2023-03-23 11:02:38 export USER=root 2023-03-23 11:02:38 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2023-03-23 11:03:17 ./start.sh 2023-03-23 11:03:17 ./run-tests.py ap_acs_rx_during DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_acs_rx_during 1/1 Test: Automatic channel selection and RX during ACS Starting AP wlan3 Removing BSS wlan3 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_acs_rx_during 6.348582 2023-03-23 11:03:25.176786 passed all 1 test case(s) 2023-03-23 11:03:25 ./run-tests.py ap_airtime_policy_static DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_airtime_policy_static 1/1 Test: Airtime policy - static Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_airtime_policy_static 2.894086 2023-03-23 11:03:28.471198 passed all 1 test case(s) 2023-03-23 11:03:28 ./run-tests.py ap_cipher_replay_protection_sta_tkip DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cipher_replay_protection_sta_tkip 1/1 Test: TKIP replay protection on STA (TK) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_cipher_replay_protection_sta_tkip 3.549925 2023-03-23 11:03:32.421645 passed all 1 test case(s) 2023-03-23 11:03:32 ./run-tests.py ap_cli_order DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cli_order 1/1 Test: hostapd configuration parameter SET ordering Starting AP wlan3 Connect STA wlan0 to AP PASS ap_cli_order 1.197627 2023-03-23 11:03:33.996077 passed all 1 test case(s) 2023-03-23 11:03:34 ./run-tests.py ap_config_reload_file_while_disabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_config_reload_file_while_disabled 1/1 Test: hostapd configuration reload from file when disabled Starting interface wlan3 Connect STA wlan0 to AP PASS ap_config_reload_file_while_disabled 1.67059 2023-03-23 11:03:36.063815 passed all 1 test case(s) 2023-03-23 11:03:36 ./run-tests.py ap_ft_ap_oom6 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_ap_oom6 1/1 Test: WPA2-PSK-FT and AP OOM 6 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_ft_ap_oom6 5.088345 2023-03-23 11:03:41.546067 passed all 1 test case(s) 2023-03-23 11:03:41 ./run-tests.py ap_ft_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_oom 1/1 Test: WPA2-PSK-FT and OOM Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS ap_ft_oom 2.207929 2023-03-23 11:03:44.129582 passed all 1 test case(s) 2023-03-23 11:03:44 ./run-tests.py ap_hs20_aka_prime DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_aka_prime 1/1 Test: Hotspot 2.0 with simulated USIM and EAP-AKA' Starting AP wlan3 PASS ap_hs20_aka_prime 1.470355 2023-03-23 11:03:45.979968 passed all 1 test case(s) 2023-03-23 11:03:46 ./run-tests.py ap_hs20_cred_with_nai_realm DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_cred_with_nai_realm 1/1 Test: Hotspot 2.0 network selection and cred_with_nai_realm cred->realm Starting AP wlan3 PASS ap_hs20_cred_with_nai_realm 1.057721 2023-03-23 11:03:47.414579 passed all 1 test case(s) 2023-03-23 11:03:47 ./run-tests.py ap_hs20_domain_suffix_match DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_domain_suffix_match 1/1 Test: Hotspot 2.0 and domain_suffix_match Starting AP wlan3 PASS ap_hs20_domain_suffix_match 1.4881 2023-03-23 11:03:49.274782 passed all 1 test case(s) 2023-03-23 11:03:49 ./run-tests.py ap_hs20_fetch_osu_stop DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_fetch_osu_stop 1/1 Test: Hotspot 2.0 OSU provider fetch stopped Starting AP wlan3 PASS ap_hs20_fetch_osu_stop 16.273817 2023-03-23 11:04:05.909764 passed all 1 test case(s) 2023-03-23 11:04:05 ./run-tests.py ap_hs20_multiple_connects DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_multiple_connects 1/1 Test: Hotspot 2.0 connection through multiple network selections Starting AP wlan3 Starting Interworking network selection Starting Interworking network selection Starting Interworking network selection PASS ap_hs20_multiple_connects 2.195275 2023-03-23 11:04:08.477730 passed all 1 test case(s) 2023-03-23 11:04:08 ./run-tests.py ap_hs20_release_number_1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_release_number_1 1/1 Test: Hotspot 2.0 with AP claiming support for Release 1 Starting AP wlan3 PASS ap_hs20_release_number_1 1.647781 2023-03-23 11:04:10.521428 passed all 1 test case(s) 2023-03-23 11:04:10 ./run-tests.py ap_hs20_session_info DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_session_info 1/1 Test: Hotspot 2.0 connection and session information from RADIUS Starting AP wlan3 PASS ap_hs20_session_info 17.226798 2023-03-23 11:04:28.118645 passed all 1 test case(s) 2023-03-23 11:04:28 ./run-tests.py ap_open_drop_duplicate DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_drop_duplicate 1/1 Test: AP dropping duplicate management frames Starting AP wlan3 PASS ap_open_drop_duplicate 1.084337 2023-03-23 11:04:29.585704 passed all 1 test case(s) 2023-03-23 11:04:29 ./run-tests.py ap_open_multicast_to_unicast DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_multicast_to_unicast 1/1 Test: Multicast-to-unicast conversion enabled Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_multicast_to_unicast 1.251921 2023-03-23 11:04:31.230648 passed all 1 test case(s) 2023-03-23 11:04:31 ./run-tests.py ap_open_tdls_vht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_tdls_vht 1/1 Test: Open AP and two stations using TDLS Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Setup TDLS Teardown TDLS Setup TDLS Teardown TDLS PASS ap_open_tdls_vht 9.425144 2023-03-23 11:04:41.031460 passed all 1 test case(s) 2023-03-23 11:04:41 ./run-tests.py ap_open_wpas_in_bridge DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_wpas_in_bridge 1/1 Test: Open mode AP and wpas interface in a bridge Starting AP wlan3 Ignore expected interface_add failure due to missing bridge interface: Failed to add a dynamic wpa_supplicant interface Connect STA wlan5 to AP PASS ap_open_wpas_in_bridge 1.907992 2023-03-23 11:04:43.329998 passed all 1 test case(s) 2023-03-23 11:04:43 ./run-tests.py ap_pmf_ap_dropping_sa DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_ap_dropping_sa 1/1 Test: WPA2-PSK PMF AP dropping SA Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_ap_dropping_sa 2.372533 2023-03-23 11:04:46.102297 passed all 1 test case(s) 2023-03-23 11:04:46 ./run-tests.py ap_pmf_required_sta_no_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_required_sta_no_pmf 1/1 Test: WPA2-PSK AP with PMF required and PMF disabled on STA Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_required_sta_no_pmf 0.833295 2023-03-23 11:04:47.312430 passed all 1 test case(s) 2023-03-23 11:04:47 ./run-tests.py ap_pmf_sa_query_timeout DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_sa_query_timeout 1/1 Test: SA Query timeout Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_sa_query_timeout 6.002728 2023-03-23 11:04:53.694286 passed all 1 test case(s) 2023-03-23 11:04:53 ./run-tests.py ap_remove_during_ht_coex_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_remove_during_ht_coex_scan 1/1 Test: Remove interface during HT co-ex scan Starting AP wlan3 Removing BSS wlan3 PASS ap_remove_during_ht_coex_scan 2.060462 2023-03-23 11:04:56.142305 passed all 1 test case(s) 2023-03-23 11:04:56 ./run-tests.py ap_track_taxonomy DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_track_taxonomy 1/1 Test: AP tracking STA taxonomy Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan5 to AP sta0: wifi4|probe:0,1,50,3,45,127,107,255,255,221(0050f2,4),221(506f9a,9),114,221(506f9a,16),221(506f9a,22),htcap:107e,htagg:1b,htmcs:0000ffff,extcap:04004a8201404040000120,wps:_|assoc:0,1,50,45,127,59,221(0050f2,2),htcap:107e,htagg:1b,htmcs:0000ffff,extcap:04004a8201404040000120 sta1: wifi4|probe:0,1,50,3,45,127,114,255,255,221(506f9a,22),htcap:107e,htagg:1b,htmcs:0000ffff,extcap:04004a0201404040000120|assoc:0,1,50,45,127,59,221(0050f2,2),htcap:107e,htagg:1b,htmcs:0000ffff,extcap:04004a0201404040000120 sta: wifi4|probe:0,1,50,3,45,127,255,255,221(0050f2,4),221(506f9a,9),114,221(506f9a,22),htcap:107e,htagg:1b,htmcs:0000ffff,extcap:04004a0201404040000120,wps:track_test|assoc:0,1,50,45,127,59,221(0050f2,2),htcap:107e,htagg:1b,htmcs:0000ffff,extcap:04004a0201404040000120 Connect STA wlan2 to AP sta2: wifi4|probe:0,1,50,3,45,127,255,255,221(0050f2,4),221(506f9a,9),114,221(506f9a,22),htcap:107e,htagg:1b,htmcs:0000ffff,extcap:04004a0201404040000120,wps:_|assoc:0,1,50,45,127,59,221(0050f2,2),htcap:107e,htagg:1b,htmcs:0000ffff,extcap:04004a0201404040000120 flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:03:00 2437 -20 [ESS] track flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:03:00 2437 -20 [ESS] track flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:03:00 2437 -20 [ESS] track PASS ap_track_taxonomy 4.227027 2023-03-23 11:05:00.746691 passed all 1 test case(s) 2023-03-23 11:05:00 ./run-tests.py ap_vht160_no_dfs_116_plus DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht160_no_dfs_116_plus 1/1 Test: VHT with 160 MHz channel width and no DFS (116 plus) Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS ap_vht160_no_dfs_116_plus 2.051738 2023-03-23 11:05:03.189767 passed all 1 test case(s) 2023-03-23 11:05:03 ./run-tests.py ap_vht80c DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80c 1/1 Test: VHT with 80 MHz channel width (HT40+ channel 44) Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS ap_vht80c 2.363772 2023-03-23 11:05:05.939612 passed all 1 test case(s) 2023-03-23 11:05:06 ./run-tests.py ap_vht_csa_vht40 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht_csa_vht40 1/1 Test: VHT CSA with VHT40 getting enabled Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_vht_csa_vht40 3.725083 2023-03-23 11:05:10.047957 passed all 1 test case(s) 2023-03-23 11:05:10 ./run-tests.py ap_vht_on_24ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht_on_24ghz 1/1 Test: Subset of VHT features on 2.4 GHz Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_vht_on_24ghz 1.791555 2023-03-23 11:05:12.210992 passed all 1 test case(s) 2023-03-23 11:05:12 ./run-tests.py ap_wpa2_eap_reauth_ptk_rekey_blocked_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_reauth_ptk_rekey_blocked_ap 1/1 Test: WPA2-Enterprise and Authenticator forcing reauthentication with PTK rekey blocked on AP Starting AP wlan3 Connect STA wlan0 to AP Wait for disconnect due to reauth Timeout on reconnect Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 5360, in test_ap_wpa2_eap_reauth_ptk_rekey_blocked_ap raise Exception("Timeout on reconnect") Exception: Timeout on reconnect FAIL ap_wpa2_eap_reauth_ptk_rekey_blocked_ap 4.139917 2023-03-23 11:05:16.727330 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_eap_reauth_ptk_rekey_blocked_ap 2023-03-23 11:05:16 ./run-tests.py ap_wpa2_eap_tls_neg_altsubject_match DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_neg_altsubject_match 1/1 Test: WPA2-Enterprise negative test - altsubject mismatch Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_neg_altsubject_match 2.478063 2023-03-23 11:05:19.621865 passed all 1 test case(s) 2023-03-23 11:05:19 ./run-tests.py ap_wpa2_eap_ttls_ocsp_revoked DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_ocsp_revoked 1/1 Test: WPA2-Enterprise connection using EAP-TTLS and OCSP status revoked openssl ocsp -index auth_serv/index-revoked.txt -rsigner auth_serv/ocsp-responder.pem -rkey auth_serv/ocsp-responder.key -CA auth_serv/ca.pem -issuer auth_serv/ca.pem -verify_other auth_serv/ca.pem -trust_other -ndays 7 -reqin auth_serv/ocsp-req.der -respout logs/current/ocsp-server-cache-revoked.der openssl result: Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_ocsp_revoked 1.207511 2023-03-23 11:05:21.215090 passed all 1 test case(s) 2023-03-23 11:05:21 ./run-tests.py ap_wpa2_gtk_rekey_fail_1_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_gtk_rekey_fail_1_sta 1/1 Test: WPA2-PSK AP and GTK rekey failing with one STA Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_wpa2_gtk_rekey_fail_1_sta 10.399236 2023-03-23 11:05:31.992395 passed all 1 test case(s) 2023-03-23 11:05:32 ./run-tests.py ap_wpa2_gtk_rekey_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_gtk_rekey_failure 1/1 Test: WPA2-PSK AP and GTK rekey failure Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_gtk_rekey_failure 1.22112 2023-03-23 11:05:33.593215 passed all 1 test case(s) 2023-03-23 11:05:33 ./run-tests.py ap_wpa2_igtk_initial_rsc_bip_cmac_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_igtk_initial_rsc_bip_cmac_256 1/1 Test: Initial management group cipher RSC (BIP-CMAC-256) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_igtk_initial_rsc_bip_cmac_256 2.331779 2023-03-23 11:05:36.314833 passed all 1 test case(s) 2023-03-23 11:05:36 ./run-tests.py ap_wpa2_psk_ext_key_id_ptk_rekey_ap0 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ext_key_id_ptk_rekey_ap0 1/1 Test: WPA2-PSK AP and PTK rekey by AP (disabled on STA) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_ext_key_id_ptk_rekey_ap0 3.309731 2023-03-23 11:05:40.006134 passed all 1 test case(s) 2023-03-23 11:05:40 ./run-tests.py ap_wps_er_http_proto_subscribe_failing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_proto_subscribe_failing 1/1 Test: WPS ER HTTP protocol testing - SUBSCRIBE failing HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 HTTP server received: POST /wps_control HTTP/1.1 HTTP header: Host: 127.0.0.1:12345 HTTP header: Content-Type: text/xml; charset="utf-8" HTTP header: Content-Length: 280 HTTP header: SOAPACTION: "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo" HTTP server received: SUBSCRIBE /wps_event HTTP/1.1 HTTP header: HOST: 127.0.0.1:12345 HTTP header: CALLBACK: HTTP header: NT: upnp:event HTTP header: TIMEOUT: Second-1800 Event URL: http://127.0.0.1:49152/event/246069652/1 PASS ap_wps_er_http_proto_subscribe_failing 0.076265 2023-03-23 11:05:40.474459 passed all 1 test case(s) 2023-03-23 11:05:40 ./run-tests.py ap_wps_wpa_cli_action DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_wpa_cli_action 1/1 Test: WPS events and wpa_cli action script Starting AP wlan3 PASS ap_wps_wpa_cli_action 2.611883 2023-03-23 11:05:43.382166 passed all 1 test case(s) 2023-03-23 11:05:43 ./run-tests.py bgscan_simple_driver_conf_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START bgscan_simple_driver_conf_failure 1/1 Test: bgscan_simple driver configuration failure Starting AP wlan3 Connect STA wlan0 to AP PASS bgscan_simple_driver_conf_failure 1.147854 2023-03-23 11:05:44.870673 passed all 1 test case(s) 2023-03-23 11:05:44 ./run-tests.py cert_check_v3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START cert_check_v3 1/1 Test: Basic test with generated X.509v3 server certificate Starting AP wlan3 Connect STA wlan0 to AP PASS cert_check_v3 1.275978 2023-03-23 11:05:46.570451 passed all 1 test case(s) 2023-03-23 11:05:46 ./run-tests.py dbus_autoscan_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_autoscan_oom 1/1 Test: D-Bus Autoscan() OOM PASS dbus_autoscan_oom 0.0671 2023-03-23 11:05:47.010933 passed all 1 test case(s) 2023-03-23 11:05:47 ./run-tests.py dbus_get_set_wps DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_get_set_wps 1/1 Test: D-Bus Get/Set for WPS properties PASS dbus_get_set_wps 1.244191 2023-03-23 11:05:48.536691 passed all 1 test case(s) 2023-03-23 11:05:48 ./run-tests.py dbus_p2p_ip_addr DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_p2p_ip_addr 1/1 Test: D-Bus P2P and IP address parameters PASS dbus_p2p_ip_addr 2.603987 2023-03-23 11:05:51.517303 passed all 1 test case(s) 2023-03-23 11:05:51 ./run-tests.py dbus_scan_interval DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_scan_interval 1/1 Test: D-Bus Get/Set ScanInterval PASS dbus_scan_interval 0.064597 2023-03-23 11:05:52.240528 passed all 1 test case(s) 2023-03-23 11:05:52 ./run-tests.py dfs_cac_restart_on_enable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dfs_cac_restart_on_enable 1/1 Test: DFS CAC interrupted and restarted Starting AP wlan3 on DFS channel Starting AP wlan3 Country code at the end: 00 PASS dfs_cac_restart_on_enable 1.773678 2023-03-23 11:05:54.298570 passed all 1 test case(s) 2023-03-23 11:05:54 ./run-tests.py dpp_config_jwk_error_invalid_y DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jwk_error_invalid_y 1/1 Test: DPP Config Object JWK error - invalid y dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jwk_error_invalid_y 2.282819 2023-03-23 11:05:56.973270 passed all 1 test case(s) 2023-03-23 11:05:57 ./run-tests.py dpp_config_jwk_error_no_crv DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jwk_error_no_crv 1/1 Test: DPP Config Object JWK error - no crv dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jwk_error_no_crv 2.335675 2023-03-23 11:05:59.734702 passed all 1 test case(s) 2023-03-23 11:05:59 ./run-tests.py dpp_controller_rx_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_controller_rx_errors 1/1 Test: DPP Controller RX error cases PASS dpp_controller_rx_errors 0.068976 2023-03-23 11:06:00.218790 passed all 1 test case(s) 2023-03-23 11:06:00 ./run-tests.py dpp_pkex_p384 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_p384 1/1 Test: DPP and PKEX (P-384) PASS dpp_pkex_p384 2.50379 2023-03-23 11:06:03.004103 passed all 1 test case(s) 2023-03-23 11:06:03 ./run-tests.py dpp_proto_conf_req_invalid_config_attr_obj DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_conf_req_invalid_config_attr_obj 1/1 Test: DPP protocol testing - invalid Config Attr Obj in Conf Req PASS dpp_proto_conf_req_invalid_config_attr_obj 2.355216 2023-03-23 11:06:05.715787 passed all 1 test case(s) 2023-03-23 11:06:05 ./run-tests.py dpp_push_button_i_hash_mismatch_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_push_button_i_hash_mismatch_ap 1/1 Test: DPP push button - Initiator hash mismatch from AP Skip test case: DPP version 3 not supported SKIP dpp_push_button_i_hash_mismatch_ap 0.060246 2023-03-23 11:06:06.155372 passed all 0 test case(s) skipped 1 test case(s) 2023-03-23 11:06:06 ./run-tests.py dpp_qr_code_auth_incompatible_roles DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_auth_incompatible_roles 1/1 Test: DPP QR Code and authentication exchange (incompatible roles) dev0 displays QR Code dev1 scans QR Code dev1 initiates DPP Authentication PASS dpp_qr_code_auth_incompatible_roles 2.308293 2023-03-23 11:06:08.880234 passed all 1 test case(s) 2023-03-23 11:06:08 ./run-tests.py dpp_truncated_attr DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_truncated_attr 1/1 Test: DPP and truncated attribute PASS dpp_truncated_attr 2.307732 2023-03-23 11:06:11.653736 passed all 1 test case(s) 2023-03-23 11:06:11 ./run-tests.py eap_proto_otp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_otp 1/1 Test: EAP-OTP protocol tests Starting AP wlan3 Connect STA wlan0 to AP otp_handler - RX 022f00090175736572 Test: Empty payload otp_handler - RX 0202000d0570617373776f7264 Test: Success Connect STA wlan0 to AP otp_handler - RX 023e00090175736572 Test: Challenge included otp_handler - RX 0204000d0570617373776f7264 Test: Success PASS eap_proto_otp 1.872407 2023-03-23 11:06:13.943045 passed all 1 test case(s) 2023-03-23 11:06:14 ./run-tests.py fils_sk_pmksa_caching_ctrl_ext DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_pmksa_caching_ctrl_ext 1/1 Test: FILS SK and PMKSA caching with Cache Identifier and external management Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PMKSA_GET: 02:00:00:00:03:00 5fd64c35f1de234522f93643ca026ebc c7e117bf6ab0b528626f6789bd1a3220286681d9a6684c8600afc5282b8bfd97e41721dee033c8968ab6681ec6ba34f4 30240 43200 524288 0 ffee Starting AP wlan4 (old add_ap argument type) PASS fils_sk_pmksa_caching_ctrl_ext 2.393227 2023-03-23 11:06:16.721719 passed all 1 test case(s) 2023-03-23 11:06:16 ./run-tests.py fst_sta_connect_to_non_fst_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_connect_to_non_fst_ap 1/1 Test: FST STA connecting to non-FST AP Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Starting AP wlan7 (old add_ap argument type) Connect STA wlan6 to AP PASS fst_sta_connect_to_non_fst_ap 5.052769 2023-03-23 11:06:22.166796 passed all 1 test case(s) 2023-03-23 11:06:22 ./run-tests.py fst_sta_start_session_broadcast_peer_addr DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_start_session_broadcast_peer_addr 1/1 Test: FST STA start session - broadcast peer addr Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (Peer address) PASS fst_sta_start_session_broadcast_peer_addr 2.935138 2023-03-23 11:06:25.495392 passed all 1 test case(s) 2023-03-23 11:06:25 ./run-tests.py go_neg_pin_vs_pbc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START go_neg_pin_vs_pbc 1/1 Test: P2P GO Negotiation with one device using PIN and the other PBC wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 PASS go_neg_pin_vs_pbc 1.128564 2023-03-23 11:06:27.005206 passed all 1 test case(s) 2023-03-23 11:06:27 ./run-tests.py grpform_no_5ghz_add_cli4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_no_5ghz_add_cli4 1/1 Test: P2P group formation with passive scan 5 GHz and p2p_add_cli_chan=1 (reverse; intent 15) Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS grpform_no_5ghz_add_cli4 3.510302 2023-03-23 11:06:30.895435 passed all 1 test case(s) 2023-03-23 11:06:30 ./run-tests.py he_40 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_40 1/1 Test: HE and 40 MHz channel Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS he_40 2.037977 2023-03-23 11:06:33.318470 passed all 1 test case(s) 2023-03-23 11:06:33 ./run-tests.py mbo_supp_oper_classes_jp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_supp_oper_classes_jp 1/1 Test: MBO and supported operating classes (JP) Starting AP wlan3 Starting AP wlan4 Country: JP Connect STA wlan0 to AP Connect STA wlan0 to AP Country code at the end (1): JP Country code at the end (2): 00 Country code at the end (3): 00 PASS mbo_supp_oper_classes_jp 3.046954 2023-03-23 11:06:36.751511 passed all 1 test case(s) 2023-03-23 11:06:36 ./run-tests.py mesh_secure_ccmp_256_cmac_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_ccmp_256_cmac_256 1/1 Test: Secure mesh with CCMP-256 and BIP-CMAC-256 PASS mesh_secure_ccmp_256_cmac_256 2.142019 2023-03-23 11:06:39.276232 passed all 1 test case(s) 2023-03-23 11:06:39 ./run-tests.py nfc_p2p_responder_go DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_responder_go 1/1 Test: NFC connection handover with responder already GO Start autonomous GO Perform NFC connection handover PASS nfc_p2p_responder_go 2.374067 2023-03-23 11:06:41.986386 passed all 1 test case(s) 2023-03-23 11:06:42 ./run-tests.py owe_transition_mode_ifname_acs2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START owe_transition_mode_ifname_acs2 1/1 Test: Opportunistic Wireless Encryption transition mode (ifname, ACS) Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS owe_transition_mode_ifname_acs2 16.060677 2023-03-23 11:06:58.457457 passed all 1 test case(s) 2023-03-23 11:06:58 ./run-tests.py p2p_channel_avoid2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_channel_avoid2 1/1 Test: P2P and avoid frequencies driver event on 5 GHz Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:00:00 5180 -27 [WPA2-PSK-CCMP][WPS-AUTH][ESS][P2P] DIRECT-DT PASS p2p_channel_avoid2 5.198449 2023-03-23 11:07:04.049116 passed all 1 test case(s) 2023-03-23 11:07:04 ./run-tests.py p2p_device_grpform_timeout_client DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_device_grpform_timeout_client 1/1 Test: P2P group formation timeout on client with cfg80211 P2P Device wlan0: Trying to discover peer 42:00:00:00:08:00 wlan7: Trying to discover peer 02:00:00:00:00:00 Remaining interfaces: p2p-dev-wlan7 wlan7 PASS p2p_device_grpform_timeout_client 13.385292 2023-03-23 11:07:17.786091 passed all 1 test case(s) 2023-03-23 11:07:17 ./run-tests.py p2p_device_join DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_device_join 1/1 Test: P2P join-group using cfg80211 P2P Device Try to connect the client to the GO wlan7: Trying to discover peer 02:00:00:00:00:00 Client connected Terminate persistent group PASS p2p_device_join 3.657482 2023-03-23 11:07:21.830345 passed all 1 test case(s) 2023-03-23 11:07:21 ./run-tests.py p2p_ext_vendor_elem_pd_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_ext_vendor_elem_pd_req 1/1 Test: VENDOR_ELEM in PD Request frames wlan0: Trying to discover peer 02:00:00:00:01:00 PASS p2p_ext_vendor_elem_pd_req 0.45701 2023-03-23 11:07:22.675160 passed all 1 test case(s) 2023-03-23 11:07:22 ./run-tests.py persistent_group_peer_dropped DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START persistent_group_peer_dropped 1/1 Test: P2P persistent group formation and re-invocation with peer having dropped group Form a persistent group Start GO negotiation wlan1 -> wlan0 wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 Group formed Terminate persistent group Re-invoke persistent group from client wlan1: Trying to discover peer 02:00:00:00:00:00 Terminate persistent group Remove group on the GO and try to invite from the client wlan1: Trying to discover peer 02:00:00:00:00:00 Verify that a new group can be formed Form a persistent group Start GO negotiation wlan1 -> wlan0 wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 Group formed Terminate persistent group PASS persistent_group_peer_dropped 9.044502 2023-03-23 11:07:32.056444 passed all 1 test case(s) 2023-03-23 11:07:32 ./run-tests.py rrm_beacon_req_active_ap_channels DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_active_ap_channels 1/1 Test: Beacon request - active scan mode with AP Channel Report subelement Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Received beacon report: opclass=81 channel=1 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=1217925395 frame_body=131198488ff7050064000114000372726d010882848b960c1218240301012a010432043048606c460570000000003b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00 fragment_id=0100 Received beacon report: opclass=81 channel=11 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:04:00 antenna_id=0 parent_tsf=1217925395 frame_body=a3f198488ff70500640001040007616e6f74686572010882848b960c12182403010b2a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d160b0000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00 fragment_id=0100 PASS rrm_beacon_req_active_ap_channels 1.97085 2023-03-23 11:07:34.463437 passed all 1 test case(s) 2023-03-23 11:07:34 ./run-tests.py sae DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae 1/1 Test: SAE with default group Starting AP wlan3 Connect STA wlan0 to AP PASS sae 1.123103 2023-03-23 11:07:35.879368 passed all 1 test case(s) 2023-03-23 11:07:35 ./run-tests.py sae_anti_clogging_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_anti_clogging_proto 1/1 Test: SAE anti clogging protocol testing Starting AP wlan3 Connect STA wlan0 to AP PASS sae_anti_clogging_proto 1.035613 2023-03-23 11:07:37.207767 passed all 1 test case(s) 2023-03-23 11:07:37 ./run-tests.py sae_connect_cmd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_connect_cmd 1/1 Test: SAE with connect command Starting AP wlan3 Connect STA wlan5 to AP PASS sae_connect_cmd 7.354149 2023-03-23 11:07:44.990451 passed all 1 test case(s) 2023-03-23 11:07:45 ./run-tests.py sae_h2e_rejected_groups_unexpected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_h2e_rejected_groups_unexpected 1/1 Test: SAE H2E and rejected groups indication (unexpected group) Starting AP wlan3 Connect STA wlan0 to AP PASS sae_h2e_rejected_groups_unexpected 3.879212 2023-03-23 11:07:49.252243 passed all 1 test case(s) 2023-03-23 11:07:49 ./run-tests.py sae_no_random DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_no_random 1/1 Test: SAE and no random numbers available Starting AP wlan3 Connect STA wlan0 to AP PASS sae_no_random 1.44455 2023-03-23 11:07:51.086361 passed all 1 test case(s) 2023-03-23 11:07:51 ./run-tests.py sae_okc_pmk_lifetime DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_okc_pmk_lifetime 1/1 Test: SAE and opportunistic key caching and PMK lifetime Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS sae_okc_pmk_lifetime 7.390759 2023-03-23 11:07:58.867427 passed all 1 test case(s) 2023-03-23 11:07:58 ./run-tests.py sigma_dut_ap_ht40plus DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_ht40plus 1/1 Test: sigma_dut controlled AP and HT40+ Skip test case: sigma_dut not available SKIP sigma_dut_ap_ht40plus 0.198519 2023-03-23 11:07:59.452114 passed all 0 test case(s) skipped 1 test case(s) 2023-03-23 11:07:59 ./run-tests.py sigma_dut_ap_owe DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_owe 1/1 Test: sigma_dut controlled AP with OWE Skip test case: sigma_dut not available SKIP sigma_dut_ap_owe 0.176374 2023-03-23 11:07:59.911691 passed all 0 test case(s) skipped 1 test case(s) 2023-03-23 11:07:59 ./run-tests.py sigma_dut_owe DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_owe 1/1 Test: sigma_dut controlled OWE station Skip test case: sigma_dut not available SKIP sigma_dut_owe 0.060084 2023-03-23 11:08:00.255953 passed all 0 test case(s) skipped 1 test case(s) 2023-03-23 11:08:00 ./run-tests.py sigma_dut_psk_pmf_bip_gmac_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_psk_pmf_bip_gmac_256 1/1 Test: sigma_dut controlled PSK+PMF association with BIP-GMAC-256 Skip test case: sigma_dut not available SKIP sigma_dut_psk_pmf_bip_gmac_256 0.065769 2023-03-23 11:08:00.605197 passed all 0 test case(s) skipped 1 test case(s) 2023-03-23 11:08:00 ./run-tests.py wnm_bss_tm_ap_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_tm_ap_proto 1/1 Test: WNM BSS TM - protocol testing for AP message parsing Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_bss_tm_ap_proto 1.120696 2023-03-23 11:08:02.210573 passed all 1 test case(s) 2023-03-23 11:08:02 ./run-tests.py wnm_bss_tm_global4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_tm_global4 1/1 Test: WNM BSS Transition Management (global; indicate table E-4) Starting AP wlan3 Connect STA wlan0 to AP Preferred Candidate List (no matching neighbor, known channels) Preferred Candidate List (no matching neighbor, unknown channels) Preferred Candidate List (no matching neighbor, unknown channels 2) Country code at the end: 00 PASS wnm_bss_tm_global4 3.186258 2023-03-23 11:08:05.784299 passed all 1 test case(s) 2023-03-23 11:08:05 ./run-tests.py wpas_config_file_set_cred DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_config_file_set_cred 1/1 Test: wpa_supplicant config file parsing/writing with arbitrary cred values Configuration file contents: ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=adm update_config=1 cred={ username="hello" } PASS wpas_config_file_set_cred 0.728697 2023-03-23 11:08:06.902118 passed all 1 test case(s) 2023-03-23 11:08:06 ./run-tests.py wpas_ctrl_network DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_network 1/1 Test: wpa_supplicant ctrl_iface network set/get PASS wpas_ctrl_network 0.086746 2023-03-23 11:08:07.376695 passed all 1 test case(s) 2023-03-23 11:08:07 ./run-tests.py wpas_ctrl_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_oom 1/1 Test: Various wpa_supplicant ctrl_iface OOM cases PASS wpas_ctrl_oom 0.266389 2023-03-23 11:08:07.927252 passed all 1 test case(s) 2023-03-23 11:08:08 ./stop.sh