2022-04-23 23:57:32 export USER=root 2022-04-23 23:57:32 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2022-04-23 23:58:13 ./start.sh 2022-04-23 23:58:13 ./run-tests.py ap_anqp_sharing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_anqp_sharing 1/1 Test: ANQP sharing within ESS and explicit unshare Starting AP wlan3 Starting AP wlan4 Normal network selection with shared ANQP results Explicit ANQP request to unshare ANQP results PASS ap_anqp_sharing 0.343165 2022-04-23 23:58:15.172321 passed all 1 test case(s) 2022-04-23 23:58:15 ./run-tests.py ap_bss_add_remove DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_bss_add_remove 1/1 Test: Dynamic BSS add/remove operations with hostapd Set up three BSSes one by one Starting BSS phy=phy3 ifname=wlan3 Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Starting BSS phy=phy3 ifname=wlan3-2 Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Starting BSS phy=phy3 ifname=wlan3-3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Remove the last BSS and re-add it Removing BSS wlan3-3 Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Starting BSS phy=phy3 ifname=wlan3-3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Remove the middle BSS and re-add it Removing BSS wlan3-2 Connect STA wlan1 to AP Connect STA wlan0 to AP Connect STA wlan2 to AP Starting BSS phy=phy3 ifname=wlan3-2 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Remove the first BSS and re-add it and other BSSs Removing BSS wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Starting BSS phy=phy3 ifname=wlan3 Starting BSS phy=phy3 ifname=wlan3-2 Starting BSS phy=phy3 ifname=wlan3-3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Remove two BSSes and re-add them Removing BSS wlan3-2 Connect STA wlan1 to AP Connect STA wlan0 to AP Connect STA wlan2 to AP Removing BSS wlan3-3 Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Starting BSS phy=phy3 ifname=wlan3-2 Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Starting BSS phy=phy3 ifname=wlan3-3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Remove three BSSes in and re-add them Removing BSS wlan3-3 Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Removing BSS wlan3-2 Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Removing BSS wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Starting BSS phy=phy3 ifname=wlan3 Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Starting BSS phy=phy3 ifname=wlan3-2 Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Starting BSS phy=phy3 ifname=wlan3-3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Test error handling if a duplicate ifname is tried Starting BSS phy=phy3 ifname=wlan3-3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_bss_add_remove 6.73369 2022-04-23 23:58:22.076090 passed all 1 test case(s) 2022-04-23 23:58:22 ./run-tests.py ap_cipher_replay_protection_ap_gcmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cipher_replay_protection_ap_gcmp 1/1 Test: GCMP replay protection on AP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_cipher_replay_protection_ap_gcmp 1.598709 2022-04-23 23:58:23.841877 passed all 1 test case(s) 2022-04-23 23:58:23 ./run-tests.py ap_duplicate_bssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_duplicate_bssid 1/1 Test: Duplicate BSSID Starting AP wlan3 Starting BSS phy=phy3 ifname=wlan3-2 Starting BSS phy=phy3 ifname=wlan3-3 Connect STA wlan0 to AP PASS ap_duplicate_bssid 0.249702 2022-04-23 23:58:24.259640 passed all 1 test case(s) 2022-04-23 23:58:24 ./run-tests.py ap_ft_ap_oom4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_ap_oom4 1/1 Test: WPA2-PSK-FT and AP OOM 4 Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS ap_ft_ap_oom4 0.841356 2022-04-23 23:58:25.265579 passed all 1 test case(s) 2022-04-23 23:58:25 ./run-tests.py ap_ft_mismatching_rrb_key_push DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_mismatching_rrb_key_push 1/1 Test: WPA2-PSK-FT AP over DS with mismatching RRB key (push) Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP PASS ap_ft_mismatching_rrb_key_push 1.505183 2022-04-23 23:58:26.938577 passed all 1 test case(s) 2022-04-23 23:58:26 ./run-tests.py ap_ft_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_pmf 1/1 Test: WPA2-PSK-FT AP with PMF Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_pmf 0.807888 2022-04-23 23:58:27.911289 passed all 1 test case(s) 2022-04-23 23:58:27 ./run-tests.py ap_ft_sae_ptk_rekey_ap_ext_key_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_sae_ptk_rekey_ap_ext_key_id 1/1 Test: WPA2-PSK-FT-SAE AP and PTK rekey triggered by AP (Ext Key ID) Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP PASS ap_ft_sae_ptk_rekey_ap_ext_key_id 2.701539 2022-04-23 23:58:30.780141 passed all 1 test case(s) 2022-04-23 23:58:30 ./run-tests.py ap_hs20_multiple_home_cred DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_multiple_home_cred 1/1 Test: Hotspot 2.0 and select with multiple matching home credentials Starting AP wlan3 Starting AP wlan4 PASS ap_hs20_multiple_home_cred 0.42579 2022-04-23 23:58:31.375392 passed all 1 test case(s) 2022-04-23 23:58:31 ./run-tests.py ap_hs20_proxyarp_enable_dgaf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_proxyarp_enable_dgaf 1/1 Test: Hotspot 2.0 and ProxyARP with DGAF enabled Starting AP wlan3 Connect STA wlan1 to AP After connect: ['192.168.1.123 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT', 'aaaa:bbbb:cccc::2 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT'] After disconnect: [] PASS ap_hs20_proxyarp_enable_dgaf 1.310285 2022-04-23 23:58:32.851928 passed all 1 test case(s) 2022-04-23 23:58:32 ./run-tests.py ap_pmf_assoc_comeback DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_assoc_comeback 1/1 Test: WPA2-PSK AP with PMF association comeback Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_assoc_comeback 1.402792 2022-04-23 23:58:34.422046 passed all 1 test case(s) 2022-04-23 23:58:34 ./run-tests.py ap_pmf_inject_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_inject_auth 1/1 Test: WPA2-PSK AP with PMF and Authentication frame injection Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_inject_auth 5.6929 2022-04-23 23:58:40.281487 passed all 1 test case(s) 2022-04-23 23:58:40 ./run-tests.py ap_vlan_wpa2_radius_mixed DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_wpa2_radius_mixed 1/1 Test: AP VLAN with WPA2-Enterprise and tagged+untagged VLANs Starting AP wlan3 Connect STA wlan0 to AP Command "add" is unknown, try "ip link help". wlan0.1: ERROR while getting interface flags: No such device Test connectivity in untagged VLAN 2 Test connectivity in tagged VLAN 1 wlan0.1: ERROR while getting interface flags: No such device Command "del" is unknown, try "ip link help". Failed to enable data test functionality Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vlan.py", line 731, in test_ap_vlan_wpa2_radius_mixed ifname2="brvlan1") File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 99, in run_connectivity_test config_data_test(dev1, dev2, dev1group, dev2group, ifname1, ifname2) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 23, in config_data_test raise Exception("Failed to enable data test functionality") Exception: Failed to enable data test functionality FAIL ap_vlan_wpa2_radius_mixed 0.546002 2022-04-23 23:58:40.995700 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_vlan_wpa2_radius_mixed 2022-04-23 23:58:41 ./run-tests.py ap_vlan_wpa2_radius_required DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_wpa2_radius_required 1/1 Test: AP VLAN with WPA2-Enterprise and RADIUS attributes required Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan2 to AP PASS ap_vlan_wpa2_radius_required 0.402832 2022-04-23 23:58:41.575066 passed all 1 test case(s) 2022-04-23 23:58:41 ./run-tests.py ap_wpa2_eap_aka_config DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_aka_config 1/1 Test: EAP-AKA configuration options Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_aka_config 0.241277 2022-04-23 23:58:41.982432 passed all 1 test case(s) 2022-04-23 23:58:42 ./run-tests.py ap_wpa2_eap_fast_gtc_identity_change DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_gtc_identity_change 1/1 Test: WPA2-Enterprise connection using EAP-FAST/GTC and identity changing Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_gtc_identity_change 0.463384 2022-04-23 23:58:42.614245 passed all 1 test case(s) 2022-04-23 23:58:42 ./run-tests.py ap_wpa2_eap_gpsk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_gpsk 1/1 Test: WPA2-Enterprise connection using EAP-GPSK Starting AP wlan3 Connect STA wlan0 to AP Test forced algorithm selection Test failed algorithm negotiation Negative test with incorrect password Connect STA wlan0 to AP PASS ap_wpa2_eap_gpsk 0.890961 2022-04-23 23:58:43.673679 passed all 1 test case(s) 2022-04-23 23:58:43 ./run-tests.py ap_wpa2_eap_pwd_salt_sha512 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_pwd_salt_sha512 1/1 Test: WPA2-Enterprise connection using EAP-pwd and salted password SHA512 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_pwd_salt_sha512 0.237603 2022-04-23 23:58:44.078681 passed all 1 test case(s) 2022-04-23 23:58:44 ./run-tests.py ap_wpa2_eap_tls_ocsp_unknown_sign DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_ocsp_unknown_sign 1/1 Test: WPA2-Enterprise connection using EAP-TLS and unknown OCSP signer Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_ocsp_unknown_sign 0.239437 2022-04-23 23:58:44.484723 passed all 1 test case(s) 2022-04-23 23:58:44 ./run-tests.py ap_wpa2_eap_ttls_dh_params DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_dh_params 1/1 Test: WPA2-Enterprise connection using EAP-TTLS/CHAP and setting DH params Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_dh_params 0.230117 2022-04-23 23:58:44.882319 passed all 1 test case(s) 2022-04-23 23:58:44 ./run-tests.py ap_wpa2_eap_ttls_eap_vendor DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_eap_vendor 1/1 Test: WPA2-Enterprise connection using EAP-TTLS/EAP-vendor Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_eap_vendor 0.252339 2022-04-23 23:58:45.301140 passed all 1 test case(s) 2022-04-23 23:58:45 ./run-tests.py ap_wpa2_ext_add_to_bridge DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_ext_add_to_bridge 1/1 Test: hostapd behavior with interface added to bridge externally Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_ext_add_to_bridge 0.35002 2022-04-23 23:58:45.818380 passed all 1 test case(s) 2022-04-23 23:58:45 ./run-tests.py ap_wps_frag_ack_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_frag_ack_oom 1/1 Test: WPS and fragment ack OOM Starting AP wlan3 PASS ap_wps_frag_ack_oom 0.313147 2022-04-23 23:58:46.297423 passed all 1 test case(s) 2022-04-23 23:58:46 ./run-tests.py ap_wps_reg_config_ext_processing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_reg_config_ext_processing 1/1 Test: WPS registrar configuring an AP with external config processing Starting AP wlan3 PASS ap_wps_reg_config_ext_processing 0.413575 2022-04-23 23:58:46.879833 passed all 1 test case(s) 2022-04-23 23:58:46 ./run-tests.py cert_check_dnsname DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START cert_check_dnsname 1/1 Test: Certificate check with multiple dNSName values Skip test case: OpenSSL python method not available SKIP cert_check_dnsname 0.068022 2022-04-23 23:58:47.116571 passed all 0 test case(s) skipped 1 test case(s) 2022-04-23 23:58:47 ./run-tests.py cert_check_dnsname_wildcard DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START cert_check_dnsname_wildcard 1/1 Test: Certificate check with multiple dNSName wildcard values Skip test case: OpenSSL python method not available SKIP cert_check_dnsname_wildcard 0.068759 2022-04-23 23:58:47.354348 passed all 0 test case(s) skipped 1 test case(s) 2022-04-23 23:58:47 ./run-tests.py concurrent_grpform_while_connecting3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START concurrent_grpform_while_connecting3 1/1 Test: Concurrent P2P group formation while connecting to an AP (3) Start connection to an infrastructure AP Starting AP wlan3 Connect STA wlan0 to AP Form a P2P group while connecting to an AP Start GO negotiation wlan1 -> wlan0 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Confirm AP connection after P2P group removal PASS concurrent_grpform_while_connecting3 8.170674 2022-04-23 23:58:55.694776 passed all 1 test case(s) 2022-04-23 23:58:55 ./run-tests.py dbus_p2p_autogo_legacy DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_p2p_autogo_legacy 1/1 Test: D-Bus P2P autonomous GO and legacy STA No dbus module available Skip test case: No dbus module available SKIP dbus_p2p_autogo_legacy 0.069308 2022-04-23 23:58:55.930611 passed all 0 test case(s) skipped 1 test case(s) 2022-04-23 23:58:55 ./run-tests.py discovery_and_interface_disabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START discovery_and_interface_disabled 1/1 Test: P2P device discovery with interface getting disabled PASS discovery_and_interface_disabled 19.592381 2022-04-23 23:59:15.689724 passed all 1 test case(s) 2022-04-23 23:59:15 ./run-tests.py dpp_auto_connect_legacy_psk_sae_3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_auto_connect_legacy_psk_sae_3 1/1 Test: DPP and auto connect (legacy PSK+SAE) Starting AP wlan3 PASS dpp_auto_connect_legacy_psk_sae_3 4.432854 2022-04-23 23:59:20.290625 passed all 1 test case(s) 2022-04-23 23:59:20 ./run-tests.py dpp_config_connector_error_expired_5 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_connector_error_expired_5 1/1 Test: DPP Config Object connector error - expired 5 Skip test case: OpenSSL python method not available SKIP dpp_config_connector_error_expired_5 0.069775 2022-04-23 23:59:20.526635 passed all 0 test case(s) skipped 1 test case(s) 2022-04-23 23:59:20 ./run-tests.py dpp_listen_continue DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_listen_continue 1/1 Test: DPP and continue listen state PASS dpp_listen_continue 5.764465 2022-04-23 23:59:26.459298 passed all 1 test case(s) 2022-04-23 23:59:26 ./run-tests.py dpp_network_intro_version_missing_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_network_intro_version_missing_req 1/1 Test: DPP Network Introduction and protocol version missing from request Skip test case: DPP version 3 not supported SKIP dpp_network_intro_version_missing_req 0.067256 2022-04-23 23:59:26.691310 passed all 0 test case(s) skipped 1 test case(s) 2022-04-23 23:59:26 ./run-tests.py dpp_proto_auth_resp_invalid_i_bootstrap_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_resp_invalid_i_bootstrap_key 1/1 Test: DPP protocol testing - invalid I-bootstrap key in Auth Resp PASS dpp_proto_auth_resp_invalid_i_bootstrap_key 0.179033 2022-04-23 23:59:27.036577 passed all 1 test case(s) 2022-04-23 23:59:27 ./run-tests.py dpp_proto_auth_resp_invalid_r_bootstrap_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_resp_invalid_r_bootstrap_key 1/1 Test: DPP protocol testing - invalid R-bootstrap key in Auth Resp PASS dpp_proto_auth_resp_invalid_r_bootstrap_key 0.180364 2022-04-23 23:59:27.384345 passed all 1 test case(s) 2022-04-23 23:59:27 ./run-tests.py dpp_proto_conf_req_invalid_e_nonce DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_conf_req_invalid_e_nonce 1/1 Test: DPP protocol testing - invalid E-nonce in Conf Req PASS dpp_proto_conf_req_invalid_e_nonce 0.080325 2022-04-23 23:59:27.629630 passed all 1 test case(s) 2022-04-23 23:59:27 ./run-tests.py dpp_proto_conf_req_no_wrapped_data DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_conf_req_no_wrapped_data 1/1 Test: DPP protocol testing - no Wrapped Data in Conf Req PASS dpp_proto_conf_req_no_wrapped_data 0.080743 2022-04-23 23:59:27.875577 passed all 1 test case(s) 2022-04-23 23:59:27 ./run-tests.py dpp_qr_code_auth_broadcast DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_auth_broadcast 1/1 Test: DPP QR Code and authentication exchange (broadcast) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_auth_broadcast 0.080583 2022-04-23 23:59:28.121729 passed all 1 test case(s) 2022-04-23 23:59:28 ./run-tests.py eap_proto_leap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_leap 1/1 Test: EAP-LEAP protocol tests Starting AP wlan3 Connect STA wlan0 to AP leap_handler - RX 028400090175736572 Test: Missing payload Connect STA wlan0 to AP leap_handler - RX 024900090175736572 Test: Unexpected version Connect STA wlan0 to AP leap_handler - RX 02d500090175736572 Test: Invalid challenge length Connect STA wlan0 to AP leap_handler - RX 02f900090175736572 Test: Truncated challenge Connect STA wlan0 to AP leap_handler - RX 028400090175736572 Test: Valid challenge leap_handler - RX 02060024110100184d4399ea218a50d569e9cf3c95f5699327365f4cf3756be775736572 Test: Missing payload in Response Connect STA wlan0 to AP leap_handler - RX 029b00090175736572 Test: Valid challenge leap_handler - RX 02080024110100184d4399ea218a50d569e9cf3c95f5699327365f4cf3756be775736572 Test: Unexpected version in Response Connect STA wlan0 to AP leap_handler - RX 026b00090175736572 Test: Valid challenge leap_handler - RX 020a0024110100184d4399ea218a50d569e9cf3c95f5699327365f4cf3756be775736572 Test: Invalid challenge length in Response Connect STA wlan0 to AP leap_handler - RX 02e100090175736572 Test: Valid challenge leap_handler - RX 020c0024110100184d4399ea218a50d569e9cf3c95f5699327365f4cf3756be775736572 Test: Truncated challenge in Response Connect STA wlan0 to AP leap_handler - RX 023400090175736572 Test: Valid challenge leap_handler - RX 020e0024110100184d4399ea218a50d569e9cf3c95f5699327365f4cf3756be775736572 Test: Invalid challange value in Response Connect STA wlan0 to AP leap_handler - RX 029700090175736572 Test: Valid challenge leap_handler - RX 02100024110100184d4399ea218a50d569e9cf3c95f5699327365f4cf3756be775736572 Test: Valid challange value in Response Connect STA wlan0 to AP leap_handler - RX 025800090175736572 Test: Valid challenge leap_handler - RX 02120024110100184d4399ea218a50d569e9cf3c95f5699327365f4cf3756be775736572 Test: Success Wait for additional roundtrip Connect STA wlan0 to AP leap_handler - RX 020e00090175736572 Test: Valid challenge leap_handler - RX 02140024110100184d4399ea218a50d569e9cf3c95f5699327365f4cf3756be775736572 Test: Failure PASS eap_proto_leap 2.867815 2022-04-23 23:59:31.153907 passed all 1 test case(s) 2022-04-23 23:59:31 ./run-tests.py eap_proto_pwd_invalid_element_peer DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_pwd_invalid_element_peer 1/1 Test: EAP-pwd protocol tests - invalid peer element Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP PASS eap_proto_pwd_invalid_element_peer 0.860282 2022-04-23 23:59:32.181133 passed all 1 test case(s) 2022-04-23 23:59:32 ./run-tests.py eap_teap_eap_mschapv2_id0 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_eap_mschapv2_id0 1/1 Test: EAP-TEAP with inner EAP-MSCHAPv2 (eap_teap_id=0) Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_eap_mschapv2_id0 0.254315 2022-04-23 23:59:32.601022 passed all 1 test case(s) 2022-04-23 23:59:32 ./run-tests.py eap_teap_eap_mschapv2_user_and_machine DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_eap_mschapv2_user_and_machine 1/1 Test: EAP-TEAP with inner EAP-MSCHAPv2 using user and machine credentials Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_eap_mschapv2_user_and_machine 0.235627 2022-04-23 23:59:33.002609 passed all 1 test case(s) 2022-04-23 23:59:33 ./run-tests.py eap_teap_tls_cs_sha384 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_tls_cs_sha384 1/1 Test: EAP-TEAP with TLS cipher suite that uses SHA-384 Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_tls_cs_sha384 0.261043 2022-04-23 23:59:33.433152 passed all 1 test case(s) 2022-04-23 23:59:33 ./run-tests.py ext_password_interworking DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ext_password_interworking 1/1 Test: External password storage for Interworking network selection Starting AP wlan3 PASS ext_password_interworking 0.292625 2022-04-23 23:59:33.891729 passed all 1 test case(s) 2022-04-23 23:59:33 ./run-tests.py fils_and_ft_over_air DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_and_ft_over_air 1/1 Test: FILS SK using ERP and FT-over-air (SHA256) Starting AP as-erp Set up ERP key hierarchy without FILS/FT authentication Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP Initial mobility domain association using FILS authentication Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) FT protocol using FT key hierarchy established during FILS authentication FT protocol using the previously established FT key hierarchy from FILS authentication PASS fils_and_ft_over_air 1.234835 2022-04-23 23:59:35.291130 passed all 1 test case(s) 2022-04-23 23:59:35 ./run-tests.py fils_sk_erp_roam_diff_akm DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_erp_roam_diff_akm 1/1 Test: FILS SK using ERP and SHA256/SHA384 change in roam Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP Starting AP wlan4 (old add_ap argument type) PASS fils_sk_erp_roam_diff_akm 0.481537 2022-04-23 23:59:35.937541 passed all 1 test case(s) 2022-04-23 23:59:35 ./run-tests.py fst_ap_config_llt_zero DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_config_llt_zero 1/1 Test: FST AP configuration zero LLT kill_pid: pidfile logs/current/myhostapd.pid does not exist - try again after a second kill_pid: pidfile logs/current/myhostapd.pid does not exist - could not kill the process PASS fst_ap_config_llt_zero 1.095725 2022-04-23 23:59:37.198340 passed all 1 test case(s) 2022-04-23 23:59:37 ./run-tests.py fst_ap_remove_session_established DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_remove_session_established 1/1 Test: FST AP remove session - established Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Session removed PASS fst_ap_remove_session_established 0.479103 2022-04-23 23:59:37.841668 passed all 1 test case(s) 2022-04-23 23:59:37 ./run-tests.py fst_disconnect_non_fst_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_disconnect_non_fst_sta 1/1 Test: FST disconnect non-FST STA Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan0 to AP PASS fst_disconnect_non_fst_sta 6.435254 2022-04-23 23:59:44.442740 passed all 1 test case(s) 2022-04-23 23:59:44 ./run-tests.py fst_session_respond_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_session_respond_fail 1/1 Test: FST-MANAGER SESSION_RESPOND failure Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP PASS fst_session_respond_fail 0.445987 2022-04-23 23:59:45.055338 passed all 1 test case(s) 2022-04-23 23:59:45 ./run-tests.py fst_sta_initiate_session_bad_peer_addr DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_initiate_session_bad_peer_addr 1/1 Test: FST STA initiate session - bad peer address Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (Peer address) PASS fst_sta_initiate_session_bad_peer_addr 0.431121 2022-04-23 23:59:45.653654 passed all 1 test case(s) 2022-04-23 23:59:45 ./run-tests.py fst_sta_start_session_no_set_params DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_start_session_no_set_params 1/1 Test: FST STA start session - no set params Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (No params passed to session set) PASS fst_sta_start_session_no_set_params 0.461966 2022-04-23 23:59:46.281058 passed all 1 test case(s) 2022-04-23 23:59:46 ./run-tests.py gas_anqp_get_no_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_anqp_get_no_scan 1/1 Test: GAS/ANQP query without scan Starting AP wlan3 PASS gas_anqp_get_no_scan 0.368112 2022-04-23 23:59:46.814900 passed all 1 test case(s) 2022-04-23 23:59:46 ./run-tests.py gas_comeback_resp_additional_delay DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_comeback_resp_additional_delay 1/1 Test: GAS comeback response requesting additional delay Starting AP wlan3 PASS gas_comeback_resp_additional_delay 0.261889 2022-04-23 23:59:47.241705 passed all 1 test case(s) 2022-04-23 23:59:47 ./run-tests.py grpform_not_ready2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_not_ready2 1/1 Test: Not ready for GO Negotiation (search) wlan1: Trying to discover peer 02:00:00:00:00:00 PASS grpform_not_ready2 2.018588 2022-04-23 23:59:49.425132 passed all 1 test case(s) 2022-04-23 23:59:49 ./run-tests.py he80_csa DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he80_csa 1/1 Test: HE with 80 MHz channel width and CSA Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS he80_csa 3.628001 2022-04-23 23:59:53.221829 passed all 1 test case(s) 2022-04-23 23:59:53 ./run-tests.py he80b DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he80b 1/1 Test: HE with 80 MHz channel width (HT40- channel 40) Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS he80b 0.880311 2022-04-23 23:59:54.269581 passed all 1 test case(s) 2022-04-23 23:59:54 ./run-tests.py ieee8021x_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_proto 1/1 Test: IEEE 802.1X and EAPOL supplicant protocol testing Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan0 to AP MIB before test frames: {'dot11RSNAOptionImplemented': 'TRUE', 'dot11RSNAPreauthenticationImplemented': 'TRUE', 'dot11RSNAEnabled': 'FALSE', 'dot11RSNAPreauthenticationEnabled': 'FALSE', 'dot11RSNAConfigVersion': '1', 'dot11RSNAConfigPairwiseKeysSupported': '5', 'dot11RSNAConfigGroupCipherSize': '0', 'dot11RSNAConfigPMKLifetime': '43200', 'dot11RSNAConfigPMKReauthThreshold': '70', 'dot11RSNAConfigNumberOfPTKSAReplayCounters': '1', 'dot11RSNAConfigSATimeout': '60', 'dot11RSNAAuthenticationSuiteSelected': '00-00-00-0', 'dot11RSNAPairwiseCipherSelected': '00-0f-ac-0', 'dot11RSNAGroupCipherSelected': '00-0f-ac-0', 'dot11RSNAPMKIDUsed': '', 'dot11RSNAAuthenticationSuiteRequested': '00-00-00-0', 'dot11RSNAPairwiseCipherRequested': '00-0f-ac-0', 'dot11RSNAGroupCipherRequested': '00-0f-ac-0', 'dot11RSNAConfigNumberOfGTKSAReplayCounters': '0', 'dot11RSNA4WayHandshakeFailures': '0', 'dot1xSuppPaeState': '5', 'dot1xSuppHeldPeriod': '60', 'dot1xSuppAuthPeriod': '30', 'dot1xSuppStartPeriod': '30', 'dot1xSuppMaxStart': '3', 'dot1xSuppSuppControlledPortStatus': 'Authorized', 'dot1xSuppBackendPaeState': '2', 'dot1xSuppEapolFramesRx': '241', 'dot1xSuppEapolFramesTx': '229', 'dot1xSuppEapolStartFramesTx': '1', 'dot1xSuppEapolLogoffFramesTx': '0', 'dot1xSuppEapolRespFramesTx': '166', 'dot1xSuppEapolReqIdFramesRx': '45', 'dot1xSuppEapolReqFramesRx': '121', 'dot1xSuppInvalidEapolFramesRx': '0', 'dot1xSuppEapLengthErrorFramesRx': '0', 'dot1xSuppLastEapolFrameVersion': '2', 'dot1xSuppLastEapolFrameSource': '02:00:00:00:03:00'} MIB after test frames: {'dot11RSNAOptionImplemented': 'TRUE', 'dot11RSNAPreauthenticationImplemented': 'TRUE', 'dot11RSNAEnabled': 'FALSE', 'dot11RSNAPreauthenticationEnabled': 'FALSE', 'dot11RSNAConfigVersion': '1', 'dot11RSNAConfigPairwiseKeysSupported': '5', 'dot11RSNAConfigGroupCipherSize': '0', 'dot11RSNAConfigPMKLifetime': '43200', 'dot11RSNAConfigPMKReauthThreshold': '70', 'dot11RSNAConfigNumberOfPTKSAReplayCounters': '1', 'dot11RSNAConfigSATimeout': '60', 'dot11RSNAAuthenticationSuiteSelected': '00-00-00-0', 'dot11RSNAPairwiseCipherSelected': '00-0f-ac-0', 'dot11RSNAGroupCipherSelected': '00-0f-ac-0', 'dot11RSNAPMKIDUsed': '', 'dot11RSNAAuthenticationSuiteRequested': '00-00-00-0', 'dot11RSNAPairwiseCipherRequested': '00-0f-ac-0', 'dot11RSNAGroupCipherRequested': '00-0f-ac-0', 'dot11RSNAConfigNumberOfGTKSAReplayCounters': '0', 'dot11RSNA4WayHandshakeFailures': '0', 'dot1xSuppPaeState': '5', 'dot1xSuppHeldPeriod': '60', 'dot1xSuppAuthPeriod': '30', 'dot1xSuppStartPeriod': '30', 'dot1xSuppMaxStart': '3', 'dot1xSuppSuppControlledPortStatus': 'Authorized', 'dot1xSuppBackendPaeState': '2', 'dot1xSuppEapolFramesRx': '249', 'dot1xSuppEapolFramesTx': '229', 'dot1xSuppEapolStartFramesTx': '1', 'dot1xSuppEapolLogoffFramesTx': '0', 'dot1xSuppEapolRespFramesTx': '166', 'dot1xSuppEapolReqIdFramesRx': '45', 'dot1xSuppEapolReqFramesRx': '121', 'dot1xSuppInvalidEapolFramesRx': '2', 'dot1xSuppEapLengthErrorFramesRx': '1', 'dot1xSuppLastEapolFrameVersion': '2', 'dot1xSuppLastEapolFrameSource': '02:00:00:00:03:00'} PASS ieee8021x_proto 0.278997 2022-04-23 23:59:54.713858 passed all 1 test case(s) 2022-04-23 23:59:54 ./run-tests.py macsec_psk_br2_same_prio DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_br2_same_prio 1/1 Test: MACsec PSK (bridge; 2 devices, same mka_priority) Command "add" is unknown, try "ip link help". Skip test case: veth not supported (kernel CONFIG_VETH) SKIP macsec_psk_br2_same_prio 0.148784 2022-04-23 23:59:55.032257 passed all 0 test case(s) skipped 1 test case(s) 2022-04-23 23:59:55 ./run-tests.py mbo_without_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_without_pmf 1/1 Test: MBO and WPA2 without PMF Starting AP wlan3 PASS mbo_without_pmf 0.086975 2022-04-23 23:59:55.294948 passed all 1 test case(s) 2022-04-23 23:59:55 ./run-tests.py mesh_link_probe DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_link_probe 1/1 Test: Mesh link probing PASS mesh_link_probe 1.094728 2022-04-23 23:59:56.559891 passed all 1 test case(s) 2022-04-23 23:59:56 ./run-tests.py multi_ap_wps_split DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_wps_split 1/1 Test: WPS on split fronthaul and backhaul AP Starting AP wlan4 Starting AP wlan3 PASS multi_ap_wps_split 8.013706 2022-04-24 00:00:04.742970 passed all 1 test case(s) 2022-04-24 00:00:04 ./run-tests.py nfc_wps_handover_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_handover_errors 1/1 Test: WPS AP NFC handover report error cases Starting AP wlan3 PASS nfc_wps_handover_errors 0.116573 2022-04-24 00:00:05.028176 passed all 1 test case(s) 2022-04-24 00:00:05 ./run-tests.py olbc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START olbc 1/1 Test: OLBC detection Starting AP wlan3 Starting AP wlan4 Removing BSS wlan4 Waiting for OLBC state to time out PASS olbc 8.895397 2022-04-24 00:00:14.095303 passed all 1 test case(s) 2022-04-24 00:00:14 ./run-tests.py owe_limited_group_set_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START owe_limited_group_set_pmf 1/1 Test: Opportunistic Wireless Encryption and limited group set (PMF) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Association Response frame status codes: ['77', '77', '0'] PASS owe_limited_group_set_pmf 0.70716 2022-04-24 00:00:14.974378 passed all 1 test case(s) 2022-04-24 00:00:15 ./run-tests.py owe_transition_mode_mismatch2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START owe_transition_mode_mismatch2 1/1 Test: Opportunistic Wireless Encryption transition mode (mismatch 2) Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Move to OWE only mode (disable transition mode) PASS owe_transition_mode_mismatch2 0.718039 2022-04-24 00:00:15.857975 passed all 1 test case(s) 2022-04-24 00:00:15 ./run-tests.py p2ps_stale_group_removal2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_stale_group_removal2 1/1 Test: P2PS stale group removal (2) Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS p2ps_stale_group_removal2 2.12961 2022-04-24 00:00:18.157307 passed all 1 test case(s) 2022-04-24 00:00:18 ./run-tests.py proxyarp_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START proxyarp_errors 1/1 Test: ProxyARP error cases Starting AP wlan3 Connect STA wlan0 to AP PASS proxyarp_errors 0.878289 2022-04-24 00:00:19.200770 passed all 1 test case(s) 2022-04-24 00:00:19 ./run-tests.py rrm_beacon_req_table DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_table 1/1 Test: Beacon request - beacon table mode Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Received beacon report: opclass=81 channel=1 start=0 duration=0 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 frame_body=4bc432255bdd050064000114000372726d010882848b960c1218240301012a010432043048606c460570000000003b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00 fragment_id=0100 Received beacon report: opclass=81 channel=1 start=0 duration=0 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:04:00 antenna_id=0 parent_tsf=0 frame_body=adc532255bdd0500640001040007616e6f74686572010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00 fragment_id=0100 PASS rrm_beacon_req_table 0.236651 2022-04-24 00:00:19.602581 passed all 1 test case(s) 2022-04-24 00:00:19 ./run-tests.py rrm_neighbor_rep_req_not_supported DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_neighbor_rep_req_not_supported 1/1 Test: NEIGHBOR_REP_REQUEST for AP not supporting neighbor report Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_neighbor_rep_req_not_supported 0.220827 2022-04-24 00:00:19.993074 passed all 1 test case(s) 2022-04-24 00:00:20 ./run-tests.py rrm_rep_parse_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_rep_parse_proto 1/1 Test: hostapd rrm report parsing protocol testing Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_rep_parse_proto 0.213543 2022-04-24 00:00:20.377197 passed all 1 test case(s) 2022-04-24 00:00:20 ./run-tests.py sae_proto_hostapd_ffc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_proto_hostapd_ffc 1/1 Test: SAE protocol testing with hostapd (FFC) Starting AP wlan3 PASS sae_proto_hostapd_ffc 0.154547 2022-04-24 00:00:20.705370 passed all 1 test case(s) 2022-04-24 00:00:20 ./run-tests.py sae_pwe_group_14 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pwe_group_14 1/1 Test: SAE PWE derivation options with group 14 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_pwe_group_14 0.481338 2022-04-24 00:00:21.355883 passed all 1 test case(s) 2022-04-24 00:00:21 ./run-tests.py scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan 1/1 Test: Control interface behavior on scan parameters Starting AP wlan3 Full scan Limited channel scan Passive single-channel scan Active single-channel scan Active single-channel scan on AP's operating channel PASS scan 7.597021 2022-04-24 00:00:29.123789 passed all 1 test case(s) 2022-04-24 00:00:29 ./run-tests.py scan_multi_bssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multi_bssid 1/1 Test: Scan and Multiple BSSID element Starting AP wlan3 Starting AP wlan4 AP 02:00:00:00:03:00: {'id': '108', 'bssid': '02:00:00:00:03:00', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0401', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1650758429418890', 'age': '0', 'ie': '0009746573742d7363616e010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00470100', 'flags': '[ESS]', 'ssid': 'test-scan', 'snr': '59', 'est_throughput': '65000', 'update_idx': '126', 'beacon_ie': '0009746573742d7363616e010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00470100'} AP 02:00:00:00:04:00: {'id': '109', 'bssid': '02:00:00:00:04:00', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0401', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1650758429419236', 'age': '0', 'ie': '0009746573742d7363616e010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00470d01000a53020104000131550101', 'flags': '[ESS]', 'ssid': 'test-scan', 'snr': '59', 'est_throughput': '65000', 'update_idx': '126', 'beacon_ie': '0009746573742d7363616e010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00470d01000a53020104000131550101'} AP 02:00:00:00:04:01: {'id': '110', 'bssid': '02:00:00:00:04:01', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0401', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1650758429419236', 'age': '0', 'ie': '000131010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550101', 'flags': '[ESS]', 'ssid': '1', 'snr': '59', 'est_throughput': '65000', 'update_idx': '126', 'beacon_ie': '000131010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550101'} PASS scan_multi_bssid 0.269477 2022-04-24 00:00:29.557324 passed all 1 test case(s) 2022-04-24 00:00:29 ./run-tests.py sigma_dut_ap_sae DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_sae 1/1 Test: sigma_dut controlled AP with SAE Skip test case: sigma_dut not available SKIP sigma_dut_ap_sae 0.127267 2022-04-24 00:00:29.857290 passed all 0 test case(s) skipped 1 test case(s) 2022-04-24 00:00:29 ./run-tests.py sigma_dut_dpp_tcp_configurator_init_mutual DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_tcp_configurator_init_mutual 1/1 Test: sigma_dut DPP TCP Configurator as initiator with mutual authentication Skip test case: sigma_dut not available SKIP sigma_dut_dpp_tcp_configurator_init_mutual 0.072091 2022-04-24 00:00:30.099988 passed all 0 test case(s) skipped 1 test case(s) 2022-04-24 00:00:30 ./run-tests.py sigma_dut_preconfigured_profile DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_preconfigured_profile 1/1 Test: sigma_dut controlled connection using preconfigured profile Skip test case: sigma_dut not available SKIP sigma_dut_preconfigured_profile 0.072959 2022-04-24 00:00:30.343069 passed all 0 test case(s) skipped 1 test case(s) 2022-04-24 00:00:30 ./run-tests.py sigma_dut_psk_pmf_bip_gmac_256_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_psk_pmf_bip_gmac_256_mismatch 1/1 Test: sigma_dut controlled PSK+PMF association with BIP-GMAC-256 mismatch Skip test case: sigma_dut not available SKIP sigma_dut_psk_pmf_bip_gmac_256_mismatch 0.072815 2022-04-24 00:00:30.585633 passed all 0 test case(s) skipped 1 test case(s) 2022-04-24 00:00:30 ./run-tests.py sigma_dut_sae_h2e_ap_h2e DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_sae_h2e_ap_h2e 1/1 Test: sigma_dut controlled SAE H2E association (AP using H2E-only) Starting AP wlan3 Skip test case: sigma_dut not available SKIP sigma_dut_sae_h2e_ap_h2e 0.134878 2022-04-24 00:00:30.895976 passed all 0 test case(s) skipped 1 test case(s) 2022-04-24 00:00:30 ./run-tests.py sigma_dut_sae_pw_id_pwe_loop DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_sae_pw_id_pwe_loop 1/1 Test: sigma_dut controlled SAE association with Password Identifier and forced PWE looping Skip test case: sigma_dut not available SKIP sigma_dut_sae_pw_id_pwe_loop 0.073069 2022-04-24 00:00:31.139054 passed all 0 test case(s) skipped 1 test case(s) 2022-04-24 00:00:31 ./run-tests.py sta_dynamic_random_mac_addr_keep_oui DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sta_dynamic_random_mac_addr_keep_oui 1/1 Test: Dynamically added wpa_supplicant interface and random MAC address (keep OUI) Starting AP wlan3 Connect STA wlan5 to AP Connect STA wlan5 to AP PASS sta_dynamic_random_mac_addr_keep_oui 0.575372 2022-04-24 00:00:31.884067 passed all 1 test case(s) 2022-04-24 00:00:31 ./run-tests.py tnc_peap_soh DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tnc_peap_soh 1/1 Test: TNC PEAP-SoH Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS tnc_peap_soh 0.514951 2022-04-24 00:00:32.573034 passed all 1 test case(s) 2022-04-24 00:00:32 ./run-tests.py wnm_bss_transition_mgmt DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_transition_mgmt 1/1 Test: WNM BSS Transition Management Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_bss_transition_mgmt 0.192692 2022-04-24 00:00:32.940085 passed all 1 test case(s) 2022-04-24 00:00:32 ./run-tests.py wpa2_ocv_ap_override_fils_assoc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_ap_override_fils_assoc 1/1 Test: OCV on 2.4 GHz and AP override FILS association Starting AP as-erp Starting AP wlan3 Connect STA wlan0 to AP PASS wpa2_ocv_ap_override_fils_assoc 0.312937 2022-04-24 00:00:33.422640 passed all 1 test case(s) 2022-04-24 00:00:33 ./run-tests.py wps_ext_m3_missing_e_hash1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_m3_missing_e_hash1 1/1 Test: WPS proto: M3 missing E-Hash1 Starting AP wlan3 PASS wps_ext_m3_missing_e_hash1 0.290222 2022-04-24 00:00:33.884990 passed all 1 test case(s) 2022-04-24 00:00:33 ./run-tests.py wps_ext_proto_ack_m3_r_nonce_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_ack_m3_r_nonce_mismatch 1/1 Test: WPS and ACK M3 R-Nonce mismatch Starting AP wlan3 PASS wps_ext_proto_ack_m3_r_nonce_mismatch 0.315255 2022-04-24 00:00:34.371384 passed all 1 test case(s) 2022-04-24 00:00:34 ./run-tests.py wps_ext_proto_m2_no_public_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_m2_no_public_key 1/1 Test: WPS and no Public Key in M2 Starting AP wlan3 PASS wps_ext_proto_m2_no_public_key 0.250391 2022-04-24 00:00:34.793534 passed all 1 test case(s) 2022-04-24 00:00:34 ./run-tests.py wps_ext_proto_m4_invalid_pad_string DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_m4_invalid_pad_string 1/1 Test: WPS and invalid pad string in M4 Starting AP wlan3 PASS wps_ext_proto_m4_invalid_pad_string 0.243749 2022-04-24 00:00:35.208454 passed all 1 test case(s) 2022-04-24 00:00:35 ./stop.sh