2022-03-17 17:11:50 export USER=root 2022-03-17 17:11:50 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2022-03-17 17:12:32 ./start.sh 2022-03-17 17:12:32 ./run-tests.py ap_anqp_sharing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_anqp_sharing 1/1 Test: ANQP sharing within ESS and explicit unshare Starting AP wlan3 Starting AP wlan4 Normal network selection with shared ANQP results Explicit ANQP request to unshare ANQP results PASS ap_anqp_sharing 0.349493 2022-03-17 17:12:34.027923 passed all 1 test case(s) 2022-03-17 17:12:34 ./run-tests.py ap_bss_add_remove DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_bss_add_remove 1/1 Test: Dynamic BSS add/remove operations with hostapd Set up three BSSes one by one Starting BSS phy=phy3 ifname=wlan3 Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Starting BSS phy=phy3 ifname=wlan3-2 Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Starting BSS phy=phy3 ifname=wlan3-3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Remove the last BSS and re-add it Removing BSS wlan3-3 Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Starting BSS phy=phy3 ifname=wlan3-3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Remove the middle BSS and re-add it Removing BSS wlan3-2 Connect STA wlan1 to AP Connect STA wlan0 to AP Connect STA wlan2 to AP Starting BSS phy=phy3 ifname=wlan3-2 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Remove the first BSS and re-add it and other BSSs Removing BSS wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Starting BSS phy=phy3 ifname=wlan3 Starting BSS phy=phy3 ifname=wlan3-2 Starting BSS phy=phy3 ifname=wlan3-3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Remove two BSSes and re-add them Removing BSS wlan3-2 Connect STA wlan1 to AP Connect STA wlan0 to AP Connect STA wlan2 to AP Removing BSS wlan3-3 Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Starting BSS phy=phy3 ifname=wlan3-2 Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Starting BSS phy=phy3 ifname=wlan3-3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Remove three BSSes in and re-add them Removing BSS wlan3-3 Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Removing BSS wlan3-2 Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Removing BSS wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Starting BSS phy=phy3 ifname=wlan3 Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Starting BSS phy=phy3 ifname=wlan3-2 Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Starting BSS phy=phy3 ifname=wlan3-3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Test error handling if a duplicate ifname is tried Starting BSS phy=phy3 ifname=wlan3-3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_bss_add_remove 6.846855 2022-03-17 17:12:41.048539 passed all 1 test case(s) 2022-03-17 17:12:41 ./run-tests.py ap_cipher_replay_protection_ap_gcmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cipher_replay_protection_ap_gcmp 1/1 Test: GCMP replay protection on AP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_cipher_replay_protection_ap_gcmp 1.441379 2022-03-17 17:12:42.662866 passed all 1 test case(s) 2022-03-17 17:12:42 ./run-tests.py ap_duplicate_bssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_duplicate_bssid 1/1 Test: Duplicate BSSID Starting AP wlan3 Starting BSS phy=phy3 ifname=wlan3-2 Starting BSS phy=phy3 ifname=wlan3-3 Connect STA wlan0 to AP PASS ap_duplicate_bssid 0.240502 2022-03-17 17:12:43.074683 passed all 1 test case(s) 2022-03-17 17:12:43 ./run-tests.py ap_ft_ap_oom4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_ap_oom4 1/1 Test: WPA2-PSK-FT and AP OOM 4 Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS ap_ft_ap_oom4 0.857382 2022-03-17 17:12:44.100176 passed all 1 test case(s) 2022-03-17 17:12:44 ./run-tests.py ap_ft_mismatching_rrb_key_push DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_mismatching_rrb_key_push 1/1 Test: WPA2-PSK-FT AP over DS with mismatching RRB key (push) Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP PASS ap_ft_mismatching_rrb_key_push 1.409916 2022-03-17 17:12:45.677331 passed all 1 test case(s) 2022-03-17 17:12:45 ./run-tests.py ap_ft_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_pmf 1/1 Test: WPA2-PSK-FT AP with PMF Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_pmf 0.670015 2022-03-17 17:12:46.516497 passed all 1 test case(s) 2022-03-17 17:12:46 ./run-tests.py ap_ft_sae_ptk_rekey_ap_ext_key_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_sae_ptk_rekey_ap_ext_key_id 1/1 Test: WPA2-PSK-FT-SAE AP and PTK rekey triggered by AP (Ext Key ID) Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP PASS ap_ft_sae_ptk_rekey_ap_ext_key_id 2.547232 2022-03-17 17:12:49.231937 passed all 1 test case(s) 2022-03-17 17:12:49 ./run-tests.py ap_hs20_multiple_home_cred DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_multiple_home_cred 1/1 Test: Hotspot 2.0 and select with multiple matching home credentials Starting AP wlan3 Starting AP wlan4 PASS ap_hs20_multiple_home_cred 0.37583 2022-03-17 17:12:49.776947 passed all 1 test case(s) 2022-03-17 17:12:49 ./run-tests.py ap_hs20_proxyarp_enable_dgaf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_proxyarp_enable_dgaf 1/1 Test: Hotspot 2.0 and ProxyARP with DGAF enabled Starting AP wlan3 Connect STA wlan1 to AP After connect: ['192.168.1.123 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT', 'aaaa:bbbb:cccc::2 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT'] After disconnect: [] PASS ap_hs20_proxyarp_enable_dgaf 1.218218 2022-03-17 17:12:51.162973 passed all 1 test case(s) 2022-03-17 17:12:51 ./run-tests.py ap_pmf_assoc_comeback DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_assoc_comeback 1/1 Test: WPA2-PSK AP with PMF association comeback Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_assoc_comeback 1.424326 2022-03-17 17:12:52.754568 passed all 1 test case(s) 2022-03-17 17:12:52 ./run-tests.py ap_pmf_inject_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_inject_auth 1/1 Test: WPA2-PSK AP with PMF and Authentication frame injection Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_inject_auth 5.588995 2022-03-17 17:12:58.510719 passed all 1 test case(s) 2022-03-17 17:12:58 ./run-tests.py ap_vlan_wpa2_radius_mixed DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_wpa2_radius_mixed 1/1 Test: AP VLAN with WPA2-Enterprise and tagged+untagged VLANs Starting AP wlan3 Connect STA wlan0 to AP Test connectivity in untagged VLAN 2 Test connectivity in tagged VLAN 1 PASS ap_vlan_wpa2_radius_mixed 0.530534 2022-03-17 17:12:59.207141 passed all 1 test case(s) 2022-03-17 17:12:59 ./run-tests.py ap_vlan_wpa2_radius_required DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_wpa2_radius_required 1/1 Test: AP VLAN with WPA2-Enterprise and RADIUS attributes required Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan2 to AP PASS ap_vlan_wpa2_radius_required 0.4326 2022-03-17 17:12:59.806714 passed all 1 test case(s) 2022-03-17 17:12:59 ./run-tests.py ap_wpa2_eap_aka_config DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_aka_config 1/1 Test: EAP-AKA configuration options Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_aka_config 0.233213 2022-03-17 17:13:00.205563 passed all 1 test case(s) 2022-03-17 17:13:00 ./run-tests.py ap_wpa2_eap_fast_gtc_identity_change DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_gtc_identity_change 1/1 Test: WPA2-Enterprise connection using EAP-FAST/GTC and identity changing Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_gtc_identity_change 0.462232 2022-03-17 17:13:00.833354 passed all 1 test case(s) 2022-03-17 17:13:00 ./run-tests.py ap_wpa2_eap_gpsk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_gpsk 1/1 Test: WPA2-Enterprise connection using EAP-GPSK Starting AP wlan3 Connect STA wlan0 to AP Test forced algorithm selection Test failed algorithm negotiation Negative test with incorrect password Connect STA wlan0 to AP PASS ap_wpa2_eap_gpsk 0.88325 2022-03-17 17:13:01.884452 passed all 1 test case(s) 2022-03-17 17:13:01 ./run-tests.py ap_wpa2_eap_pwd_salt_sha512 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_pwd_salt_sha512 1/1 Test: WPA2-Enterprise connection using EAP-pwd and salted password SHA512 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_pwd_salt_sha512 0.239636 2022-03-17 17:13:02.291364 passed all 1 test case(s) 2022-03-17 17:13:02 ./run-tests.py ap_wpa2_eap_tls_ocsp_unknown_sign DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_ocsp_unknown_sign 1/1 Test: WPA2-Enterprise connection using EAP-TLS and unknown OCSP signer Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_ocsp_unknown_sign 0.219987 2022-03-17 17:13:02.678474 passed all 1 test case(s) 2022-03-17 17:13:02 ./run-tests.py ap_wpa2_eap_ttls_dh_params DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_dh_params 1/1 Test: WPA2-Enterprise connection using EAP-TTLS/CHAP and setting DH params Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_dh_params 0.254195 2022-03-17 17:13:03.099402 passed all 1 test case(s) 2022-03-17 17:13:03 ./run-tests.py ap_wpa2_eap_ttls_eap_vendor DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_eap_vendor 1/1 Test: WPA2-Enterprise connection using EAP-TTLS/EAP-vendor Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_eap_vendor 0.24892 2022-03-17 17:13:03.515032 passed all 1 test case(s) 2022-03-17 17:13:03 ./run-tests.py ap_wpa2_ext_add_to_bridge DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_ext_add_to_bridge 1/1 Test: hostapd behavior with interface added to bridge externally Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_ext_add_to_bridge 0.319831 2022-03-17 17:13:04.001532 passed all 1 test case(s) 2022-03-17 17:13:04 ./run-tests.py ap_wps_frag_ack_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_frag_ack_oom 1/1 Test: WPS and fragment ack OOM Starting AP wlan3 PASS ap_wps_frag_ack_oom 0.308527 2022-03-17 17:13:04.480873 passed all 1 test case(s) 2022-03-17 17:13:04 ./run-tests.py ap_wps_reg_config_ext_processing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_reg_config_ext_processing 1/1 Test: WPS registrar configuring an AP with external config processing Starting AP wlan3 PASS ap_wps_reg_config_ext_processing 0.419805 2022-03-17 17:13:05.068189 passed all 1 test case(s) 2022-03-17 17:13:05 ./run-tests.py cert_check_dnsname DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START cert_check_dnsname 1/1 Test: Certificate check with multiple dNSName values Skip test case: OpenSSL python method not available SKIP cert_check_dnsname 0.070441 2022-03-17 17:13:05.306977 passed all 0 test case(s) skipped 1 test case(s) 2022-03-17 17:13:05 ./run-tests.py cert_check_dnsname_wildcard DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START cert_check_dnsname_wildcard 1/1 Test: Certificate check with multiple dNSName wildcard values Skip test case: OpenSSL python method not available SKIP cert_check_dnsname_wildcard 0.073653 2022-03-17 17:13:05.549901 passed all 0 test case(s) skipped 1 test case(s) 2022-03-17 17:13:05 ./run-tests.py concurrent_grpform_while_connecting3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START concurrent_grpform_while_connecting3 1/1 Test: Concurrent P2P group formation while connecting to an AP (3) Start connection to an infrastructure AP Starting AP wlan3 Connect STA wlan0 to AP Form a P2P group while connecting to an AP Start GO negotiation wlan1 -> wlan0 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Confirm AP connection after P2P group removal PASS concurrent_grpform_while_connecting3 7.278466 2022-03-17 17:13:12.997008 passed all 1 test case(s) 2022-03-17 17:13:13 ./run-tests.py dbus_p2p_autogo_legacy DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_p2p_autogo_legacy 1/1 Test: D-Bus P2P autonomous GO and legacy STA No dbus module available Skip test case: No dbus module available SKIP dbus_p2p_autogo_legacy 0.069735 2022-03-17 17:13:13.234107 passed all 0 test case(s) skipped 1 test case(s) 2022-03-17 17:13:13 ./run-tests.py discovery_and_interface_disabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START discovery_and_interface_disabled 1/1 Test: P2P device discovery with interface getting disabled PASS discovery_and_interface_disabled 19.589095 2022-03-17 17:13:32.990925 passed all 1 test case(s) 2022-03-17 17:13:33 ./run-tests.py dpp_auto_connect_legacy_psk_sae_3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_auto_connect_legacy_psk_sae_3 1/1 Test: DPP and auto connect (legacy PSK+SAE) Starting AP wlan3 PASS dpp_auto_connect_legacy_psk_sae_3 4.953703 2022-03-17 17:13:38.110665 passed all 1 test case(s) 2022-03-17 17:13:38 ./run-tests.py dpp_config_connector_error_expired_5 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_connector_error_expired_5 1/1 Test: DPP Config Object connector error - expired 5 Skip test case: OpenSSL python method not available SKIP dpp_config_connector_error_expired_5 0.069466 2022-03-17 17:13:38.348151 passed all 0 test case(s) skipped 1 test case(s) 2022-03-17 17:13:38 ./run-tests.py dpp_listen_continue DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_listen_continue 1/1 Test: DPP and continue listen state PASS dpp_listen_continue 5.776016 2022-03-17 17:13:44.291049 passed all 1 test case(s) 2022-03-17 17:13:44 ./run-tests.py dpp_network_intro_version_missing_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_network_intro_version_missing_req 1/1 Test: DPP Network Introduction and protocol version missing from request Skip test case: DPP version 3 not supported SKIP dpp_network_intro_version_missing_req 0.069734 2022-03-17 17:13:44.528072 passed all 0 test case(s) skipped 1 test case(s) 2022-03-17 17:13:44 ./run-tests.py dpp_proto_auth_resp_invalid_i_bootstrap_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_resp_invalid_i_bootstrap_key 1/1 Test: DPP protocol testing - invalid I-bootstrap key in Auth Resp PASS dpp_proto_auth_resp_invalid_i_bootstrap_key 0.178372 2022-03-17 17:13:44.874173 passed all 1 test case(s) 2022-03-17 17:13:44 ./run-tests.py dpp_proto_auth_resp_invalid_r_bootstrap_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_resp_invalid_r_bootstrap_key 1/1 Test: DPP protocol testing - invalid R-bootstrap key in Auth Resp PASS dpp_proto_auth_resp_invalid_r_bootstrap_key 0.179717 2022-03-17 17:13:45.220577 passed all 1 test case(s) 2022-03-17 17:13:45 ./run-tests.py dpp_proto_conf_req_invalid_e_nonce DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_conf_req_invalid_e_nonce 1/1 Test: DPP protocol testing - invalid E-nonce in Conf Req PASS dpp_proto_conf_req_invalid_e_nonce 0.080076 2022-03-17 17:13:45.466282 passed all 1 test case(s) 2022-03-17 17:13:45 ./run-tests.py dpp_proto_conf_req_no_wrapped_data DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_conf_req_no_wrapped_data 1/1 Test: DPP protocol testing - no Wrapped Data in Conf Req PASS dpp_proto_conf_req_no_wrapped_data 0.079715 2022-03-17 17:13:45.711558 passed all 1 test case(s) 2022-03-17 17:13:45 ./run-tests.py dpp_qr_code_auth_broadcast DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_auth_broadcast 1/1 Test: DPP QR Code and authentication exchange (broadcast) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_auth_broadcast 0.081357 2022-03-17 17:13:45.960211 passed all 1 test case(s) 2022-03-17 17:13:45 ./run-tests.py eap_proto_leap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_leap 1/1 Test: EAP-LEAP protocol tests Starting AP wlan3 Connect STA wlan0 to AP leap_handler - RX 02c500090175736572 Test: Missing payload Connect STA wlan0 to AP leap_handler - RX 028f00090175736572 Test: Unexpected version Connect STA wlan0 to AP leap_handler - RX 026700090175736572 Test: Invalid challenge length Connect STA wlan0 to AP leap_handler - RX 02e500090175736572 Test: Truncated challenge Connect STA wlan0 to AP leap_handler - RX 020100090175736572 Test: Valid challenge leap_handler - RX 02060024110100184d4399ea218a50d569e9cf3c95f5699327365f4cf3756be775736572 Test: Missing payload in Response Connect STA wlan0 to AP leap_handler - RX 02ec00090175736572 Test: Valid challenge leap_handler - RX 02080024110100184d4399ea218a50d569e9cf3c95f5699327365f4cf3756be775736572 Test: Unexpected version in Response Connect STA wlan0 to AP leap_handler - RX 027700090175736572 Test: Valid challenge leap_handler - RX 020a0024110100184d4399ea218a50d569e9cf3c95f5699327365f4cf3756be775736572 Test: Invalid challenge length in Response Connect STA wlan0 to AP leap_handler - RX 025d00090175736572 Test: Valid challenge leap_handler - RX 020c0024110100184d4399ea218a50d569e9cf3c95f5699327365f4cf3756be775736572 Test: Truncated challenge in Response Connect STA wlan0 to AP leap_handler - RX 023100090175736572 Test: Valid challenge leap_handler - RX 020e0024110100184d4399ea218a50d569e9cf3c95f5699327365f4cf3756be775736572 Test: Invalid challange value in Response Connect STA wlan0 to AP leap_handler - RX 024d00090175736572 Test: Valid challenge leap_handler - RX 02100024110100184d4399ea218a50d569e9cf3c95f5699327365f4cf3756be775736572 Test: Valid challange value in Response Connect STA wlan0 to AP leap_handler - RX 028c00090175736572 Test: Valid challenge leap_handler - RX 02120024110100184d4399ea218a50d569e9cf3c95f5699327365f4cf3756be775736572 Test: Success Wait for additional roundtrip Connect STA wlan0 to AP leap_handler - RX 027100090175736572 Test: Valid challenge leap_handler - RX 02140024110100184d4399ea218a50d569e9cf3c95f5699327365f4cf3756be775736572 Test: Failure PASS eap_proto_leap 2.857312 2022-03-17 17:13:48.982658 passed all 1 test case(s) 2022-03-17 17:13:49 ./run-tests.py eap_proto_pwd_invalid_element_peer DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_pwd_invalid_element_peer 1/1 Test: EAP-pwd protocol tests - invalid peer element Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP PASS eap_proto_pwd_invalid_element_peer 0.874131 2022-03-17 17:13:50.027131 passed all 1 test case(s) 2022-03-17 17:13:50 ./run-tests.py eap_teap_eap_mschapv2_id0 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_eap_mschapv2_id0 1/1 Test: EAP-TEAP with inner EAP-MSCHAPv2 (eap_teap_id=0) Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_eap_mschapv2_id0 0.258909 2022-03-17 17:13:50.453519 passed all 1 test case(s) 2022-03-17 17:13:50 ./run-tests.py eap_teap_eap_mschapv2_user_and_machine DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_eap_mschapv2_user_and_machine 1/1 Test: EAP-TEAP with inner EAP-MSCHAPv2 using user and machine credentials Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_eap_mschapv2_user_and_machine 0.24171 2022-03-17 17:13:50.860949 passed all 1 test case(s) 2022-03-17 17:13:50 ./run-tests.py eap_teap_tls_cs_sha384 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_tls_cs_sha384 1/1 Test: EAP-TEAP with TLS cipher suite that uses SHA-384 Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_tls_cs_sha384 0.237262 2022-03-17 17:13:51.267994 passed all 1 test case(s) 2022-03-17 17:13:51 ./run-tests.py ext_password_interworking DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ext_password_interworking 1/1 Test: External password storage for Interworking network selection Starting AP wlan3 PASS ext_password_interworking 0.295683 2022-03-17 17:13:51.731678 passed all 1 test case(s) 2022-03-17 17:13:51 ./run-tests.py fils_and_ft_over_air DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_and_ft_over_air 1/1 Test: FILS SK using ERP and FT-over-air (SHA256) Starting AP as-erp Set up ERP key hierarchy without FILS/FT authentication Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP Initial mobility domain association using FILS authentication Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) FT protocol using FT key hierarchy established during FILS authentication FT protocol using the previously established FT key hierarchy from FILS authentication PASS fils_and_ft_over_air 0.938363 2022-03-17 17:13:52.842946 passed all 1 test case(s) 2022-03-17 17:13:52 ./run-tests.py fils_sk_erp_roam_diff_akm DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_erp_roam_diff_akm 1/1 Test: FILS SK using ERP and SHA256/SHA384 change in roam Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP Starting AP wlan4 (old add_ap argument type) PASS fils_sk_erp_roam_diff_akm 0.448351 2022-03-17 17:13:53.461227 passed all 1 test case(s) 2022-03-17 17:13:53 ./run-tests.py fst_ap_config_llt_zero DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_config_llt_zero 1/1 Test: FST AP configuration zero LLT kill_pid: pidfile logs/current/myhostapd.pid does not exist - try again after a second kill_pid: pidfile logs/current/myhostapd.pid does not exist - could not kill the process PASS fst_ap_config_llt_zero 1.098789 2022-03-17 17:13:54.729629 passed all 1 test case(s) 2022-03-17 17:13:54 ./run-tests.py fst_ap_remove_session_established DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_remove_session_established 1/1 Test: FST AP remove session - established Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Session removed PASS fst_ap_remove_session_established 0.449905 2022-03-17 17:13:55.346074 passed all 1 test case(s) 2022-03-17 17:13:55 ./run-tests.py fst_disconnect_non_fst_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_disconnect_non_fst_sta 1/1 Test: FST disconnect non-FST STA Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan0 to AP PASS fst_disconnect_non_fst_sta 6.378979 2022-03-17 17:14:01.893049 passed all 1 test case(s) 2022-03-17 17:14:01 ./run-tests.py fst_session_respond_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_session_respond_fail 1/1 Test: FST-MANAGER SESSION_RESPOND failure Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP PASS fst_session_respond_fail 0.393531 2022-03-17 17:14:02.457914 passed all 1 test case(s) 2022-03-17 17:14:02 ./run-tests.py fst_sta_initiate_session_bad_peer_addr DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_initiate_session_bad_peer_addr 1/1 Test: FST STA initiate session - bad peer address Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (Peer address) PASS fst_sta_initiate_session_bad_peer_addr 0.394753 2022-03-17 17:14:03.022636 passed all 1 test case(s) 2022-03-17 17:14:03 ./run-tests.py fst_sta_start_session_no_set_params DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_start_session_no_set_params 1/1 Test: FST STA start session - no set params Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (No params passed to session set) PASS fst_sta_start_session_no_set_params 0.390004 2022-03-17 17:14:03.581380 passed all 1 test case(s) 2022-03-17 17:14:03 ./run-tests.py gas_anqp_get_no_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_anqp_get_no_scan 1/1 Test: GAS/ANQP query without scan Starting AP wlan3 PASS gas_anqp_get_no_scan 0.373091 2022-03-17 17:14:04.123529 passed all 1 test case(s) 2022-03-17 17:14:04 ./run-tests.py gas_comeback_resp_additional_delay DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_comeback_resp_additional_delay 1/1 Test: GAS comeback response requesting additional delay Starting AP wlan3 PASS gas_comeback_resp_additional_delay 0.265044 2022-03-17 17:14:04.557717 passed all 1 test case(s) 2022-03-17 17:14:04 ./run-tests.py grpform_not_ready2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_not_ready2 1/1 Test: Not ready for GO Negotiation (search) wlan1: Trying to discover peer 02:00:00:00:00:00 PASS grpform_not_ready2 2.945298 2022-03-17 17:14:07.671036 passed all 1 test case(s) 2022-03-17 17:14:07 ./run-tests.py he80_csa DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he80_csa 1/1 Test: HE with 80 MHz channel width and CSA Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS he80_csa 3.660865 2022-03-17 17:14:11.498521 passed all 1 test case(s) 2022-03-17 17:14:11 ./run-tests.py he80b DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he80b 1/1 Test: HE with 80 MHz channel width (HT40- channel 40) Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS he80b 0.873758 2022-03-17 17:14:12.537980 passed all 1 test case(s) 2022-03-17 17:14:12 ./run-tests.py ieee8021x_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_proto 1/1 Test: IEEE 802.1X and EAPOL supplicant protocol testing Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan0 to AP MIB before test frames: {'dot11RSNAOptionImplemented': 'TRUE', 'dot11RSNAPreauthenticationImplemented': 'TRUE', 'dot11RSNAEnabled': 'FALSE', 'dot11RSNAPreauthenticationEnabled': 'FALSE', 'dot11RSNAConfigVersion': '1', 'dot11RSNAConfigPairwiseKeysSupported': '5', 'dot11RSNAConfigGroupCipherSize': '0', 'dot11RSNAConfigPMKLifetime': '43200', 'dot11RSNAConfigPMKReauthThreshold': '70', 'dot11RSNAConfigNumberOfPTKSAReplayCounters': '1', 'dot11RSNAConfigSATimeout': '60', 'dot11RSNAAuthenticationSuiteSelected': '00-00-00-0', 'dot11RSNAPairwiseCipherSelected': '00-0f-ac-0', 'dot11RSNAGroupCipherSelected': '00-0f-ac-0', 'dot11RSNAPMKIDUsed': '', 'dot11RSNAAuthenticationSuiteRequested': '00-00-00-0', 'dot11RSNAPairwiseCipherRequested': '00-0f-ac-0', 'dot11RSNAGroupCipherRequested': '00-0f-ac-0', 'dot11RSNAConfigNumberOfGTKSAReplayCounters': '0', 'dot11RSNA4WayHandshakeFailures': '0', 'dot1xSuppPaeState': '5', 'dot1xSuppHeldPeriod': '60', 'dot1xSuppAuthPeriod': '30', 'dot1xSuppStartPeriod': '30', 'dot1xSuppMaxStart': '3', 'dot1xSuppSuppControlledPortStatus': 'Authorized', 'dot1xSuppBackendPaeState': '2', 'dot1xSuppEapolFramesRx': '241', 'dot1xSuppEapolFramesTx': '229', 'dot1xSuppEapolStartFramesTx': '1', 'dot1xSuppEapolLogoffFramesTx': '0', 'dot1xSuppEapolRespFramesTx': '166', 'dot1xSuppEapolReqIdFramesRx': '45', 'dot1xSuppEapolReqFramesRx': '121', 'dot1xSuppInvalidEapolFramesRx': '0', 'dot1xSuppEapLengthErrorFramesRx': '0', 'dot1xSuppLastEapolFrameVersion': '2', 'dot1xSuppLastEapolFrameSource': '02:00:00:00:03:00'} MIB after test frames: {'dot11RSNAOptionImplemented': 'TRUE', 'dot11RSNAPreauthenticationImplemented': 'TRUE', 'dot11RSNAEnabled': 'FALSE', 'dot11RSNAPreauthenticationEnabled': 'FALSE', 'dot11RSNAConfigVersion': '1', 'dot11RSNAConfigPairwiseKeysSupported': '5', 'dot11RSNAConfigGroupCipherSize': '0', 'dot11RSNAConfigPMKLifetime': '43200', 'dot11RSNAConfigPMKReauthThreshold': '70', 'dot11RSNAConfigNumberOfPTKSAReplayCounters': '1', 'dot11RSNAConfigSATimeout': '60', 'dot11RSNAAuthenticationSuiteSelected': '00-00-00-0', 'dot11RSNAPairwiseCipherSelected': '00-0f-ac-0', 'dot11RSNAGroupCipherSelected': '00-0f-ac-0', 'dot11RSNAPMKIDUsed': '', 'dot11RSNAAuthenticationSuiteRequested': '00-00-00-0', 'dot11RSNAPairwiseCipherRequested': '00-0f-ac-0', 'dot11RSNAGroupCipherRequested': '00-0f-ac-0', 'dot11RSNAConfigNumberOfGTKSAReplayCounters': '0', 'dot11RSNA4WayHandshakeFailures': '0', 'dot1xSuppPaeState': '5', 'dot1xSuppHeldPeriod': '60', 'dot1xSuppAuthPeriod': '30', 'dot1xSuppStartPeriod': '30', 'dot1xSuppMaxStart': '3', 'dot1xSuppSuppControlledPortStatus': 'Authorized', 'dot1xSuppBackendPaeState': '2', 'dot1xSuppEapolFramesRx': '249', 'dot1xSuppEapolFramesTx': '229', 'dot1xSuppEapolStartFramesTx': '1', 'dot1xSuppEapolLogoffFramesTx': '0', 'dot1xSuppEapolRespFramesTx': '166', 'dot1xSuppEapolReqIdFramesRx': '45', 'dot1xSuppEapolReqFramesRx': '121', 'dot1xSuppInvalidEapolFramesRx': '2', 'dot1xSuppEapLengthErrorFramesRx': '1', 'dot1xSuppLastEapolFrameVersion': '2', 'dot1xSuppLastEapolFrameSource': '02:00:00:00:03:00'} PASS ieee8021x_proto 0.260276 2022-03-17 17:14:12.964109 passed all 1 test case(s) 2022-03-17 17:14:12 ./run-tests.py macsec_psk_br2_same_prio DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_br2_same_prio 1/1 Test: MACsec PSK (bridge; 2 devices, same mka_priority) ip link: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eth0: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether b4:96:91:2e:ca:0c brd ff:ff:ff:ff:ff:ff 3: eth1: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether b4:96:91:2e:ca:0d brd ff:ff:ff:ff:ff:ff 4: eth2: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether b4:96:91:2e:ca:0e brd ff:ff:ff:ff:ff:ff 5: eth3: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000 link/ether b4:96:91:2e:ca:0f brd ff:ff:ff:ff:ff:ff 6: wlan0: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 7: wlan1: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:01:00 brd ff:ff:ff:ff:ff:ff 8: wlan2: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:02:00 brd ff:ff:ff:ff:ff:ff 9: wlan3: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:03:00 brd ff:ff:ff:ff:ff:ff 10: wlan4: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:04:00 brd ff:ff:ff:ff:ff:ff 11: wlan5: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:05:00 brd ff:ff:ff:ff:ff:ff 12: wlan6: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:06:00 brd ff:ff:ff:ff:ff:ff 13: hwsim0: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ieee802.11/radiotap 12:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 35: brveth: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 56:73:eb:8a:aa:24 brd ff:ff:ff:ff:ff:ff 36: vethbr0@veth0: mtu 1500 qdisc noqueue master brveth state UNKNOWN mode DEFAULT group default qlen 1000 link/ether fe:33:28:5b:ea:38 brd ff:ff:ff:ff:ff:ff 37: veth0@vethbr0: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 3a:c5:44:d1:07:96 brd ff:ff:ff:ff:ff:ff 38: vethbr1@veth1: mtu 1500 qdisc noqueue master brveth state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 56:73:eb:8a:aa:24 brd ff:ff:ff:ff:ff:ff 39: veth1@vethbr1: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether c2:ea:09:65:38:d4 brd ff:ff:ff:ff:ff:ff Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_br2_same_prio 0.317347 2022-03-17 17:14:13.454110 passed all 0 test case(s) skipped 1 test case(s) 2022-03-17 17:14:13 ./run-tests.py mbo_without_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_without_pmf 1/1 Test: MBO and WPA2 without PMF Starting AP wlan3 PASS mbo_without_pmf 0.075216 2022-03-17 17:14:13.702246 passed all 1 test case(s) 2022-03-17 17:14:13 ./run-tests.py mesh_link_probe DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_link_probe 1/1 Test: Mesh link probing PASS mesh_link_probe 1.193558 2022-03-17 17:14:15.069564 passed all 1 test case(s) 2022-03-17 17:14:15 ./run-tests.py multi_ap_wps_split DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_wps_split 1/1 Test: WPS on split fronthaul and backhaul AP Starting AP wlan4 Starting AP wlan3 PASS multi_ap_wps_split 7.96831 2022-03-17 17:14:23.209034 passed all 1 test case(s) 2022-03-17 17:14:23 ./run-tests.py nfc_wps_handover_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_handover_errors 1/1 Test: WPS AP NFC handover report error cases Starting AP wlan3 PASS nfc_wps_handover_errors 0.105844 2022-03-17 17:14:23.486794 passed all 1 test case(s) 2022-03-17 17:14:23 ./run-tests.py olbc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START olbc 1/1 Test: OLBC detection Starting AP wlan3 Starting AP wlan4 Removing BSS wlan4 Waiting for OLBC state to time out PASS olbc 9.894709 2022-03-17 17:14:33.554211 passed all 1 test case(s) 2022-03-17 17:14:33 ./run-tests.py owe_limited_group_set_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START owe_limited_group_set_pmf 1/1 Test: Opportunistic Wireless Encryption and limited group set (PMF) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Association Response frame status codes: ['77', '77', '0'] PASS owe_limited_group_set_pmf 0.726231 2022-03-17 17:14:34.451770 passed all 1 test case(s) 2022-03-17 17:14:34 ./run-tests.py owe_transition_mode_mismatch2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START owe_transition_mode_mismatch2 1/1 Test: Opportunistic Wireless Encryption transition mode (mismatch 2) Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Move to OWE only mode (disable transition mode) PASS owe_transition_mode_mismatch2 0.889698 2022-03-17 17:14:35.515413 passed all 1 test case(s) 2022-03-17 17:14:35 ./run-tests.py p2ps_stale_group_removal2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_stale_group_removal2 1/1 Test: P2PS stale group removal (2) Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS p2ps_stale_group_removal2 1.803305 2022-03-17 17:14:37.485002 passed all 1 test case(s) 2022-03-17 17:14:37 ./run-tests.py proxyarp_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START proxyarp_errors 1/1 Test: ProxyARP error cases Starting AP wlan3 Connect STA wlan0 to AP Allocation failure did not trigger Traceback (most recent call last): File "./run-tests.py", line 531, in main t(dev, apdev, params) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 5345, in test_proxyarp_errors run_proxyarp_errors(dev, apdev, params) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 5405, in run_proxyarp_errors wait_fail_trigger(dev[0], "GET_ALLOC_FAIL") File "/lkp/benchmarks/hwsim/tests/hwsim/utils.py", line 50, in __exit__ raise Exception("Allocation failure did not trigger") Exception: Allocation failure did not trigger FAIL proxyarp_errors 0.719452 2022-03-17 17:14:38.371246 passed 0 test case(s) skipped 0 test case(s) failed tests: proxyarp_errors 2022-03-17 17:14:38 ./run-tests.py rrm_beacon_req_table DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_table 1/1 Test: Beacon request - beacon table mode Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Received beacon report: opclass=81 channel=1 start=0 duration=0 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 frame_body=16a03e2a6dda050064000114000372726d010882848b960c1218240301012a010432043048606c460570000000003b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00 fragment_id=0100 Received beacon report: opclass=81 channel=1 start=0 duration=0 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:04:00 antenna_id=0 parent_tsf=0 frame_body=bfa13e2a6dda0500640001040007616e6f74686572010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00 fragment_id=0100 PASS rrm_beacon_req_table 0.236005 2022-03-17 17:14:38.779773 passed all 1 test case(s) 2022-03-17 17:14:38 ./run-tests.py rrm_neighbor_rep_req_not_supported DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_neighbor_rep_req_not_supported 1/1 Test: NEIGHBOR_REP_REQUEST for AP not supporting neighbor report Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_neighbor_rep_req_not_supported 0.196965 2022-03-17 17:14:39.151887 passed all 1 test case(s) 2022-03-17 17:14:39 ./run-tests.py rrm_rep_parse_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_rep_parse_proto 1/1 Test: hostapd rrm report parsing protocol testing Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_rep_parse_proto 0.217996 2022-03-17 17:14:39.542199 passed all 1 test case(s) 2022-03-17 17:14:39 ./run-tests.py sae_proto_hostapd_ffc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_proto_hostapd_ffc 1/1 Test: SAE protocol testing with hostapd (FFC) Starting AP wlan3 PASS sae_proto_hostapd_ffc 0.149603 2022-03-17 17:14:39.863776 passed all 1 test case(s) 2022-03-17 17:14:39 ./run-tests.py sae_pwe_group_14 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pwe_group_14 1/1 Test: SAE PWE derivation options with group 14 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_pwe_group_14 0.476863 2022-03-17 17:14:40.510758 passed all 1 test case(s) 2022-03-17 17:14:40 ./run-tests.py scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan 1/1 Test: Control interface behavior on scan parameters Starting AP wlan3 Full scan Limited channel scan Passive single-channel scan Active single-channel scan Active single-channel scan on AP's operating channel PASS scan 7.592057 2022-03-17 17:14:48.275436 passed all 1 test case(s) 2022-03-17 17:14:48 ./run-tests.py scan_multi_bssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multi_bssid 1/1 Test: Scan and Multiple BSSID element Starting AP wlan3 Starting AP wlan4 AP 02:00:00:00:03:00: {'id': '108', 'bssid': '02:00:00:00:03:00', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0401', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1647537288601875', 'age': '0', 'ie': '0009746573742d7363616e010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00470100', 'flags': '[ESS]', 'ssid': 'test-scan', 'snr': '59', 'est_throughput': '65000', 'update_idx': '131', 'beacon_ie': '0009746573742d7363616e010882848b960c1218240301010504000200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00470100'} AP 02:00:00:00:04:00: {'id': '109', 'bssid': '02:00:00:00:04:00', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0401', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1647537288601875', 'age': '0', 'ie': '0009746573742d7363616e010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00470d01000a53020104000131550101', 'flags': '[ESS]', 'ssid': 'test-scan', 'snr': '59', 'est_throughput': '65000', 'update_idx': '131', 'beacon_ie': '0009746573742d7363616e010882848b960c1218240301010504000200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00470d01000a53020104000131550101'} AP 02:00:00:00:04:01: {'id': '110', 'bssid': '02:00:00:00:04:01', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0401', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1647537288601875', 'age': '0', 'ie': '000131010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550101', 'flags': '[ESS]', 'ssid': '1', 'snr': '59', 'est_throughput': '65000', 'update_idx': '131', 'beacon_ie': '000131010882848b960c1218240301010504000200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550101'} PASS scan_multi_bssid 0.280481 2022-03-17 17:14:48.723261 passed all 1 test case(s) 2022-03-17 17:14:48 ./run-tests.py sigma_dut_ap_sae DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_sae 1/1 Test: sigma_dut controlled AP with SAE Skip test case: sigma_dut not available SKIP sigma_dut_ap_sae 0.116726 2022-03-17 17:14:49.010354 passed all 0 test case(s) skipped 1 test case(s) 2022-03-17 17:14:49 ./run-tests.py sigma_dut_dpp_tcp_configurator_init_mutual DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_tcp_configurator_init_mutual 1/1 Test: sigma_dut DPP TCP Configurator as initiator with mutual authentication Skip test case: sigma_dut not available SKIP sigma_dut_dpp_tcp_configurator_init_mutual 0.074512 2022-03-17 17:14:49.257465 passed all 0 test case(s) skipped 1 test case(s) 2022-03-17 17:14:49 ./run-tests.py sigma_dut_preconfigured_profile DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_preconfigured_profile 1/1 Test: sigma_dut controlled connection using preconfigured profile Skip test case: sigma_dut not available SKIP sigma_dut_preconfigured_profile 0.076597 2022-03-17 17:14:49.507671 passed all 0 test case(s) skipped 1 test case(s) 2022-03-17 17:14:49 ./run-tests.py sigma_dut_psk_pmf_bip_gmac_256_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_psk_pmf_bip_gmac_256_mismatch 1/1 Test: sigma_dut controlled PSK+PMF association with BIP-GMAC-256 mismatch Skip test case: sigma_dut not available SKIP sigma_dut_psk_pmf_bip_gmac_256_mismatch 0.074875 2022-03-17 17:14:49.754261 passed all 0 test case(s) skipped 1 test case(s) 2022-03-17 17:14:49 ./run-tests.py sigma_dut_sae_h2e_ap_h2e DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_sae_h2e_ap_h2e 1/1 Test: sigma_dut controlled SAE H2E association (AP using H2E-only) Starting AP wlan3 Skip test case: sigma_dut not available SKIP sigma_dut_sae_h2e_ap_h2e 0.132115 2022-03-17 17:14:50.064464 passed all 0 test case(s) skipped 1 test case(s) 2022-03-17 17:14:50 ./run-tests.py sigma_dut_sae_pw_id_pwe_loop DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_sae_pw_id_pwe_loop 1/1 Test: sigma_dut controlled SAE association with Password Identifier and forced PWE looping Skip test case: sigma_dut not available SKIP sigma_dut_sae_pw_id_pwe_loop 0.076447 2022-03-17 17:14:50.317146 passed all 0 test case(s) skipped 1 test case(s) 2022-03-17 17:14:50 ./run-tests.py sta_dynamic_random_mac_addr_keep_oui DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sta_dynamic_random_mac_addr_keep_oui 1/1 Test: Dynamically added wpa_supplicant interface and random MAC address (keep OUI) Starting AP wlan3 Connect STA wlan5 to AP Connect STA wlan5 to AP PASS sta_dynamic_random_mac_addr_keep_oui 0.477506 2022-03-17 17:14:50.967177 passed all 1 test case(s) 2022-03-17 17:14:50 ./run-tests.py tnc_peap_soh DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tnc_peap_soh 1/1 Test: TNC PEAP-SoH Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS tnc_peap_soh 0.57591 2022-03-17 17:14:51.715154 passed all 1 test case(s) 2022-03-17 17:14:51 ./run-tests.py wnm_bss_transition_mgmt DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_transition_mgmt 1/1 Test: WNM BSS Transition Management Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_bss_transition_mgmt 0.194879 2022-03-17 17:14:52.082643 passed all 1 test case(s) 2022-03-17 17:14:52 ./run-tests.py wpa2_ocv_ap_override_fils_assoc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_ap_override_fils_assoc 1/1 Test: OCV on 2.4 GHz and AP override FILS association Starting AP as-erp Starting AP wlan3 Connect STA wlan0 to AP PASS wpa2_ocv_ap_override_fils_assoc 0.392809 2022-03-17 17:14:52.647251 passed all 1 test case(s) 2022-03-17 17:14:52 ./run-tests.py wps_ext_m3_missing_e_hash1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_m3_missing_e_hash1 1/1 Test: WPS proto: M3 missing E-Hash1 Starting AP wlan3 PASS wps_ext_m3_missing_e_hash1 0.273651 2022-03-17 17:14:53.095225 passed all 1 test case(s) 2022-03-17 17:14:53 ./run-tests.py wps_ext_proto_ack_m3_r_nonce_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_ack_m3_r_nonce_mismatch 1/1 Test: WPS and ACK M3 R-Nonce mismatch Starting AP wlan3 PASS wps_ext_proto_ack_m3_r_nonce_mismatch 0.342911 2022-03-17 17:14:53.612107 passed all 1 test case(s) 2022-03-17 17:14:53 ./run-tests.py wps_ext_proto_m2_no_public_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_m2_no_public_key 1/1 Test: WPS and no Public Key in M2 Starting AP wlan3 PASS wps_ext_proto_m2_no_public_key 0.26256 2022-03-17 17:14:54.045355 passed all 1 test case(s) 2022-03-17 17:14:54 ./run-tests.py wps_ext_proto_m4_invalid_pad_string DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_m4_invalid_pad_string 1/1 Test: WPS and invalid pad string in M4 Starting AP wlan3 PASS wps_ext_proto_m4_invalid_pad_string 0.255806 2022-03-17 17:14:54.475456 passed all 1 test case(s) 2022-03-17 17:14:54 ./stop.sh