2022-03-18 14:40:27 export USER=root 2022-03-18 14:40:27 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2022-03-18 14:41:14 ./start.sh 2022-03-18 14:41:15 ./run-tests.py ap_cipher_ccmp_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cipher_ccmp_256 1/1 Test: WPA2-PSK/CCMP-256 connection Starting AP wlan3 Connect STA wlan0 to AP PASS ap_cipher_ccmp_256 1.064983 2022-03-18 14:41:17.300033 passed all 1 test case(s) 2022-03-18 14:41:17 ./run-tests.py ap_cipher_gcmp_256_group_ccmp_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cipher_gcmp_256_group_ccmp_256 1/1 Test: WPA2-PSK/GCMP-256 connection with group cipher override CCMP-256 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_cipher_gcmp_256_group_ccmp_256 1.028898 2022-03-18 14:41:18.511900 passed all 1 test case(s) 2022-03-18 14:41:18 ./run-tests.py ap_cipher_replay_protection_sta_gtk_tkip DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cipher_replay_protection_sta_gtk_tkip 1/1 Test: TKIP replay protection on STA (GTK) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_cipher_replay_protection_sta_gtk_tkip 2.376755 2022-03-18 14:41:21.066139 passed all 1 test case(s) 2022-03-18 14:41:21 ./run-tests.py ap_ft_sae_h2e_rsne_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_sae_h2e_rsne_mismatch 1/1 Test: WPA2-PSK-FT-SAE AP (H2E) and RSNE mismatch Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP PASS ap_ft_sae_h2e_rsne_mismatch 1.889757 2022-03-18 14:41:23.134761 passed all 1 test case(s) 2022-03-18 14:41:23 ./run-tests.py ap_hs20_fetch_osu DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_fetch_osu 1/1 Test: Hotspot 2.0 OSU provider and icon fetch Starting AP wlan3 Starting AP wlan4 PASS ap_hs20_fetch_osu 5.56337 2022-03-18 14:41:28.876313 passed all 1 test case(s) 2022-03-18 14:41:28 ./run-tests.py ap_hs20_roam_to_higher_prio DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_roam_to_higher_prio 1/1 Test: Hotspot 2.0 and roaming from current to higher priority network Starting AP wlan3 Connect to the only network option Start another AP (home operator) and reconnect Starting AP wlan4 PASS ap_hs20_roam_to_higher_prio 2.337677 2022-03-18 14:41:31.377276 passed all 1 test case(s) 2022-03-18 14:41:31 ./run-tests.py ap_hs20_sim_provisioning DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_sim_provisioning 1/1 Test: Hotspot 2.0 AAA server behavior for SIM provisioning Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP sim_provisioning: [('907106acb983bc4c3cf4e9feaf8145f8', '232010000000000', '02:00:00:00:00:00', 'SIM', '1647614493')] PASS ap_hs20_sim_provisioning 2.393664 2022-03-18 14:41:33.934679 passed all 1 test case(s) 2022-03-18 14:41:33 ./run-tests.py ap_pmf_beacon_protection_bip DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_beacon_protection_bip 1/1 Test: WPA2-PSK Beacon protection (BIP) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP STA key: {'ifindex': 'wlan0', 'key': '557cbc4107085665bd7cea9f1aa54e4f', 'icverrors': '0', 'replays': '0', 'rx_spec': '00000000000d', 'tx_spec': '000000000000', 'algorithm': '00-0f-ac:6', 'hw_key_idx': '0', 'keyidx': '6', 'flags': '0x0', 'keylen': '16'} AP key: {'ifindex': 'wlan3', 'key': '557cbc4107085665bd7cea9f1aa54e4f', 'icverrors': '0', 'replays': '0', 'rx_spec': '000000000000', 'tx_spec': '00000000000d', 'algorithm': '00-0f-ac:6', 'hw_key_idx': '0', 'keyidx': '6', 'flags': '0x0', 'keylen': '16'} wlantest BIP counters: valid=0 invalid=0 missing=0 PASS ap_pmf_beacon_protection_bip 2.525241 2022-03-18 14:41:36.625569 passed all 1 test case(s) 2022-03-18 14:41:36 ./run-tests.py ap_pmf_negative DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_negative 1/1 Test: WPA2-PSK AP without PMF (negative test) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_pmf_negative 11.075399 2022-03-18 14:41:47.864753 passed all 1 test case(s) 2022-03-18 14:41:47 ./run-tests.py ap_pmf_optional_2akm DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_optional_2akm 1/1 Test: WPA2-PSK AP with PMF optional (2 AKMs) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_pmf_optional_2akm 1.521933 2022-03-18 14:41:49.549508 passed all 1 test case(s) 2022-03-18 14:41:49 ./run-tests.py ap_pmf_sta_sa_query_no_response_hostapd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_sta_sa_query_no_response_hostapd 1/1 Test: WPA2-PSK AP with station using SA Query and getting no response (hostapd) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_sta_sa_query_no_response_hostapd 3.664087 2022-03-18 14:41:53.379026 passed all 1 test case(s) 2022-03-18 14:41:53 ./run-tests.py ap_pmf_toggle DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_toggle 1/1 Test: WPA2-PSK AP with PMF optional and changing PMF on reassociation Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_toggle 1.778957 2022-03-18 14:41:55.321186 passed all 1 test case(s) 2022-03-18 14:41:55 ./run-tests.py ap_qosmap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_qosmap 1/1 Test: QoS mapping Starting AP wlan3 Connect STA wlan0 to AP PASS ap_qosmap 1.880143 2022-03-18 14:41:57.363659 passed all 1 test case(s) 2022-03-18 14:41:57 ./run-tests.py ap_remove_during_acs2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_remove_during_acs2 1/1 Test: Remove BSS during ACS in multi-BSS configuration Starting AP wlan3 Removing BSS wlan3 Starting AP wlan3 Removing BSS wlan3 PASS ap_remove_during_acs2 0.837576 2022-03-18 14:41:58.365316 passed all 1 test case(s) 2022-03-18 14:41:58 ./run-tests.py ap_tdls_link_status DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_tdls_link_status 1/1 Test: Check TDLS link status between two stations Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP wlan0: TDLS link status: peer does not exist wlan1: TDLS link status: peer does not exist Setup TDLS wlan0: TDLS link status: connected wlan1: TDLS link status: connected Teardown TDLS wlan0: TDLS link status: peer does not exist wlan1: TDLS link status: peer does not exist PASS ap_tdls_link_status 4.260075 2022-03-18 14:42:02.787727 passed all 1 test case(s) 2022-03-18 14:42:02 ./run-tests.py ap_vht80 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80 1/1 Test: VHT with 80 MHz channel width Starting AP wlan3 Connect STA wlan0 to AP hostapd STATUS: {'state': 'ENABLED', 'phy': 'phy3', 'freq': '5180', 'num_sta_non_erp': '0', 'num_sta_no_short_slot_time': '1', 'num_sta_no_short_preamble': '1', 'olbc': '0', 'num_sta_ht_no_gf': '0', 'num_sta_no_ht': '0', 'num_sta_ht_20_mhz': '0', 'num_sta_ht40_intolerant': '0', 'olbc_ht': '0', 'ht_op_mode': '0x0', 'cac_time_seconds': '0', 'cac_time_left_seconds': 'N/A', 'channel': '36', 'edmg_enable': '0', 'edmg_channel': '0', 'secondary_channel': '1', 'ieee80211n': '1', 'ieee80211ac': '1', 'ieee80211ax': '0', 'beacon_int': '100', 'dtim_period': '2', 'vht_oper_chwidth': '1', 'vht_oper_centr_freq_seg0_idx': '42', 'vht_oper_centr_freq_seg1_idx': '0', 'vht_caps_info': '00000000', 'rx_vht_mcs_map': 'aaaa', 'tx_vht_mcs_map': 'aaaa', 'ht_caps_info': '000e', 'ht_mcs_bitmask': 'ffff0000000000000000', 'supported_rates': '0c 12 18 24 30 48 60 6c', 'max_txpower': '23', 'bss[0]': 'wlan3', 'bssid[0]': '02:00:00:00:03:00', 'ssid[0]': 'vht', 'num_sta[0]': '1'} hostapd STA: {'addr': '02:00:00:00:00:00', 'flags': '[AUTH][ASSOC][AUTHORIZED][WMM][HT][VHT]', 'aid': '1', 'capability': '0x1', 'listen_interval': '5', 'supported_rates': '0c 12 18 24 30 48 60 6c', 'timeout_next': 'NULLFUNC POLL', 'rx_packets': '9', 'tx_packets': '5', 'rx_bytes': '3341', 'tx_bytes': '1770', 'inactive_msec': '12', 'signal': '-27', 'rx_rate_info': '130 vhtmcs 1 vhtnss 1', 'tx_rate_info': '130 vhtmcs 0 vhtnss 2', 'rx_vht_mcs_map': 'aaaa', 'tx_vht_mcs_map': 'aaaa', 'ht_mcs_bitmask': 'ffff0000000000000000', 'connected_time': '0', 'supp_op_classes': '80515354737475767778797a7b808182', 'vht_caps_info': '0x038004fa', 'ht_caps_info': '0x107e', 'ext_capab': '04004a8201404040000120'} Country code at the end: 00 PASS ap_vht80 1.979377 2022-03-18 14:42:04.929277 passed all 1 test case(s) 2022-03-18 14:42:04 ./run-tests.py ap_vht80d DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80d 1/1 Test: VHT with 80 MHz channel width (HT40- channel 48) Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS ap_vht80d 1.921796 2022-03-18 14:42:07.013496 passed all 1 test case(s) 2022-03-18 14:42:07 ./run-tests.py ap_vht_40_fallback_to_20 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht_40_fallback_to_20 1/1 Test: VHT and 40 MHz channel configuration falling back to 20 MHz Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS ap_vht_40_fallback_to_20 1.695117 2022-03-18 14:42:08.873294 passed all 1 test case(s) 2022-03-18 14:42:08 ./run-tests.py ap_vlan_file_open2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_file_open2 1/1 Test: AP VLAN with open network and vlan_file mapping (2) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP dev1->dev2 unicast data delivery failed Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vlan.py", line 77, in test_ap_vlan_file_open2 hwsim_utils.test_connectivity_iface(dev[0], hapd, "brvlan1") File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 202, in test_connectivity_iface max_tries=max_tries, timeout=timeout) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev1->dev2 unicast data delivery failed FAIL ap_vlan_file_open2 7.296811 2022-03-18 14:42:16.334599 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_vlan_file_open2 2022-03-18 14:42:16 ./run-tests.py ap_vlan_iface_cleanup_multibss_per_sta_vif DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_iface_cleanup_multibss_per_sta_vif 1/1 Test: AP VLAN operation in multi-BSS multi-VLAN case with per-sta-vif set Skip test case: python module netifaces not available SKIP ap_vlan_iface_cleanup_multibss_per_sta_vif 0.085182 2022-03-18 14:42:16.586302 passed all 0 test case(s) skipped 1 test case(s) 2022-03-18 14:42:16 ./run-tests.py ap_vlan_sae DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_sae 1/1 Test: AP VLAN based on SAE Password Identifier Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP dev1->dev2 unicast data delivery failed Traceback (most recent call last): File "./run-tests.py", line 531, in main t(dev, apdev, params) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vlan.py", line 804, in test_ap_vlan_sae hwsim_utils.test_connectivity_iface(dev[0], hapd, "brvlan1") File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 202, in test_connectivity_iface max_tries=max_tries, timeout=timeout) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev1->dev2 unicast data delivery failed FAIL ap_vlan_sae 7.273098 2022-03-18 14:42:24.021301 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_vlan_sae 2022-03-18 14:42:24 ./run-tests.py ap_wpa2_eap_aka_prime_sql DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_aka_prime_sql 1/1 Test: WPA2-Enterprise connection using EAP-AKA' (SQL) Starting AP wlan3 Connect STA wlan0 to AP AKA' fast re-authentication AKA' full auth with pseudonym AKA' full auth with permanent identity AKA' reauth with mismatching k_aut Connect STA wlan0 to AP AKA' reauth with mismatching counter Connect STA wlan0 to AP AKA' reauth with max reauth count reached PASS ap_wpa2_eap_aka_prime_sql 1.823869 2022-03-18 14:42:26.009759 passed all 1 test case(s) 2022-03-18 14:42:26 ./run-tests.py ap_wpa2_eap_peap_eap_aka DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_peap_eap_aka 1/1 Test: WPA2-Enterprise connection using EAP-PEAP/EAP-AKA Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_peap_eap_aka 1.039891 2022-03-18 14:42:27.214139 passed all 1 test case(s) 2022-03-18 14:42:27 ./run-tests.py ap_wpa2_eap_sim_no_change_set DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_sim_no_change_set 1/1 Test: EAP-SIM and external GSM auth to check fast reauth with no-change SET_NETWORK Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_sim_no_change_set 1.097564 2022-03-18 14:42:28.475041 passed all 1 test case(s) 2022-03-18 14:42:28 ./run-tests.py ap_wpa2_eap_tls_intermediate_ca DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_intermediate_ca 1/1 Test: EAP-TLS with intermediate server/user CA Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_intermediate_ca 0.96181 2022-03-18 14:42:29.604525 passed all 1 test case(s) 2022-03-18 14:42:29 ./run-tests.py ap_wpa2_eap_ttls_eap_gtc_no_password DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_eap_gtc_no_password 1/1 Test: WPA2-Enterprise connection using EAP-TTLS/EAP-GTC - no password Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_eap_gtc_no_password 1.294151 2022-03-18 14:42:31.073632 passed all 1 test case(s) 2022-03-18 14:42:31 ./run-tests.py ap_wpa2_eap_ttls_eap_md5_incorrect_password DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_eap_md5_incorrect_password 1/1 Test: WPA2-Enterprise connection using EAP-TTLS/EAP-MD5 - incorrect password Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_eap_md5_incorrect_password 1.029935 2022-03-18 14:42:32.274050 passed all 1 test case(s) 2022-03-18 14:42:32 ./run-tests.py ap_wpa2_igtk_initial_rsc_aes_128_cmac DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_igtk_initial_rsc_aes_128_cmac 1/1 Test: Initial management group cipher RSC (AES-128-CMAC) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_igtk_initial_rsc_aes_128_cmac 2.006486 2022-03-18 14:42:34.446006 passed all 1 test case(s) 2022-03-18 14:42:34 ./run-tests.py ap_wps_appl_ext DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_appl_ext 1/1 Test: WPS Application Extension attribute Starting AP wlan3 PASS ap_wps_appl_ext 1.528917 2022-03-18 14:42:36.137934 passed all 1 test case(s) 2022-03-18 14:42:36 ./run-tests.py ap_wps_m2_missing_enrollee_nonce DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_m2_missing_enrollee_nonce 1/1 Test: WPS and M2 without Enrollee Nonce Starting AP wlan3 PASS ap_wps_m2_missing_enrollee_nonce 1.184746 2022-03-18 14:42:37.486914 passed all 1 test case(s) 2022-03-18 14:42:37 ./run-tests.py ap_wps_m5_no_random DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_m5_no_random 1/1 Test: WPS and no random for M5 on STA Starting AP wlan3 PASS ap_wps_m5_no_random 1.193134 2022-03-18 14:42:38.844263 passed all 1 test case(s) 2022-03-18 14:42:38 ./run-tests.py ap_wps_per_station_psk_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_per_station_psk_failure 1/1 Test: WPS PBC provisioning with per-station PSK (file not writable) Starting AP wlan3 First enrollee Second enrollee External registrar Verifying PSK results PASS ap_wps_per_station_psk_failure 3.617698 2022-03-18 14:42:42.626088 passed all 1 test case(s) 2022-03-18 14:42:42 ./run-tests.py ap_wps_reg_connect DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_reg_connect 1/1 Test: WPS registrar using AP PIN to connect Starting AP wlan3 WPS provisioning step PASS ap_wps_reg_connect 1.519395 2022-03-18 14:42:44.309123 passed all 1 test case(s) 2022-03-18 14:42:44 ./run-tests.py authsrv_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START authsrv_oom 1/1 Test: Authentication server OOM Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS authsrv_oom 6.974327 2022-03-18 14:42:51.446378 passed all 1 test case(s) 2022-03-18 14:42:51 ./run-tests.py autogo_pbc_session_overlap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_pbc_session_overlap 1/1 Test: P2P autonomous GO and PBC session overlap Starting AP wlan3 Start autonomous GO wlan0 wlan1: Trying to discover peer 02:00:00:00:00:00 PASS autogo_pbc_session_overlap 7.237238 2022-03-18 14:42:58.847140 passed all 1 test case(s) 2022-03-18 14:42:58 ./run-tests.py discovery_long_listen2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START discovery_long_listen2 1/1 Test: Long P2P_LISTEN longer than remain-on-channel time wlan0: Trying to discover peer 42:00:00:00:07:00 PASS discovery_long_listen2 7.739674 2022-03-18 14:43:06.750846 passed all 1 test case(s) 2022-03-18 14:43:06 ./run-tests.py dpp_auto_connect_legacy_sae_1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_auto_connect_legacy_sae_1 1/1 Test: DPP and auto connect (legacy SAE) Starting AP wlan3 PASS dpp_auto_connect_legacy_sae_1 8.543493 2022-03-18 14:43:15.458249 passed all 1 test case(s) 2022-03-18 14:43:15 ./run-tests.py dpp_configurator_enrollee_brainpoolP512r1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_configurator_enrollee_brainpoolP512r1 1/1 Test: DPP Configurator enrolling (brainpoolP512r1) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_configurator_enrollee_brainpoolP512r1 2.158727 2022-03-18 14:43:17.780210 passed all 1 test case(s) 2022-03-18 14:43:17 ./run-tests.py dpp_keygen_configurator_error DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_keygen_configurator_error 1/1 Test: DPP Configurator keygen error case PASS dpp_keygen_configurator_error 0.081275 2022-03-18 14:43:18.024603 passed all 1 test case(s) 2022-03-18 14:43:18 ./run-tests.py dpp_pkex_after_retry DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_after_retry 1/1 Test: DPP and PKEX completing after retry PASS dpp_pkex_after_retry 2.155073 2022-03-18 14:43:20.342734 passed all 1 test case(s) 2022-03-18 14:43:20 ./run-tests.py dpp_pkex_config DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_config 1/1 Test: DPP and PKEX with initiator as the configurator PASS dpp_pkex_config 2.181275 2022-03-18 14:43:22.686468 passed all 1 test case(s) 2022-03-18 14:43:22 ./run-tests.py dpp_proto_auth_resp_no_r_nonce DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_resp_no_r_nonce 1/1 Test: DPP protocol testing - no R-nonce in Auth Resp PASS dpp_proto_auth_resp_no_r_nonce 2.239671 2022-03-18 14:43:25.089668 passed all 1 test case(s) 2022-03-18 14:43:25 ./run-tests.py dpp_proto_pkex_exchange_req_invalid_encrypted_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_pkex_exchange_req_invalid_encrypted_key 1/1 Test: DPP protocol testing - invalid Encrypted Key in PKEX Exchange Request PASS dpp_proto_pkex_exchange_req_invalid_encrypted_key 2.137031 2022-03-18 14:43:27.392509 passed all 1 test case(s) 2022-03-18 14:43:27 ./run-tests.py dpp_proto_stop_at_auth_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_stop_at_auth_req 1/1 Test: DPP protocol testing - stop when receiving Auth Req PASS dpp_proto_stop_at_auth_req 4.136064 2022-03-18 14:43:31.693078 passed all 1 test case(s) 2022-03-18 14:43:31 ./run-tests.py dpp_qr_code_chan_list_unicast2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_chan_list_unicast2 1/1 Test: DPP QR Code and 2.4 GHz channels (unicast 2) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_chan_list_unicast2 1.844277 2022-03-18 14:43:33.702599 passed all 1 test case(s) 2022-03-18 14:43:33 ./run-tests.py dpp_qr_code_config_event_initiator DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_config_event_initiator 1/1 Test: DPP QR Code and config event on Configurator Initiator PASS dpp_qr_code_config_event_initiator 2.161246 2022-03-18 14:43:36.021567 passed all 1 test case(s) 2022-03-18 14:43:36 ./run-tests.py dpp_qr_code_curve_prime256v1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_curve_prime256v1 1/1 Test: DPP QR Code and curve prime256v1 dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_curve_prime256v1 2.132711 2022-03-18 14:43:38.317940 passed all 1 test case(s) 2022-03-18 14:43:38 ./run-tests.py dpp_tcp_pkex_while_associated_conn_status DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_tcp_pkex_while_associated_conn_status 1/1 Test: DPP/PKEXv2 over TCP while associated (conn status) Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Skip test case: DPP version 3 not supported SKIP dpp_tcp_pkex_while_associated_conn_status 1.43105 2022-03-18 14:43:39.915371 passed all 0 test case(s) skipped 1 test case(s) 2022-03-18 14:43:39 ./run-tests.py dpp_with_p2p_device DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_with_p2p_device 1/1 Test: DPP exchange when driver uses a separate P2P Device interface PASS dpp_with_p2p_device 7.458564 2022-03-18 14:43:47.537639 passed all 1 test case(s) 2022-03-18 14:43:47 ./run-tests.py eap_teap_basic_password_auth_user_and_machine_fail_user DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_basic_password_auth_user_and_machine_fail_user 1/1 Test: EAP-TEAP with Basic-Password-Auth using user and machine credentials (fail user) Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_basic_password_auth_user_and_machine_fail_user 0.967778 2022-03-18 14:43:48.672559 passed all 1 test case(s) 2022-03-18 14:43:48 ./run-tests.py eap_tls_no_session_resumption DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_tls_no_session_resumption 1/1 Test: EAP-TLS session resumption disabled on server Starting AP wlan3 Connect STA wlan0 to AP PASS eap_tls_no_session_resumption 0.992385 2022-03-18 14:43:49.830924 passed all 1 test case(s) 2022-03-18 14:43:49 ./run-tests.py eap_tls_pkcs8_pkcs5_v2_des3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_tls_pkcs8_pkcs5_v2_des3 1/1 Test: WPA2-Enterprise connection using EAP-TLS and PKCS #8, PKCS #5 v2 DES3 key Starting AP wlan3 Connect STA wlan0 to AP PASS eap_tls_pkcs8_pkcs5_v2_des3 0.999589 2022-03-18 14:43:50.994496 passed all 1 test case(s) 2022-03-18 14:43:51 ./run-tests.py fils_and_ft_over_air_sha384 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_and_ft_over_air_sha384 1/1 Test: FILS SK using ERP and FT-over-air (SHA384) Starting AP as-erp Set up ERP key hierarchy without FILS/FT authentication Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP Initial mobility domain association using FILS authentication Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) FT protocol using FT key hierarchy established during FILS authentication FT protocol using the previously established FT key hierarchy from FILS authentication PASS fils_and_ft_over_air_sha384 4.30363 2022-03-18 14:43:55.465314 passed all 1 test case(s) 2022-03-18 14:43:55 ./run-tests.py fst_ap_initiate_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_initiate_session 1/1 Test: FST AP initiate session Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Session initiated PASS fst_ap_initiate_session 2.455509 2022-03-18 14:43:58.085099 passed all 1 test case(s) 2022-03-18 14:43:58 ./run-tests.py fst_ap_initiate_session_response_with_bad_stie DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_initiate_session_response_with_bad_stie 1/1 Test: FST AP initiate session - response with bad stie Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (Response with bad st ie) PASS fst_ap_initiate_session_response_with_bad_stie 2.36329 2022-03-18 14:44:00.616433 passed all 1 test case(s) 2022-03-18 14:44:00 ./run-tests.py fst_ap_start_session_bad_new_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_start_session_bad_new_iface 1/1 Test: FST AP start session - bad new iface Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (New interface name) PASS fst_ap_start_session_bad_new_iface 2.402311 2022-03-18 14:44:03.182542 passed all 1 test case(s) 2022-03-18 14:44:03 ./run-tests.py fst_disconnect_fst_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_disconnect_fst_sta 1/1 Test: FST disconnect FST STA Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan0 to AP PASS fst_disconnect_fst_sta 8.371212 2022-03-18 14:44:11.718983 passed all 1 test case(s) 2022-03-18 14:44:11 ./run-tests.py fst_sta_config_pri_neg DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_config_pri_neg 1/1 Test: FST STA configuration Priority negative kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - try again after a second kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - could not kill the process PASS fst_sta_config_pri_neg 1.303318 2022-03-18 14:44:13.180697 passed all 1 test case(s) 2022-03-18 14:44:13 ./run-tests.py grpform_no_5ghz_add_cli3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_no_5ghz_add_cli3 1/1 Test: P2P group formation with passive scan 5 GHz and p2p_add_cli_chan=1 (intent 15) Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS grpform_no_5ghz_add_cli3 2.92752 2022-03-18 14:44:16.271560 passed all 1 test case(s) 2022-03-18 14:44:16 ./run-tests.py hapd_ctrl_eapol_relog DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_eapol_relog 1/1 Test: hostapd and RELOG Starting AP wlan3 PASS hapd_ctrl_eapol_relog 0.528407 2022-03-18 14:44:16.963153 passed all 1 test case(s) 2022-03-18 14:44:16 ./run-tests.py ibss_5ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_5ghz 1/1 Test: IBSS on 5 GHz band wlan0 waiting for IBSS start/join to complete wlan1 waiting for IBSS start/join to complete PASS ibss_5ghz 13.034635 2022-03-18 14:44:30.161655 passed all 1 test case(s) 2022-03-18 14:44:30 ./run-tests.py ieee8021x_reauth_wep DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_reauth_wep 1/1 Test: IEEE 802.1X and EAPOL_REAUTH request with WEP Starting AP wlan3 Connect STA wlan0 to AP num_eapol_key: 4 num_eap_req: 6 num_eap_resp: 6 PASS ieee8021x_reauth_wep 1.655683 2022-03-18 14:44:31.983213 passed all 1 test case(s) 2022-03-18 14:44:32 ./run-tests.py mbo_assoc_disallow_ignore DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_assoc_disallow_ignore 1/1 Test: MBO and ignoring disallowed association Starting AP wlan3 Connect STA wlan0 to AP PASS mbo_assoc_disallow_ignore 2.379324 2022-03-18 14:44:34.522222 passed all 1 test case(s) 2022-03-18 14:44:34 ./run-tests.py mscs_pre_assoc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mscs_pre_assoc 1/1 Test: MSCS configuration pre-association Starting AP wlan3 Connect STA wlan0 to AP PASS mscs_pre_assoc 1.913778 2022-03-18 14:44:36.601341 passed all 1 test case(s) 2022-03-18 14:44:36 ./run-tests.py ocv_sa_query DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ocv_sa_query 1/1 Test: Test SA Query with OCV Starting AP wlan3 Connect STA wlan0 to AP PASS ocv_sa_query 4.114686 2022-03-18 14:44:40.880017 passed all 1 test case(s) 2022-03-18 14:44:40 ./run-tests.py p2ps_many_services_in_probe DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_many_services_in_probe 1/1 Test: P2PS with large number of services in Probe Request/Response PASS p2ps_many_services_in_probe 0.571723 2022-03-18 14:44:41.620728 passed all 1 test case(s) 2022-03-18 14:44:41 ./run-tests.py pasn_fils_sha256_kdk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_fils_sha256_kdk 1/1 Test: Station authentication with FILS-SHA256 with KDK derivation during connection Starting AP as-erp Starting AP wlan3 Connect STA wlan0 to AP sta: TK: 3e17ae908e3f5b445e345e2e77c2f9e6 KDK: ebde2d736536e8d9989d9607b18c588c3ac6d336aa76a857bf12daab778b2ce5 ap : TK: 3e17ae908e3f5b445e345e2e77c2f9e6 KDK: ebde2d736536e8d9989d9607b18c588c3ac6d336aa76a857bf12daab778b2ce5 sta: TK: f29d0d3a9f0177beaba0ab4477062554 KDK: 4c071e74f9789886211e0fddd081e11526709655fe3c61545e3572191250bce5 ap : TK: f29d0d3a9f0177beaba0ab4477062554 KDK: 4c071e74f9789886211e0fddd081e11526709655fe3c61545e3572191250bce5 PASS pasn_fils_sha256_kdk 1.415483 2022-03-18 14:44:43.199772 passed all 1 test case(s) 2022-03-18 14:44:43 ./run-tests.py pasn_ft_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_ft_psk 1/1 Test: PASN authentication with FT-PSK Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:03:00 2412 -30 [WPA2-FT/PSK-CCMP][ESS] test-pasn-ft-psk 02:00:00:00:04:00 2412 -30 [WPA2-FT/PSK-CCMP][ESS] test-pasn-ft-psk sta: TK: 35ab34ef436eee33efe274ef7455a1e5 KDK: ap : TK: 35ab34ef436eee33efe274ef7455a1e5 KDK: Connect to first AP Connect STA wlan0 to AP Roam to the second AP flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:04:00 2412 -30 [WPA2-FT/PSK-CCMP][ESS] test-pasn-ft-psk 02:00:00:00:03:00 2412 -30 [WPA2-FT/PSK-CCMP][ESS] test-pasn-ft-psk sta: TK: 50ae4e9f4347b244884c1103bec90e2b KDK: ap : TK: 50ae4e9f4347b244884c1103bec90e2b KDK: PASS pasn_ft_psk 5.023366 2022-03-18 14:44:48.386547 passed all 1 test case(s) 2022-03-18 14:44:48 ./run-tests.py persistent_group3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START persistent_group3 1/1 Test: P2P persistent group formation and re-invocation with empty BSS table Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group Re-invoke persistent group from client wlan1: Trying to discover peer 02:00:00:00:00:00 Terminate persistent group Re-invoke persistent group from GO wlan0: Trying to discover peer 02:00:00:00:01:00 Terminate persistent group PASS persistent_group3 6.863019 2022-03-18 14:44:55.409067 passed all 1 test case(s) 2022-03-18 14:44:55 ./run-tests.py rrm_ftm_range_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_ftm_range_req 1/1 Test: hostapd FTM range request command Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP Connect STA wlan1 to AP PASS rrm_ftm_range_req 1.612033 2022-03-18 14:44:57.185445 passed all 1 test case(s) 2022-03-18 14:44:57 ./run-tests.py sae_bignum_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_bignum_failure 1/1 Test: SAE and bignum failure Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_bignum_failure 3.755901 2022-03-18 14:45:01.108113 passed all 1 test case(s) 2022-03-18 14:45:01 ./run-tests.py sae_pk_confirm_immediate DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pk_confirm_immediate 1/1 Test: SAE-PK with immediate confirm on AP Starting AP wlan3 Connect STA wlan0 to AP PASS sae_pk_confirm_immediate 1.089418 2022-03-18 14:45:02.362799 passed all 1 test case(s) 2022-03-18 14:45:02 ./run-tests.py sae_pwe_group_19 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pwe_group_19 1/1 Test: SAE PWE derivation options with group 19 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_pwe_group_19 1.718299 2022-03-18 14:45:04.245578 passed all 1 test case(s) 2022-03-18 14:45:04 ./run-tests.py scan_chan_switch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_chan_switch 1/1 Test: Scanning and AP changing channels Starting AP wlan3 AP channel switch while not connected AP channel switch while connected Connect STA wlan0 to AP PASS scan_chan_switch 4.276121 2022-03-18 14:45:08.685530 passed all 1 test case(s) 2022-03-18 14:45:08 ./run-tests.py sigma_dut_ap_sae_pw_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_sae_pw_id 1/1 Test: sigma_dut controlled AP with SAE Password Identifier Skip test case: sigma_dut not available SKIP sigma_dut_ap_sae_pw_id 0.147817 2022-03-18 14:45:08.997538 passed all 0 test case(s) skipped 1 test case(s) 2022-03-18 14:45:09 ./run-tests.py sigma_dut_dpp_qr_init_configurator_mud_url_nak_change DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_init_configurator_mud_url_nak_change 1/1 Test: sigma_dut DPP/QR initiator as Configurator (MUD URL, NAK change) Skip test case: DPP version 3 not supported SKIP sigma_dut_dpp_qr_init_configurator_mud_url_nak_change 0.084825 2022-03-18 14:45:09.249611 passed all 0 test case(s) skipped 1 test case(s) 2022-03-18 14:45:09 ./run-tests.py ssid_1_octet DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ssid_1_octet 1/1 Test: SSID with one octet Starting AP wlan3 Connect STA wlan0 to AP PASS ssid_1_octet 0.942645 2022-03-18 14:45:10.355366 passed all 1 test case(s) 2022-03-18 14:45:10 ./run-tests.py sta_dynamic_random_mac_addr DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sta_dynamic_random_mac_addr 1/1 Test: Dynamically added wpa_supplicant interface and random MAC address Starting AP wlan3 Connect STA wlan5 to AP Connect STA wlan5 to AP PASS sta_dynamic_random_mac_addr 2.398352 2022-03-18 14:45:12.918319 passed all 1 test case(s) 2022-03-18 14:45:12 ./run-tests.py tspec_protocol DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tspec_protocol 1/1 Test: Protocol tests for addts/delts Starting AP wlan3 Connect STA wlan0 to AP PASS tspec_protocol 1.99247 2022-03-18 14:45:15.076248 passed all 1 test case(s) 2022-03-18 14:45:15 ./run-tests.py wext_wep_open_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wext_wep_open_auth 1/1 Test: WEP Open System authentication Starting AP wlan3 Connect STA wlan5 to AP PASS wext_wep_open_auth 5.445176 2022-03-18 14:45:20.685560 passed all 1 test case(s) 2022-03-18 14:45:20 ./run-tests.py wpa2_ocv_auto_enable_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_auto_enable_pmf 1/1 Test: OCV on 2.4 GHz with PMF getting enabled automatically Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS wpa2_ocv_auto_enable_pmf 1.411511 2022-03-18 14:45:22.264435 passed all 1 test case(s) 2022-03-18 14:45:22 ./run-tests.py wpas_ctrl_bss_current DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_bss_current 1/1 Test: wpa_supplicant BSS CURRENT command Starting AP wlan3 Connect STA wlan0 to AP PASS wpas_ctrl_bss_current 0.909524 2022-03-18 14:45:23.339575 passed all 1 test case(s) 2022-03-18 14:45:23 ./run-tests.py wpas_ctrl_country DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_country 1/1 Test: wpa_supplicant SET/GET country code PASS wpas_ctrl_country 0.309271 2022-03-18 14:45:23.811778 passed all 1 test case(s) 2022-03-18 14:45:23 ./run-tests.py wpas_mesh_ctrl DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_mesh_ctrl 1/1 Test: wpa_supplicant ctrl_iface mesh command error cases PASS wpas_mesh_ctrl 0.081165 2022-03-18 14:45:24.055991 passed all 1 test case(s) 2022-03-18 14:45:24 ./run-tests.py wps_config_methods DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_config_methods 1/1 Test: WPS config method update PASS wps_config_methods 0.276051 2022-03-18 14:45:24.495619 passed all 1 test case(s) 2022-03-18 14:45:24 ./run-tests.py wps_ext_m3_m1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_m3_m1 1/1 Test: WPS proto: M3 replaced with M1 Starting AP wlan3 PASS wps_ext_m3_m1 1.085426 2022-03-18 14:45:25.746517 passed all 1 test case(s) 2022-03-18 14:45:25 ./run-tests.py wps_ext_wsc_done_no_msg_type DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_wsc_done_no_msg_type 1/1 Test: WPS proto: invalid WSC_Done Starting AP wlan3 PASS wps_ext_wsc_done_no_msg_type 1.114461 2022-03-18 14:45:27.025611 passed all 1 test case(s) 2022-03-18 14:45:27 ./stop.sh