2021-01-12 17:03:01 export USER=root 2021-01-12 17:03:01 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2021-01-12 17:03:40 ./start.sh 2021-01-12 17:03:40 ./run-tests.py ap_acl_accept DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_acl_accept 1/1 Test: MAC ACL accept list Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan1 to AP Connect STA wlan0 to AP PASS ap_acl_accept 2.587891 2021-01-12 17:03:44.319604 passed all 1 test case(s) 2021-01-12 17:03:44 ./run-tests.py ap_acs_vht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_acs_vht 1/1 Test: Automatic channel selection for VHT Starting AP wlan3 Removing BSS wlan3 Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS ap_acs_vht 8.917837 2021-01-12 17:03:53.374450 passed all 1 test case(s) 2021-01-12 17:03:53 ./run-tests.py ap_acs_with_fallback_to_20 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_acs_with_fallback_to_20 1/1 Test: Automatic channel selection with fallback to 20 MHz Starting AP wlan3 Removing BSS wlan3 Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP SIGNAL_POLL: ['RSSI=-30', 'LINKSPEED=39', 'NOISE=-92', 'FREQUENCY=2437', 'WIDTH=20 MHz', 'CENTER_FRQ1=2437', 'AVG_RSSI=-30', 'AVG_BEACON_RSSI=-30'] PASS ap_acs_with_fallback_to_20 10.388049 2021-01-12 17:04:03.892402 passed all 1 test case(s) 2021-01-12 17:04:03 ./run-tests.py ap_cipher_tkip_countermeasures_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cipher_tkip_countermeasures_sta 1/1 Test: WPA-PSK/TKIP countermeasures (detected by STA) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_cipher_tkip_countermeasures_sta 2.877763 2021-01-12 17:04:06.896357 passed all 1 test case(s) 2021-01-12 17:04:06 ./run-tests.py ap_fragmentation_wpa2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_fragmentation_wpa2 1/1 Test: WPA2-PSK AP with fragmentation threshold Starting AP wlan3 Connect STA wlan0 to AP PASS ap_fragmentation_wpa2 1.186196 2021-01-12 17:04:08.213919 passed all 1 test case(s) 2021-01-12 17:04:08 ./run-tests.py ap_ft_ap_oom7a DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_ap_oom7a 1/1 Test: WPA2-PSK-FT and AP OOM 7a Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS ap_ft_ap_oom7a 1.656205 2021-01-12 17:04:09.994916 passed all 1 test case(s) 2021-01-12 17:04:10 ./run-tests.py ap_ft_mismatching_r0kh_id_pull_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_mismatching_r0kh_id_pull_eap 1/1 Test: WPA2-EAP-FT AP over DS with mismatching R0KH-ID (pull) Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS ap_ft_mismatching_r0kh_id_pull_eap 2.295692 2021-01-12 17:04:12.415276 passed all 1 test case(s) 2021-01-12 17:04:12 ./run-tests.py ap_ft_mismatching_rrb_key_push_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_mismatching_rrb_key_push_eap 1/1 Test: WPA2-EAP-FT AP over DS with mismatching RRB key (push) Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP PASS ap_ft_mismatching_rrb_key_push_eap 2.256614 2021-01-12 17:04:14.797819 passed all 1 test case(s) 2021-01-12 17:04:14 ./run-tests.py ap_ft_pmf_bip_cmac_128_over_ds DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_pmf_bip_cmac_128_over_ds 1/1 Test: WPA2-PSK-FT AP over DS with PMF/BIP-CMAC-128 Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_pmf_bip_cmac_128_over_ds 2.593756 2021-01-12 17:04:17.517185 passed all 1 test case(s) 2021-01-12 17:04:17 ./run-tests.py ap_ft_pmf_required_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_pmf_required_mismatch 1/1 Test: WPA2-PSK-FT AP with PMF required on STA but AP2 not enabling PMF Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP PASS ap_ft_pmf_required_mismatch 2.274394 2021-01-12 17:04:19.916480 passed all 1 test case(s) 2021-01-12 17:04:19 ./run-tests.py ap_hs20_fetch_osu_no_icon DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_fetch_osu_no_icon 1/1 Test: Hotspot 2.0 OSU provider and no icon found Starting AP wlan3 PASS ap_hs20_fetch_osu_no_icon 4.821083 2021-01-12 17:04:24.865337 passed all 1 test case(s) 2021-01-12 17:04:24 ./run-tests.py ap_hs20_no_rsn_connect DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_no_rsn_connect 1/1 Test: Hotspot 2.0 and connect attempt without RSN Starting AP wlan3 PASS ap_hs20_no_rsn_connect 0.544261 2021-01-12 17:04:25.540429 passed all 1 test case(s) 2021-01-12 17:04:25 ./run-tests.py ap_ht40_5ghz_switch2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht40_5ghz_switch2 1/1 Test: HT40 co-ex scan on 5 GHz switching pri/sec channel (2) Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht40_5ghz_switch2 3.532138 2021-01-12 17:04:29.203801 passed all 1 test case(s) 2021-01-12 17:04:29 ./run-tests.py ap_open_country_indoor DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_country_indoor 1/1 Test: AP with open mode and indoor country code Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS ap_open_country_indoor 1.206717 2021-01-12 17:04:30.536874 passed all 1 test case(s) 2021-01-12 17:04:30 ./run-tests.py ap_open_ps_mc_buf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_ps_mc_buf 1/1 Test: Multicast buffering with a station in power save Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_ps_mc_buf 1.403615 2021-01-12 17:04:32.066152 passed all 1 test case(s) 2021-01-12 17:04:32 ./run-tests.py ap_open_reconnect_on_inactivity_disconnect DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_reconnect_on_inactivity_disconnect 1/1 Test: Reconnect to open mode AP after inactivity related disconnection Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_reconnect_on_inactivity_disconnect 1.01861 2021-01-12 17:04:33.210279 passed all 1 test case(s) 2021-01-12 17:04:33 ./run-tests.py ap_vht160_no_dfs_108_plus DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht160_no_dfs_108_plus 1/1 Test: VHT with 160 MHz channel width and no DFS (108 plus) Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS ap_vht160_no_dfs_108_plus 1.769496 2021-01-12 17:04:35.103518 passed all 1 test case(s) 2021-01-12 17:04:35 ./run-tests.py ap_vlan_reconnect DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_reconnect 1/1 Test: AP VLAN with WPA2-PSK connect, disconnect, connect Starting AP wlan3 connect sta Connect STA wlan0 to AP disconnect sta reconnect sta Connect STA wlan0 to AP PASS ap_vlan_reconnect 2.495426 2021-01-12 17:04:37.725236 passed all 1 test case(s) 2021-01-12 17:04:37 ./run-tests.py ap_vlan_tagged DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_tagged 1/1 Test: AP VLAN with tagged interface Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_vlan_tagged 2.956594 2021-01-12 17:04:40.806860 passed all 1 test case(s) 2021-01-12 17:04:40 ./run-tests.py ap_wep_to_wpa DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wep_to_wpa 1/1 Test: WEP to WPA2-PSK configuration change in hostapd Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wep_to_wpa 1.809634 2021-01-12 17:04:42.743905 passed all 1 test case(s) 2021-01-12 17:04:42 ./run-tests.py ap_wpa2_eap_peap_params DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_peap_params 1/1 Test: WPA2-Enterprise connection using EAP-PEAPv0/EAP-MSCHAPv2 and various parameters Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wpa2_eap_peap_params 5.037648 2021-01-12 17:04:47.907896 passed all 1 test case(s) 2021-01-12 17:04:47 ./run-tests.py ap_wpa2_eap_sake DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_sake 1/1 Test: WPA2-Enterprise connection using EAP-SAKE Starting AP wlan3 Connect STA wlan0 to AP Negative test with incorrect password Connect STA wlan0 to AP PASS ap_wpa2_eap_sake 1.092039 2021-01-12 17:04:49.123784 passed all 1 test case(s) 2021-01-12 17:04:49 ./run-tests.py ap_wpa2_eap_tls_blob DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_blob 1/1 Test: WPA2-Enterprise connection using EAP-TLS and config blobs Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_blob 0.80174 2021-01-12 17:04:50.050923 passed all 1 test case(s) 2021-01-12 17:04:50 ./run-tests.py ap_wpa2_eap_tls_ocsp_key_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_ocsp_key_id 1/1 Test: EAP-TLS and OCSP certificate signed OCSP response using key ID openssl ocsp -index auth_serv/index.txt -rsigner auth_serv/ocsp-responder.pem -rkey auth_serv/ocsp-responder.key -resp_key_id -CA auth_serv/ca.pem -issuer auth_serv/ca.pem -verify_other auth_serv/ca.pem -trust_other -ndays 7 -reqin auth_serv/ocsp-req.der -respout logs/current/ocsp-server-cache-key-id.der openssl result: Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_ocsp_key_id 0.833783 2021-01-12 17:04:51.009856 passed all 1 test case(s) 2021-01-12 17:04:51 ./run-tests.py ap_wpa2_eap_tls_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_oom 1/1 Test: EAP-TLS and OOM Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_oom 1.617554 2021-01-12 17:04:52.754159 passed all 1 test case(s) 2021-01-12 17:04:52 ./run-tests.py ap_wpa2_eap_ttls_mschapv2_incorrect_password DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_mschapv2_incorrect_password 1/1 Test: WPA2-Enterprise connection using EAP-TTLS/MSCHAPv2 - incorrect password Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_wpa2_eap_ttls_mschapv2_incorrect_password 1.216335 2021-01-12 17:04:54.096293 passed all 1 test case(s) 2021-01-12 17:04:54 ./run-tests.py ap_wpa2_eap_ttls_ocsp_unknown DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_ocsp_unknown 1/1 Test: WPA2-Enterprise connection using EAP-TTLS and OCSP status unknown openssl ocsp -index auth_serv/index-unknown.txt -rsigner auth_serv/ocsp-responder.pem -rkey auth_serv/ocsp-responder.key -CA auth_serv/ca.pem -issuer auth_serv/ca.pem -verify_other auth_serv/ca.pem -trust_other -ndays 7 -reqin auth_serv/ocsp-req.der -respout logs/current/ocsp-server-cache-unknown.der openssl result: Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_ocsp_unknown 0.823999 2021-01-12 17:04:55.045904 passed all 1 test case(s) 2021-01-12 17:04:55 ./run-tests.py ap_wpa2_psk_assoc_rsn DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_assoc_rsn 1/1 Test: WPA2-PSK AP and association request RSN IE differences Starting AP wlan3 Normal wpa_supplicant assoc req RSN IE Connect STA wlan0 to AP RSN IE without RSN Capabilities Connect STA wlan0 to AP WPA IE instead of RSN IE and only RSN enabled on AP Connect STA wlan0 to AP Empty RSN IE Connect STA wlan0 to AP RSN IE with truncated Version Connect STA wlan0 to AP RSN IE with only Version Connect STA wlan0 to AP PASS ap_wpa2_psk_assoc_rsn 1.679708 2021-01-12 17:04:56.850363 passed all 1 test case(s) 2021-01-12 17:04:56 ./run-tests.py ap_wpa2_psk_ext_key_id_ptk_rekey_sta0 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ext_key_id_ptk_rekey_sta0 1/1 Test: Extended Key ID and PTK rekey by station (Ext Key ID disabled on AP) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_ext_key_id_ptk_rekey_sta0 1.829605 2021-01-12 17:04:58.807265 passed all 1 test case(s) 2021-01-12 17:04:58 ./run-tests.py ap_wpa2_psk_ext_retry_msg_3b DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ext_retry_msg_3b 1/1 Test: WPA2-PSK AP using external EAPOL I/O and retry for EAPOL-Key msg 3/4 (b) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_ext_retry_msg_3b 1.305391 2021-01-12 17:05:00.248106 passed all 1 test case(s) 2021-01-12 17:05:00 ./run-tests.py ap_wpa2_psk_supp_proto_igtk_keyid_too_large DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_supp_proto_igtk_keyid_too_large 1/1 Test: WPA2-PSK supplicant protocol testing: too large IGTK KeyID Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_supp_proto_igtk_keyid_too_large 0.796917 2021-01-12 17:05:01.169360 passed all 1 test case(s) 2021-01-12 17:05:01 ./run-tests.py ap_wpa2_psk_supp_proto_no_gtk_in_group_msg DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_supp_proto_no_gtk_in_group_msg 1/1 Test: WPA2-PSK supplicant protocol testing: GTK KDE missing from group msg Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_supp_proto_no_gtk_in_group_msg 0.793006 2021-01-12 17:05:02.087559 passed all 1 test case(s) 2021-01-12 17:05:02 ./run-tests.py ap_wpa2_radius_server_get_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_radius_server_get_id 1/1 Test: External RADIUS server and dot1xAuthSessionUserName Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_radius_server_get_id 0.806075 2021-01-12 17:05:03.019053 passed all 1 test case(s) 2021-01-12 17:05:03 ./run-tests.py ap_wpa_ptk_rekey DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa_ptk_rekey 1/1 Test: WPA-PSK/TKIP AP and PTK rekey enforced by station Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa_ptk_rekey 1.897368 2021-01-12 17:05:05.041292 passed all 1 test case(s) 2021-01-12 17:05:05 ./run-tests.py ap_wps_encr_no_random_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_encr_no_random_ap 1/1 Test: WPS and no random data available for encryption on AP Starting AP wlan3 PASS ap_wps_encr_no_random_ap 1.011352 2021-01-12 17:05:06.178249 passed all 1 test case(s) 2021-01-12 17:05:06 ./run-tests.py ap_wps_er_http_proto_subscribe_invalid_response DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_proto_subscribe_invalid_response 1/1 Test: WPS ER HTTP protocol testing - SUBSCRIBE and invalid response HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 HTTP server received: POST /wps_control HTTP/1.1 HTTP header: Host: 127.0.0.1:12345 HTTP header: Content-Type: text/xml; charset="utf-8" HTTP header: Content-Length: 280 HTTP header: SOAPACTION: "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo" PASS ap_wps_er_http_proto_subscribe_invalid_response 1.050887 2021-01-12 17:05:07.354199 passed all 1 test case(s) 2021-01-12 17:05:07 ./run-tests.py ap_wps_er_pbc_overlap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_pbc_overlap 1/1 Test: WPS ER connected to AP and PBC session overlap Starting AP wlan3 PASS ap_wps_er_pbc_overlap 2.509379 2021-01-12 17:05:09.988443 passed all 1 test case(s) 2021-01-12 17:05:10 ./run-tests.py ap_wps_reg_connect_mixed_mode DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_reg_connect_mixed_mode 1/1 Test: WPS registrar using AP PIN to connect (WPA+WPA2) Starting AP wlan3 PASS ap_wps_reg_connect_mixed_mode 1.274302 2021-01-12 17:05:11.388291 passed all 1 test case(s) 2021-01-12 17:05:11 ./run-tests.py ap_wps_setup_locked_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_setup_locked_2 1/1 Test: WPS AP configured for special ap_setup_locked=2 mode Starting AP wlan3 PASS ap_wps_setup_locked_2 1.60862 2021-01-12 17:05:13.121344 passed all 1 test case(s) 2021-01-12 17:05:13 ./run-tests.py authsrv_errors_3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START authsrv_errors_3 1/1 Test: Authentication server errors (3) Starting AP wlan4 PASS authsrv_errors_3 0.192917 2021-01-12 17:05:13.443231 passed all 1 test case(s) 2021-01-12 17:05:13 ./run-tests.py concurrent_autogo DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START concurrent_autogo 1/1 Test: Concurrent P2P autonomous GO Connect to an infrastructure AP Starting AP wlan3 Connect STA wlan0 to AP Start a P2P group while associated to an AP wlan1: Trying to discover peer 02:00:00:00:00:00 Confirm AP connection after P2P group removal PASS concurrent_autogo 7.294891 2021-01-12 17:05:20.862322 passed all 1 test case(s) 2021-01-12 17:05:20 ./run-tests.py dpp_ap_config_p384_p521 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_ap_config_p384_p521 1/1 Test: DPP and AP configuration (P-384 + P-521) Starting AP wlan3 Update AP configuration to use key_mgmt=DPP Connect STA wlan1 to AP Check data connection PASS dpp_ap_config_p384_p521 1.339092 2021-01-12 17:05:22.327964 passed all 1 test case(s) 2021-01-12 17:05:22 ./run-tests.py dpp_config_connector_error_expired_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_connector_error_expired_2 1/1 Test: DPP Config Object connector error - expired 2 Skip test case: OpenSSL python method not available SKIP dpp_config_connector_error_expired_2 0.051836 2021-01-12 17:05:22.504507 passed all 0 test case(s) skipped 1 test case(s) 2021-01-12 17:05:22 ./run-tests.py dpp_config_dpp_gen_prime256v1_secp384r1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_dpp_gen_prime256v1_secp384r1 1/1 Test: Generate DPP Config Object for DPP network (P-256 + P-384) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_dpp_gen_prime256v1_secp384r1 0.166212 2021-01-12 17:05:22.803569 passed all 1 test case(s) 2021-01-12 17:05:22 ./run-tests.py dpp_config_jwk_error_unsupported_crv DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jwk_error_unsupported_crv 1/1 Test: DPP Config Object JWK error - unsupported curve dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jwk_error_unsupported_crv 2.12438 2021-01-12 17:05:25.052531 passed all 1 test case(s) 2021-01-12 17:05:25 ./run-tests.py dpp_legacy_params_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_legacy_params_failure 1/1 Test: DPP legacy parameters local failure PASS dpp_legacy_params_failure 0.104815 2021-01-12 17:05:25.283127 passed all 1 test case(s) 2021-01-12 17:05:25 ./run-tests.py dpp_pkex_alloc_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_alloc_fail 1/1 Test: DPP/PKEX and memory allocation failures Unexpected DPP_CONFIGURATOR_ADD success Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 3638, in test_dpp_pkex_alloc_fail raise Exception("Unexpected DPP_CONFIGURATOR_ADD success") Exception: Unexpected DPP_CONFIGURATOR_ADD success FAIL dpp_pkex_alloc_fail 0.058938 2021-01-12 17:05:25.473490 passed 0 test case(s) skipped 0 test case(s) failed tests: dpp_pkex_alloc_fail 2021-01-12 17:05:25 ./run-tests.py eap_proto_pwd_reflection_attack DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_pwd_reflection_attack 1/1 Test: EAP-pwd protocol tests - reflection attack on the server Starting AP wlan3 Connect STA wlan0 to AP PASS eap_proto_pwd_reflection_attack 0.802464 2021-01-12 17:05:26.417332 passed all 1 test case(s) 2021-01-12 17:05:26 ./run-tests.py eap_teap_eap_mschapv2_user_and_machine_fail_machine DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_eap_mschapv2_user_and_machine_fail_machine 1/1 Test: EAP-TEAP with inner EAP-MSCHAPv2 using user and machine credentials (fail machine) Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_eap_mschapv2_user_and_machine_fail_machine 0.812123 2021-01-12 17:05:27.362215 passed all 1 test case(s) 2021-01-12 17:05:27 ./run-tests.py fst_ap_ack_request_with_session_not_established_init_side DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_ack_request_with_session_not_established_init_side 1/1 Test: FST AP ack request with session not established init side Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad scenario was handled correctly (Ack request received on the initiator side before session was established) PASS fst_ap_ack_request_with_session_not_established_init_side 7.619849 2021-01-12 17:05:35.114043 passed all 1 test case(s) 2021-01-12 17:05:35 ./run-tests.py fst_ap_config_llt_too_big DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_config_llt_too_big 1/1 Test: FST AP configuration LLT is too big kill_pid: pidfile logs/current/myhostapd.pid does not exist - try again after a second kill_pid: pidfile logs/current/myhostapd.pid does not exist - could not kill the process PASS fst_ap_config_llt_too_big 1.066336 2021-01-12 17:05:36.311426 passed all 1 test case(s) 2021-01-12 17:05:36 ./run-tests.py fst_session_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_session_oom 1/1 Test: FST session create OOM Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP PASS fst_session_oom 1.996614 2021-01-12 17:05:38.444034 passed all 1 test case(s) 2021-01-12 17:05:38 ./run-tests.py gas_concurrent_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_concurrent_scan 1/1 Test: Generic GAS queries with concurrent scan operation Starting AP wlan3 Request concurrent operations PASS gas_concurrent_scan 4.868207 2021-01-12 17:05:43.443244 passed all 1 test case(s) 2021-01-12 17:05:43 ./run-tests.py grpform_pd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_pd 1/1 Test: P2P group formation with PD-before-GO-Neg workaround Start GO negotiation wlan0 -> wlan1 wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 Group formed PASS grpform_pd 2.380372 2021-01-12 17:05:45.955260 passed all 1 test case(s) 2021-01-12 17:05:45 ./run-tests.py hapd_ctrl_update_beacon DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_update_beacon 1/1 Test: hostapd and UPDATE_BEACON Starting AP wlan3 Connect STA wlan0 to AP PASS hapd_ctrl_update_beacon 0.845617 2021-01-12 17:05:46.934979 passed all 1 test case(s) 2021-01-12 17:05:46 ./run-tests.py he160_no_dfs_100_plus DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he160_no_dfs_100_plus 1/1 Test: HE with 160 MHz channel width and no DFS (100 plus) Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS he160_no_dfs_100_plus 1.87381 2021-01-12 17:05:48.946321 passed all 1 test case(s) 2021-01-12 17:05:48 ./run-tests.py he160_no_ht40 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he160_no_ht40 1/1 Test: HE with 160 MHz channel width and HT40 disabled Starting AP wlan3 Country code at the end: 00 PASS he160_no_ht40 1.042579 2021-01-12 17:05:50.122316 passed all 1 test case(s) 2021-01-12 17:05:50 ./run-tests.py he80_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he80_invalid 1/1 Test: HE with invalid 80 MHz channel configuration (seg1) Starting AP wlan3 Country code at the end: 00 PASS he80_invalid 1.345168 2021-01-12 17:05:51.599128 passed all 1 test case(s) 2021-01-12 17:05:51 ./run-tests.py ibss_open_retry DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_open_retry 1/1 Test: IBSS open (no security) with cfg80211 retry workaround wlan0 waiting for IBSS start/join to complete PASS ibss_open_retry 10.662446 2021-01-12 17:06:02.392380 passed all 1 test case(s) 2021-01-12 17:06:02 ./run-tests.py mbo_wnm_token_wrap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_wnm_token_wrap 1/1 Test: MBO WNM token wrap around Starting AP wlan3 Connect STA wlan0 to AP PASS mbo_wnm_token_wrap 0.877853 2021-01-12 17:06:03.401818 passed all 1 test case(s) 2021-01-12 17:06:03 ./run-tests.py mesh_secure_invalid_pairwise_cipher DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_invalid_pairwise_cipher 1/1 Test: Secure mesh and invalid group cipher PASS mesh_secure_invalid_pairwise_cipher 0.05251 2021-01-12 17:06:03.585049 passed all 1 test case(s) 2021-01-12 17:06:03 ./run-tests.py module_hostapd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START module_hostapd 1/1 Test: hostapd module tests PASS module_hostapd 0.044081 2021-01-12 17:06:03.760154 passed all 1 test case(s) 2021-01-12 17:06:03 ./run-tests.py nfc_p2p_go_legacy_handover DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_go_legacy_handover 1/1 Test: NFC token from legacy WPS STA to P2P GO Start autonomous GOs Connect legacy WPS STA with connection handover PASS nfc_p2p_go_legacy_handover 1.562659 2021-01-12 17:06:05.454227 passed all 1 test case(s) 2021-01-12 17:06:05 ./run-tests.py oce_ap_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START oce_ap_open 1/1 Test: OCE AP (open) Starting AP wlan3 Connect STA wlan0 to AP PASS oce_ap_open 0.846602 2021-01-12 17:06:06.431230 passed all 1 test case(s) 2021-01-12 17:06:06 ./run-tests.py openssl_cipher_suite_config_hapd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START openssl_cipher_suite_config_hapd 1/1 Test: OpenSSL cipher suite configuration on hostapd Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Starting AP wlan4 PASS openssl_cipher_suite_config_hapd 1.746088 2021-01-12 17:06:08.308966 passed all 1 test case(s) 2021-01-12 17:06:08 ./run-tests.py owe_transition_mode_connect_cmd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START owe_transition_mode_connect_cmd 1/1 Test: Opportunistic Wireless Encryption transition mode using cfg80211 connect command Starting AP wlan3 Starting AP wlan4 Connect STA wlan5 to AP Move to OWE only mode (disable transition mode) PASS owe_transition_mode_connect_cmd 3.43705 2021-01-12 17:06:11.876539 passed all 1 test case(s) 2021-01-12 17:06:11 ./run-tests.py p2p_config_methods DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_config_methods 1/1 Test: P2P and WPS config method update wlan0: Trying to discover peer 02:00:00:00:05:00 wlan0: Trying to discover peer 02:00:00:00:05:00 PASS p2p_config_methods 0.830888 2021-01-12 17:06:12.839050 passed all 1 test case(s) 2021-01-12 17:06:12 ./run-tests.py p2p_device_conf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_device_conf 1/1 Test: P2P configuration with cfg80211 P2P Device Start GO negotiation wlan7 -> wlan0 wlan0: Trying to discover peer 42:00:00:00:07:00 wlan7: Trying to discover peer 02:00:00:00:00:00 Group formed Start GO negotiation wlan7 -> wlan0 wlan0: Trying to discover peer 42:00:00:00:07:00 wlan7: Trying to discover peer 02:00:00:00:00:00 Group formed PASS p2p_device_conf 5.664635 2021-01-12 17:06:18.635700 passed all 1 test case(s) 2021-01-12 17:06:18 ./run-tests.py p2p_listen_and_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_listen_and_scan 1/1 Test: P2P_LISTEN and scan PASS p2p_listen_and_scan 5.17155 2021-01-12 17:06:23.939325 passed all 1 test case(s) 2021-01-12 17:06:23 ./run-tests.py p2p_msg_invitation_resp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_msg_invitation_resp 1/1 Test: P2P protocol tests for invitation response processing Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group Starting AP wlan3 wlan0: Trying to discover peer 02:00:00:00:01:00 wlan0: Trying to discover peer 02:00:00:00:01:00 wlan0: Trying to discover peer 02:00:00:00:01:00 wlan0: Trying to discover peer 02:00:00:00:01:00 wlan0: Trying to discover peer 02:00:00:00:01:00 PASS p2p_msg_invitation_resp 4.855656 2021-01-12 17:06:28.928365 passed all 1 test case(s) 2021-01-12 17:06:28 ./run-tests.py p2p_service_discovery_go DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_service_discovery_go 1/1 Test: P2P service discovery from GO wlan1: Trying to discover peer 02:00:00:00:00:00 wlan1: Trying to discover peer 02:00:00:00:00:00 PASS p2p_service_discovery_go 1.097994 2021-01-12 17:06:30.157907 passed all 1 test case(s) 2021-01-12 17:06:30 ./run-tests.py p2p_service_discovery_peer_not_listening2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_service_discovery_peer_not_listening2 1/1 Test: P2P service discovery and peer not listening PASS p2p_service_discovery_peer_not_listening2 1.405967 2021-01-12 17:06:31.696015 passed all 1 test case(s) 2021-01-12 17:06:31 ./run-tests.py p2p_set_discoverability DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_set_discoverability 1/1 Test: P2P_SET discoverability wlan1: Trying to discover peer 02:00:00:00:00:00 wlan2: Trying to discover peer 02:00:00:00:01:00 wlan2: Trying to discover peer 02:00:00:00:01:00 PASS p2p_set_discoverability 2.971053 2021-01-12 17:06:34.798371 passed all 1 test case(s) 2021-01-12 17:06:34 ./run-tests.py radius_acct_unreachable3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_acct_unreachable3 1/1 Test: RADIUS Accounting server initially unreachable, but then available Skip test case: Not running under VM SKIP radius_acct_unreachable3 0.046525 2021-01-12 17:06:34.976795 passed all 0 test case(s) skipped 1 test case(s) 2021-01-12 17:06:34 ./run-tests.py rfkill_hostapd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rfkill_hostapd 1/1 Test: rfkill block/unblock during and prior to hostapd operations Starting AP wlan3 Skip test case: No rfkill available: unpack requires a buffer of 8 bytes SKIP rfkill_hostapd 0.429957 2021-01-12 17:06:35.539951 passed all 0 test case(s) skipped 1 test case(s) 2021-01-12 17:06:35 ./run-tests.py rrm_beacon_req_passive_no_match_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_passive_no_match_oom 1/1 Test: Beacon request - passive scan mode and no matching BSS (OOM) Starting AP wlan3 Connect STA wlan0 to AP PASS rrm_beacon_req_passive_no_match_oom 1.304762 2021-01-12 17:06:36.976417 passed all 1 test case(s) 2021-01-12 17:06:36 ./run-tests.py sae_password_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_password_id 1/1 Test: SAE and password identifier Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_password_id 1.198814 2021-01-12 17:06:38.306419 passed all 1 test case(s) 2021-01-12 17:06:38 ./run-tests.py sae_pwe_in_psk_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pwe_in_psk_ap 1/1 Test: sae_pwe parameter in PSK-only-AP Starting AP wlan3 Connect STA wlan0 to AP PASS sae_pwe_in_psk_ap 0.771214 2021-01-12 17:06:39.209917 passed all 1 test case(s) 2021-01-12 17:06:39 ./run-tests.py scan_and_interface_disabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_and_interface_disabled 1/1 Test: Scan operation when interface gets disabled PASS scan_and_interface_disabled 7.154947 2021-01-12 17:06:46.498137 passed all 1 test case(s) 2021-01-12 17:06:46 ./run-tests.py scan_multi_bssid_check_ie DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multi_bssid_check_ie 1/1 Test: Scan and check if nontransmitting BSS inherits IE from transmitting BSS Starting AP wlan3 trans_bss beacon_ie: [0, 1, 3, 5, 42, 50, 59, 45, 61, 127, 221, 71] nontrans_bss1 beacon_ie: [0, 1, 3, 5, 42, 50, 59, 45, 61, 127, 221, 85] PASS scan_multi_bssid_check_ie 0.795719 2021-01-12 17:06:47.425973 passed all 1 test case(s) 2021-01-12 17:06:47 ./run-tests.py sigma_dut_ap_sae_pk_mixed DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_sae_pk_mixed 1/1 Test: sigma_dut controlled AP using SAE-PK(disabled) and PSK Skip test case: sigma_dut not available SKIP sigma_dut_ap_sae_pk_mixed 0.114489 2021-01-12 17:06:47.674335 passed all 0 test case(s) skipped 1 test case(s) 2021-01-12 17:06:47 ./run-tests.py sigma_dut_dpp_qr_mutual_init_enrollee_pending DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_mutual_init_enrollee_pending 1/1 Test: sigma_dut DPP/QR (mutual) initiator as Enrollee (response pending) Starting AP wlan3 Skip test case: sigma_dut not available SKIP sigma_dut_dpp_qr_mutual_init_enrollee_pending 0.445695 2021-01-12 17:06:48.253280 passed all 0 test case(s) skipped 1 test case(s) 2021-01-12 17:06:48 ./run-tests.py sigma_dut_suite_b DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_suite_b 1/1 Test: sigma_dut controlled STA Suite B Starting AP wlan4 Starting AP wlan3 Skip test case: sigma_dut not available SKIP sigma_dut_suite_b 0.905723 2021-01-12 17:06:49.291311 passed all 0 test case(s) skipped 1 test case(s) 2021-01-12 17:06:49 ./run-tests.py suite_b_192_pmkid_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_192_pmkid_failure 1/1 Test: WPA2/GCMP-256 connection at Suite B 192-bit level and PMKID derivation failure Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_192_pmkid_failure 0.895953 2021-01-12 17:06:50.323214 passed all 1 test case(s) 2021-01-12 17:06:50 ./run-tests.py wext_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wext_open 1/1 Test: WEXT driver interface with open network Starting AP wlan3 Connect STA wlan5 to AP PASS wext_open 5.183531 2021-01-12 17:06:55.638537 passed all 1 test case(s) 2021-01-12 17:06:55 ./run-tests.py wext_pmksa_cache DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wext_pmksa_cache 1/1 Test: PMKSA caching with WEXT Starting AP wlan3 Connect STA wlan5 to AP Starting AP wlan4 Roam to AP2 Roam back to AP1 PASS wext_pmksa_cache 35.243729 2021-01-12 17:07:31.014288 passed all 1 test case(s) 2021-01-12 17:07:31 ./run-tests.py wnm_bss_transition_mgmt_query_disabled_on_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_transition_mgmt_query_disabled_on_ap 1/1 Test: WNM BSS Transition Management query - TM disabled on AP Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_bss_transition_mgmt_query_disabled_on_ap 0.892296 2021-01-12 17:07:32.038947 passed all 1 test case(s) 2021-01-12 17:07:32 ./run-tests.py wpa2_ocv_ht40 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_ht40 1/1 Test: OCV with HT40 channel Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP PASS wpa2_ocv_ht40 20.605134 2021-01-12 17:07:52.775181 passed all 1 test case(s) 2021-01-12 17:07:52 ./run-tests.py wpa2_ocv_no_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_no_pmf 1/1 Test: OCV on 2.4 GHz and no PMF on STA Starting AP wlan3 Connect STA wlan0 to AP PASS wpa2_ocv_no_pmf 0.704198 2021-01-12 17:07:53.610327 passed all 1 test case(s) 2021-01-12 17:07:53 ./run-tests.py wpas_ap_async_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_async_fail 1/1 Test: wpa_supplicant AP mode - Async failure Country code at the end: 00 PASS wpas_ap_async_fail 0.908317 2021-01-12 17:07:54.650337 passed all 1 test case(s) 2021-01-12 17:07:54 ./run-tests.py wpas_ap_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_oom 1/1 Test: wpa_supplicant AP mode - OOM PASS wpas_ap_oom 7.715803 2021-01-12 17:08:02.496990 passed all 1 test case(s) 2021-01-12 17:08:02 ./run-tests.py wpas_ap_wps_frag DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_wps_frag 1/1 Test: wpa_supplicant AP mode - WPS operations with fragmentation PASS wpas_ap_wps_frag 1.475201 2021-01-12 17:08:04.105760 passed all 1 test case(s) 2021-01-12 17:08:04 ./run-tests.py wpas_ctrl_event_burst DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_event_burst 1/1 Test: wpa_supplicant control socket and event burst Received i=0 g=0 Received i=139 g=139 Received i=139 g=139 Received i=312 g=139 Received i=139 g=214 Received i=139 g=139 Received i=132 g=139 Received i=0 g=91 PASS wpas_ctrl_event_burst 0.453863 2021-01-12 17:08:04.690956 passed all 1 test case(s) 2021-01-12 17:08:04 ./run-tests.py wpas_ctrl_interface_add_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_interface_add_sta 1/1 Test: wpa_supplicant INTERFACE_ADD/REMOVE with STA vif creation/removal Starting AP wlan3 Connect STA test-wlan0 to AP PASS wpas_ctrl_interface_add_sta 1.091549 2021-01-12 17:08:05.913759 passed all 1 test case(s) 2021-01-12 17:08:05 ./run-tests.py wpas_mesh_secure_sae_missing_password DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_mesh_secure_sae_missing_password 1/1 Test: wpa_supplicant secure MESH and missing SAE password PASS wpas_mesh_secure_sae_missing_password 0.400026 2021-01-12 17:08:06.445180 passed all 1 test case(s) 2021-01-12 17:08:06 ./run-tests.py wps_ext_cred_proto_success DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_cred_proto_success 1/1 Test: WPS and Credential: success Starting AP wlan3 PASS wps_ext_cred_proto_success 1.217062 2021-01-12 17:08:07.793371 passed all 1 test case(s) 2021-01-12 17:08:07 ./run-tests.py wps_ext_proto_nack_m3_e_nonce_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_nack_m3_e_nonce_mismatch 1/1 Test: WPS and NACK M3 E-Nonce mismatch Starting AP wlan3 PASS wps_ext_proto_nack_m3_e_nonce_mismatch 1.024108 2021-01-12 17:08:08.949274 passed all 1 test case(s) 2021-01-12 17:08:08 ./run-tests.py wps_ext_proto_nack_m3_invalid_msg_type DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_nack_m3_invalid_msg_type 1/1 Test: WPS and NACK M3 invalid Message Type Starting AP wlan3 PASS wps_ext_proto_nack_m3_invalid_msg_type 1.021692 2021-01-12 17:08:10.103253 passed all 1 test case(s) 2021-01-12 17:08:10 ./stop.sh