUN: 5 Connect STA wlan0 to AP mschapv2_handler - RX 020700090175736572 Test: Failure before challenge - invalid failure challenge len mschapv2_handler - RX 020800061a04 Test: Failure RUN: 6 Connect STA wlan0 to AP mschapv2_handler - RX 027900090175736572 Test: Failure before challenge - invalid failure challenge len mschapv2_handler - RX 020a00061a04 Test: Failure RUN: 7 Connect STA wlan0 to AP mschapv2_handler - RX 02ac00090175736572 Test: Failure before challenge - invalid failure challenge mschapv2_handler - RX 020c00061a04 Test: Failure RUN: 8 Connect STA wlan0 to AP mschapv2_handler - RX 028500090175736572 Test: Failure before challenge - password expired mschapv2_handler - RX 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 Test: Success after password change RUN: 9 Connect STA wlan0 to AP mschapv2_handler - RX 022d00090175736572 Test: Invalid challenge length RUN: 10 Connect STA wlan0 to AP mschapv2_handler - RX 023d00090175736572 Test: Too short challenge packet RUN: 11 Connect STA wlan0 to AP mschapv2_handler - RX 023900090175736572 Test: Challenge mschapv2_handler - RX 0212003f1a0200003a31cf4865b89da3554006fb2033f23bead8000000000000000021812b6e8f184d4bf795cc6b21e634a273b651d25fcd2c430075736572 Test: Failure - password expired mschapv2_handler - RX 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 Test: Success after password change enc_hash: 4c29b5fd3d2c18f8944b0f2e3477e43c peer_challenge: 270033b99083fd28471b8da14b26d44c nt_response: 311065b453f360651b9dcaa548cf04bfdbc56789aed8a58c flags: 0000 auth_challenge: 00112233445566778899aabbccddeeff Success message payload: S=4CE69D3666142DAFF06AABBB4F8EACE1784BD2A2 mschapv2_handler - RX 021400061a03 Test: EAP-Success RUN: 12 Connect STA wlan0 to AP mschapv2_handler - RX 025f00090175736572 Test: Failure - password expired mschapv2_handler - RX 0216024f1a0701024afde3ff24a63cf019824339cb8b4f68ab7bb13f15fbbe5182debffd8db85549722905136d2eeb693ed8cf17af588d2a71678a6e54bdfc3f4bc608b2324e5fb02cf2d904dd3a15ca086f85523597bf0499c555d5e1a4ed91dad709f53ddc496a11bb192d73188d4c2cde62ae87787445a0e2917efe9baa8e1b07e66d1fce74110db900e9b83380d0c658b5d001b8f9c74e9da57545e3c44f8228630d1d620019fefb8df5f37587cbdaf3dd2e1d3605570870a9dee50aefb2d0c449d932b19cec9a01a57f7966eeee9c5f80bb347836eecd9698a8177053a677f5820f671b495e86249962c93dccd8b88c050019737a33e5d265728c6267bc99370536b17c037c364fcf0b68cc9634d2ed4efb88d542ac21fcda056e8c6ac6e7d870c6e6dc59d768c8f29dd5ad385350e4657bae9c26231d4959c37e0b42e76dfdd5696c6320b742c0f51faa10c92a18d0a00933ad86ee9652f9140b4452cfac3038a930709c7f67115c40e061e759c4d4239b2be4aab93e7e19ce35156052a0ca18aa14c5ff2d00e87fb7ec65b37d79ccb1bb24f1f75fc02ce757def696bfe49c0c8692a75da42119b76a3d8a47155b3604c7aa1bb6c486bda12169d2cd1c305463bd0de4339e6ec1688b9cdadc502b45249f261e4a88aa103196f97a3041b1a7ca69370fcbc1e06ab4e04f8c266ab996d7b3bbaa6405a6a13024c0ddf325a4c91276d2aa57747a031fc5044c29b5fd3d2c18f8944b0f2e3477e43c06c247dc7302f9604e1a26c1a80986b20000000000000000899063527905c248cbb7ca4db5cd67a28e94d1d8200f3a3e0000 Test: Success after password change enc_hash: 4c29b5fd3d2c18f8944b0f2e3477e43c peer_challenge: 06c247dc7302f9604e1a26c1a80986b2 nt_response: 899063527905c248cbb7ca4db5cd67a28e94d1d8200f3a3e flags: 0000 auth_challenge: 00112233445566778899aabbccddeeff Success message payload: S=B7D6D4FC220BE8590204234D19F2BBE9992CF328 mschapv2_handler - RX 021700061a03 Test: EAP-Success RUN: 13 Connect STA wlan0 to AP mschapv2_handler - RX 02c900090175736572 Test: Challenge mschapv2_handler - RX 0219003f1a0200003a317df94caba81739ac9dcad5ddd99a63870000000000000000ee43d16e9ba388545d0c0a87f6eaec66db0cbcac67d6b6420075736572 Test: Failure - authentication failure RUN: 14 Connect STA wlan0 to AP mschapv2_handler - RX 025100090175736572 Test: Challenge mschapv2_handler - RX 021b003f1a0200003a31992157781283719ed67d4fbe04fa3b9d0000000000000000f095fa5bd0568fcee9a144cc34367abada02d60939eae2ab0075736572 Test: Failure - authentication failure mschapv2_handler - RX 021c00061a04 Test: Failure RUN: 15 Connect STA wlan0 to AP mschapv2_handler - RX 024900090175736572 Test: Challenge - invalid ms_len and workaround disabled PASS eap_proto_mschapv2 6.034359 2023-01-21 20:32:35.529185 passed all 1 test case(s) 2023-01-21 20:32:35 ./run-tests.py eap_proto_pax_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_pax_errors 1/1 Test: EAP-PAX local error cases Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_pax_errors 4.906852 2023-01-21 20:32:41.006277 passed all 1 test case(s) 2023-01-21 20:32:41 ./run-tests.py eap_proto_sake_errors_server DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_sake_errors_server 1/1 Test: EAP-SAKE local error cases on server Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_sake_errors_server 8.084549 2023-01-21 20:32:49.657199 passed all 1 test case(s) 2023-01-21 20:32:49 ./run-tests.py eap_teap_basic_password_auth_id2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_basic_password_auth_id2 1/1 Test: EAP-TEAP with Basic-Password-Auth (eap_teap_id=2) Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_basic_password_auth_id2 0.978623 2023-01-21 20:32:51.204020 passed all 1 test case(s) 2023-01-21 20:32:51 ./run-tests.py eap_ttls_eap_gtc_session_resumption DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_ttls_eap_gtc_session_resumption 1/1 Test: EAP-TTLS/EAP-GTC session resumption Starting AP wlan3 Connect STA wlan0 to AP PASS eap_ttls_eap_gtc_session_resumption 1.017296 2023-01-21 20:32:52.792965 passed all 1 test case(s) 2023-01-21 20:32:52 ./run-tests.py fst_ap_config_pri_large DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_config_pri_large 1/1 Test: FST AP configuration Priority too large kill_pid: pidfile logs/current/myhostapd.pid does not exist - try again after a second kill_pid: pidfile logs/current/myhostapd.pid does not exist - could not kill the process PASS fst_ap_config_pri_large 1.211957 2023-01-21 20:32:54.572606 passed all 1 test case(s) 2023-01-21 20:32:54 ./run-tests.py fst_ap_session_request_with_no_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_session_request_with_no_session 1/1 Test: FST AP session request with no session Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Frame received, session created PASS fst_ap_session_request_with_no_session 2.36969 2023-01-21 20:32:57.509766 passed all 1 test case(s) 2023-01-21 20:32:57 ./run-tests.py fst_setup_response_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_setup_response_proto 1/1 Test: FST protocol testing for Setup Response Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP PASS fst_setup_response_proto 2.253319 2023-01-21 20:33:00.332936 passed all 1 test case(s) 2023-01-21 20:33:00 ./run-tests.py gas_anqp_venue_url DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_anqp_venue_url 1/1 Test: GAS/ANQP and Venue URL Starting AP wlan3 PASS gas_anqp_venue_url 0.74559 2023-01-21 20:33:01.646852 passed all 1 test case(s) 2023-01-21 20:33:01 ./run-tests.py go_neg_pbc_vs_pin DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START go_neg_pbc_vs_pin 1/1 Test: P2P GO Negotiation with one device using PBC and the other PIN wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 PASS go_neg_pbc_vs_pin 0.668648 2023-01-21 20:33:02.883701 passed all 1 test case(s) 2023-01-21 20:33:02 ./run-tests.py grpform_wait_peer DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_wait_peer 1/1 Test: P2P group formation wait for peer to become ready wlan0: Trying to discover peer 02:00:00:00:01:00 PASS grpform_wait_peer 5.221646 2023-01-21 20:33:08.670845 passed all 1 test case(s) 2023-01-21 20:33:08 ./run-tests.py hapd_ctrl_not_yet_fully_enabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_not_yet_fully_enabled 1/1 Test: hostapd and ctrl_iface commands when BSS not yet fully enabled Starting AP wlan3 PASS hapd_ctrl_not_yet_fully_enabled 0.163076 2023-01-21 20:33:09.401073 passed all 1 test case(s) 2023-01-21 20:33:09 ./run-tests.py hapd_ctrl_setband DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_setband 1/1 Test: hostapd and setband Starting AP wlan3 PASS hapd_ctrl_setband 0.545871 2023-01-21 20:33:10.516896 passed all 1 test case(s) 2023-01-21 20:33:10 ./run-tests.py hs20_pps_mo_1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hs20_pps_mo_1 1/1 Test: Hotspot 2.0 PPS MO with username/password credential Starting AP wlan3 set_pps result: Set PPS MO info to wpa_supplicant - SP FQDN wi-fi.org wpa_command(ifname='wlan0', cmd='REMOVE_CRED provisioning_sp=wi-fi.org') - UpdateIdentifier = 1 wpa_command(ifname='wlan0', cmd='ADD_CRED') wpa_command(ifname='wlan0', cmd='SET_CRED 0 update_identifier 1') wpa_command(ifname='wlan0', cmd='SET_CRED 0 provisioning_sp "wi-fi.org"') credential localname: 'Cred01' - Policy - Policy/PreferredRoamingPartnerList//Priority = 10 - Policy/PreferredRoamingPartnerList//FQDN_Match = another.example.org,includeSubdomains wpa_command(ifname='wlan0', cmd='SET_CRED 0 roaming_partner "another.example.org,0,10,*"') - Policy/PreferredRoamingPartnerList//Priority = 20 - Policy/PreferredRoamingPartnerList//FQDN_Match = example.com,exactMatch wpa_command(ifname='wlan0', cmd='SET_CRED 0 roaming_partner "example.com,1,20,*"') - Policy/PolicyUpdate - CredentialPriority = 1 wpa_command(ifname='wlan0', cmd='SET_CRED 0 sp_priority 1') - AAAServerTrustRoot - TODO - SubscriptionUpdate - HomeSP - HomeSP/FriendlyName = Example Operator - HomeSP/FQDN = w1.fi wpa_command(ifname='wlan0', cmd='SET_CRED 0 domain "w1.fi"') wpa_command(ifname='wlan0', cmd='SET_CRED 0 domain_suffix_match "w1.fi"') - HomeSP/RoamingConsortiumOI = 010203040506 wpa_command(ifname='wlan0', cmd='SET_CRED 0 roaming_consortiums "010203040506"') - Credential - Credential/CreationDate = 2012-12-01T12:00:00Z - Credential/UsernamePassword - Credential/UsernamePassword/Username = hs20-test wpa_command(ifname='wlan0', cmd='SET_CRED 0 username "hs20-test"') - Credential/UsernamePassword/Password = password wpa_command(ifname='wlan0', cmd='SET_CRED 0 password 70617373776f7264') - Credential/UsernamePassword/MachineManaged = TRUE - Credential/UsernamePassword/EAPMethod - Credential/UsernamePassword/EAPMethod/EAPType = 21 wpa_command(ifname='wlan0', cmd='SET_CRED 0 eap TTLS') - Credential/UsernamePassword/EAPMethod/InnerMethod = MS-CHAP-V2 wpa_command(ifname='wlan0', cmd='SET_CRED 0 phase2 "auth=MSCHAPV2"') - Credential/Realm = w1.fi wpa_command(ifname='wlan0', cmd='SET_CRED 0 realm "w1.fi"') PASS hs20_pps_mo_1 1.137873 2023-01-21 20:33:12.220581 passed all 1 test case(s) 2023-01-21 20:33:12 ./run-tests.py ibss_rsn_group_rekey DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_rsn_group_rekey 1/1 Test: IBSS RSN group rekeying Start IBSS on the first STA wlan0 waiting for IBSS start/join to complete Join two STAs to the IBSS wlan1 waiting for IBSS start/join to complete wlan0 waiting for 4-way handshake completion with wlan1 02:00:00:00:01:00 wlan1 waiting for 4-way handshake completion with wlan0 02:00:00:00:00:00 PASS ibss_rsn_group_rekey 13.303066 2023-01-21 20:33:26.090423 passed all 1 test case(s) 2023-01-21 20:33:26 ./run-tests.py ieee8021x_static_wep104 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_static_wep104 1/1 Test: IEEE 802.1X connection using static WEP104 Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_static_wep104 1.220192 2023-01-21 20:33:27.875563 passed all 1 test case(s) 2023-01-21 20:33:27 ./run-tests.py macsec_hostapd_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_hostapd_eap 1/1 Test: MACsec EAP with hostapd ip link: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eth0: mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000 link/ether 64:00:6a:30:91:ac brd ff:ff:ff:ff:ff:ff altname enp0s31f6 3: wlan0: mtu 1500 qdisc noqueue state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 4: wlan1: mtu 1500 qdisc noqueue state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:01:00 brd ff:ff:ff:ff:ff:ff 5: wlan2: mtu 1500 qdisc noqueue state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:02:00 brd ff:ff:ff:ff:ff:ff 6: wlan3: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:03:00 brd ff:ff:ff:ff:ff:ff 7: wlan4: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:04:00 brd ff:ff:ff:ff:ff:ff 8: wlan5: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:05:00 brd ff:ff:ff:ff:ff:ff 9: wlan6: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:06:00 brd ff:ff:ff:ff:ff:ff 10: hwsim0: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ieee802.11/radiotap 12:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_hostapd_eap 0.357796 2023-01-21 20:33:28.796573 passed all 0 test case(s) skipped 1 test case(s) 2023-01-21 20:33:28 ./run-tests.py mbo_cell_capa_update_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_cell_capa_update_pmf 1/1 Test: MBO cellular data capability update with PMF required Starting AP wlan3 Connect STA wlan0 to AP PASS mbo_cell_capa_update_pmf 1.2448 2023-01-21 20:33:30.732763 passed all 1 test case(s) 2023-01-21 20:33:30 ./run-tests.py mesh_select_network DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_select_network 1/1 Test: Mesh network and SELECT_NETWORK PASS mesh_select_network 1.054743 2023-01-21 20:33:32.346637 passed all 1 test case(s) 2023-01-21 20:33:32 ./run-tests.py multi_ap_wps_split_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_wps_split_open 1/1 Test: WPS on split fronthaul and backhaul AP with open fronthaul Starting AP wlan4 Starting AP wlan3 PASS multi_ap_wps_split_open 9.617769 2023-01-21 20:33:42.520606 passed all 1 test case(s) 2023-01-21 20:33:42 ./run-tests.py nfc_wps_handover_pk_hash_mismatch_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_handover_pk_hash_mismatch_sta 1/1 Test: WPS NFC connection handover with invalid pkhash from station (negative) Starting AP wlan3 NFC connection handover PASS nfc_wps_handover_pk_hash_mismatch_sta 1.088283 2023-01-21 20:33:44.161016 passed all 1 test case(s) 2023-01-21 20:33:44 ./run-tests.py p2p_channel_drv_pref_go_neg4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_channel_drv_pref_go_neg4 1/1 Test: P2P GO Negotiation with P2P client device channel preference Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS p2p_channel_drv_pref_go_neg4 2.579928 2023-01-21 20:33:47.300310 passed all 1 test case(s) 2023-01-21 20:33:47 ./run-tests.py p2p_device_join_no_group_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_device_join_no_group_iface 1/1 Test: P2P join-group using cfg80211 P2P Device (no separate group interface) Try to connect the client to the GO wlan7: Trying to discover peer 02:00:00:00:00:00 Client connected Terminate persistent group PASS p2p_device_join_no_group_iface 3.740518 2023-01-21 20:33:51.598769 passed all 1 test case(s) 2023-01-21 20:33:51 ./run-tests.py p2p_ext_discovery_go DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_ext_discovery_go 1/1 Test: P2P device discovery with vendor specific extensions for GO wlan1: Trying to discover peer 02:00:00:00:00:00 PASS p2p_ext_discovery_go 0.774119 2023-01-21 20:33:52.929881 passed all 1 test case(s) 2023-01-21 20:33:52 ./run-tests.py p2p_ext_vendor_elem_go_neg_resp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_ext_vendor_elem_go_neg_resp 1/1 Test: VENDOR_ELEM in GO Negotiation Response frames wlan1: Trying to discover peer 02:00:00:00:00:00 PASS p2p_ext_vendor_elem_go_neg_resp 0.409912 2023-01-21 20:33:53.898302 passed all 1 test case(s) 2023-01-21 20:33:53 ./run-tests.py p2p_go_move_reg_change DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_go_move_reg_change 1/1 Test: P2P GO move due to regulatory change Start autonomous GO wlan0 Try to connect the client to the GO wlan1: Trying to discover peer 02:00:00:00:00:00 Client connected PASS p2p_go_move_reg_change 8.041167 2023-01-21 20:34:02.497223 passed all 1 test case(s) 2023-01-21 20:34:02 ./run-tests.py p2p_listen_and_offchannel_tx DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_listen_and_offchannel_tx 1/1 Test: P2P_LISTEN behavior with offchannel TX wlan0: Trying to discover peer 02:00:00:00:01:00 wlan2: Trying to discover peer 02:00:00:00:00:00 PASS p2p_listen_and_offchannel_tx 0.662655 2023-01-21 20:34:03.716685 passed all 1 test case(s) 2023-01-21 20:34:03 ./run-tests.py p2p_msg_invitation_req_to_go DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_msg_invitation_req_to_go 1/1 Test: P2P protocol tests for invitation request processing on GO device Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group PASS p2p_msg_invitation_req_to_go 3.8946 2023-01-21 20:34:08.165670 passed all 1 test case(s) 2023-01-21 20:34:08 ./run-tests.py p2ps_connect_p2p_device2_no_group_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_connect_p2p_device2_no_group_iface 1/1 Test: P2PS connection using cfg80211 P2P Device (reverse) (no separate group interface) PASS p2ps_connect_p2p_device2_no_group_iface 3.558091 2023-01-21 20:34:12.282386 passed all 1 test case(s) 2023-01-21 20:34:12 ./run-tests.py pasn_ccmp_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_ccmp_256 1/1 Test: PASN authentication with WPA2/CCMP256 AP Starting AP wlan3 sta: TK: dffd7a8ebc13df52843ee513ee9b5cc1e3d55ae44b0ee7b1b4216018f275d115 KDK: ap : TK: dffd7a8ebc13df52843ee513ee9b5cc1e3d55ae44b0ee7b1b4216018f275d115 KDK: PASS pasn_ccmp_256 0.949848 2023-01-21 20:34:13.787399 passed all 1 test case(s) 2023-01-21 20:34:13 ./run-tests.py pasn_comeback DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_comeback 1/1 Test: PASN authentication with comeback flow Starting AP wlan3 sta: TK: e5713d55db2b4a2da004d7a723cae8b5 KDK: ap : TK: e5713d55db2b4a2da004d7a723cae8b5 KDK: PASS pasn_comeback 0.861355 2023-01-21 20:34:15.203547 passed all 1 test case(s) 2023-01-21 20:34:15 ./run-tests.py pasn_fils_sha384 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_fils_sha384 1/1 Test: PASN FILS authentication using SHA-384 Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP sta: TK: 4ed2b22a9fe353cd1b0ad26f91a381be KDK: ap : TK: 4ed2b22a9fe353cd1b0ad26f91a381be KDK: PASS pasn_fils_sha384 1.505941 2023-01-21 20:34:17.265541 passed all 1 test case(s) 2023-01-21 20:34:17 ./run-tests.py persistent_group_in_grpform DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START persistent_group_in_grpform 1/1 Test: P2P persistent group parameters re-used in group formation Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 PASS persistent_group_in_grpform 4.692183 2023-01-21 20:34:22.512530 passed all 1 test case(s) 2023-01-21 20:34:22 ./run-tests.py pmksa_cache_preauth_vlan_used_per_sta_vif DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pmksa_cache_preauth_vlan_used_per_sta_vif 1/1 Test: RSN pre-authentication to generate PMKSA cache entry (station with VLAN set, per_sta_vif=1) Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS pmksa_cache_preauth_vlan_used_per_sta_vif 3.610558 2023-01-21 20:34:26.682727 passed all 1 test case(s) 2023-01-21 20:34:26 ./run-tests.py radius_acct DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_acct 1/1 Test: RADIUS Accounting Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Checking for RADIUS counters PASS radius_acct 1.892447 2023-01-21 20:34:29.134452 passed all 1 test case(s) 2023-01-21 20:34:29 ./run-tests.py radius_acct_unreachable4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_acct_unreachable4 1/1 Test: RADIUS Accounting server unreachable and multiple STAs Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS radius_acct_unreachable4 7.608193 2023-01-21 20:34:37.299473 passed all 1 test case(s) 2023-01-21 20:34:37 ./run-tests.py rfkill_autogo DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rfkill_autogo 1/1 Test: rfkill block/unblock for autonomous P2P GO rfkill block 0 rfkill block 1 rfkill unblock 0 rfkill unblock 1 PASS rfkill_autogo 2.015879 2023-01-21 20:34:39.873619 passed all 1 test case(s) 2023-01-21 20:34:39 ./run-tests.py rrm_beacon_req_table_detail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_table_detail 1/1 Test: Beacon request - beacon table mode - reporting detail Starting AP wlan3 Connect STA wlan0 to AP Reporting Detail 0 Received beacon report: opclass=81 channel=1 start=0 duration=0 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 fragment_id=0100 Reporting Detail 1 Received beacon report: opclass=81 channel=1 start=0 duration=0 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 frame_body=f3166b18ccf2050064000114 fragment_id=0100 Reporting Detail 2 Received beacon report: opclass=81 channel=1 start=0 duration=0 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 frame_body=f3166b18ccf2050064000114000372726d010882848b960c1218240301012a010432043048606c460570000000003b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00 fragment_id=0100 Reporting Detail 3 (invalid) Reporting Detail (too short) PASS rrm_beacon_req_table_detail 1.069821 2023-01-21 20:34:41.497274 passed all 1 test case(s) 2023-01-21 20:34:41 ./run-tests.py sae_key_lifetime_in_memory DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_key_lifetime_in_memory 1/1 Test: SAE and key lifetime in memory Starting AP wlan3 Connect STA wlan0 to AP Reading process memory (pid=4293) [heap] 0x560be398d000-0x560be39c5000 is at 12288-241664 [stack] 0x7ffe5791e000-0x7ffe57940000 is at 925696-1064960 Total process memory read: 1064960 bytes Checking keys in memory while associated Skip test case: Password not found while associated SKIP sae_key_lifetime_in_memory 2.027558 2023-01-21 20:34:44.090794 passed all 0 test case(s) skipped 1 test case(s) 2023-01-21 20:34:44 ./run-tests.py sae_proto_hostapd_status_126 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_proto_hostapd_status_126 1/1 Test: SAE protocol testing with hostapd (status code 126) Starting AP wlan3 PASS sae_proto_hostapd_status_126 0.554465 2023-01-21 20:34:45.213054 passed all 1 test case(s) 2023-01-21 20:34:45 ./run-tests.py scan_flush DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_flush 1/1 Test: Ongoing scan and FLUSH Starting AP wlan3 PASS scan_flush 0.703709 2023-01-21 20:34:46.484638 passed all 1 test case(s) 2023-01-21 20:34:46 ./run-tests.py scan_multi_bssid_fms DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multi_bssid_fms 1/1 Test: Non-transmitting BSS has different FMS IE from transmitting BSS Starting AP wlan3 trans_bss fms ie: 013901 nontrans_bss fms ie: 0229320102 PASS scan_multi_bssid_fms 0.992381 2023-01-21 20:34:48.045153 passed all 1 test case(s) 2023-01-21 20:34:48 ./run-tests.py sigma_dut_eap_ttls_uosc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_eap_ttls_uosc 1/1 Test: sigma_dut controlled STA and EAP-TTLS with UOSC Starting AP wlan3 Skip test case: sigma_dut not available SKIP sigma_dut_eap_ttls_uosc 0.597906 2023-01-21 20:34:49.199557 passed all 0 test case(s) skipped 1 test case(s) 2023-01-21 20:34:49 ./run-tests.py sigma_dut_sae DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_sae 1/1 Test: sigma_dut controlled SAE association Skip test case: sigma_dut not available SKIP sigma_dut_sae 0.152598 2023-01-21 20:34:49.911418 passed all 0 test case(s) skipped 1 test case(s) 2023-01-21 20:34:49 ./run-tests.py ssid_hidden_wpa2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ssid_hidden_wpa2 1/1 Test: Hidden SSID with WPA2-PSK Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan0 to AP PASS ssid_hidden_wpa2 2.236464 2023-01-21 20:34:52.704615 passed all 1 test case(s) 2023-01-21 20:34:52 ./run-tests.py wext_wep_shared_key_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wext_wep_shared_key_auth 1/1 Test: WEP Shared Key authentication Starting AP wlan3 Connect STA wlan5 to AP Connect STA wlan5 to AP PASS wext_wep_shared_key_auth 5.296717 2023-01-21 20:34:58.559317 passed all 1 test case(s) 2023-01-21 20:34:58 ./run-tests.py wifi_display_persistent_group DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wifi_display_persistent_group 1/1 Test: P2P persistent group formation and re-invocation with Wi-Fi Display enabled Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group Re-invoke persistent group from client wlan1: Trying to discover peer 02:00:00:00:00:00 Terminate persistent group Re-invoke persistent group from GO wlan0: Trying to discover peer 02:00:00:00:01:00 Terminate persistent group Try to connect the client to the GO wlan2: Trying to discover peer 02:00:00:00:00:00 Client connected wlan1: Trying to discover peer 02:00:00:00:00:00 PASS wifi_display_persistent_group 8.32963 2023-01-21 20:35:07.445148 passed all 1 test case(s) 2023-01-21 20:35:07 ./run-tests.py wmediumd_scan_only_one DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wmediumd_scan_only_one 1/1 Test: Test that scanning with a single active AP only returns that one (wmediund) Starting AP wlan3 PASS wmediumd_scan_only_one 4.087805 2023-01-21 20:35:12.087721 passed all 1 test case(s) 2023-01-21 20:35:12 ./run-tests.py wnm_bss_tm_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_tm_errors 1/1 Test: WNM BSS Transition Management errors Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_bss_tm_errors 0.982543 2023-01-21 20:35:13.627584 passed all 1 test case(s) 2023-01-21 20:35:13 ./run-tests.py wnm_bss_tm_nei_11b DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_tm_nei_11b 1/1 Test: WNM BSS Transition Management and 11g neighbor Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Preferred Candidate List (matching neighbor for another BSS) without Disassociation Imminent PASS wnm_bss_tm_nei_11b 2.773704 2023-01-21 20:35:16.957464 passed all 1 test case(s) 2023-01-21 20:35:17 ./run-tests.py wnm_bss_tm_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_tm_req 1/1 Test: BSS Transition Management Request Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_bss_tm_req 1.268578 2023-01-21 20:35:18.780835 passed all 1 test case(s) 2023-01-21 20:35:18 ./run-tests.py wpas_ctrl_log_level DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_log_level 1/1 Test: wpa_supplicant ctrl_iface LOG_LEVEL PASS wpas_ctrl_log_level 0.1568 2023-01-21 20:35:19.494794 passed all 1 test case(s) 2023-01-21 20:35:19 ./run-tests.py wps_ext_proto_nack_m3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_nack_m3 1/1 Test: WPS and NACK M3 Starting AP wlan3 PASS wps_ext_proto_nack_m3 1.070258 2023-01-21 20:35:21.120359 passed all 1 test case(s) 2023-01-21 20:35:21 ./stop.sh