2021-01-18 07:15:17 export USER=root 2021-01-18 07:15:17 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2021-01-18 07:15:55 ./start.sh 2021-01-18 07:15:56 ./run-tests.py ap_acs_vht160_scan_disable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_acs_vht160_scan_disable 1/1 Test: Automatic channel selection for VHT160 and DISABLE during scan Starting AP wlan3 Removing BSS wlan3 Starting AP wlan3 Country code at the end: 00 PASS ap_acs_vht160_scan_disable 4.534067 2021-01-18 07:16:01.537145 passed all 1 test case(s) 2021-01-18 07:16:01 ./run-tests.py ap_beacon_rate_ht2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_beacon_rate_ht2 1/1 Test: Open AP with Beacon frame TX rate HT-MCS 1 in VHT BSS Starting AP wlan3 Skip test case: Setting Beacon frame TX rate not supported SKIP ap_beacon_rate_ht2 0.441666 2021-01-18 07:16:02.110637 passed all 0 test case(s) skipped 1 test case(s) 2021-01-18 07:16:02 ./run-tests.py ap_beacon_rate_legacy DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_beacon_rate_legacy 1/1 Test: Open AP with Beacon frame TX rate 5.5 Mbps Starting AP wlan3 Connect STA wlan0 to AP PASS ap_beacon_rate_legacy 1.675754 2021-01-18 07:16:03.917328 passed all 1 test case(s) 2021-01-18 07:16:03 ./run-tests.py ap_cipher_bip DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cipher_bip 1/1 Test: WPA2-PSK with BIP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_cipher_bip 0.887131 2021-01-18 07:16:04.934558 passed all 1 test case(s) 2021-01-18 07:16:04 ./run-tests.py ap_config_reload_file DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_config_reload_file 1/1 Test: hostapd configuration reload from file Starting interface wlan3 Connect STA wlan0 to AP PASS ap_config_reload_file 0.962365 2021-01-18 07:16:06.026662 passed all 1 test case(s) 2021-01-18 07:16:06 ./run-tests.py ap_csa_1_switch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_csa_1_switch 1/1 Test: AP Channel Switch, one switch Starting AP wlan3 Connect STA wlan0 to AP PASS ap_csa_1_switch 1.827291 2021-01-18 07:16:07.983522 passed all 1 test case(s) 2021-01-18 07:16:08 ./run-tests.py ap_ft_gcmp_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_gcmp_256 1/1 Test: WPA2-PSK-FT AP with GCMP-256 cipher Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_gcmp_256 2.07804 2021-01-18 07:16:10.192471 passed all 1 test case(s) 2021-01-18 07:16:10 ./run-tests.py ap_ft_internal_rrb_check DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_internal_rrb_check 1/1 Test: RRB internal delivery only to WPA enabled BSS Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS ap_ft_internal_rrb_check 2.233382 2021-01-18 07:16:12.558592 passed all 1 test case(s) 2021-01-18 07:16:12 ./run-tests.py ap_ft_over_ds_ocv DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_over_ds_ocv 1/1 Test: WPA2-PSK-FT AP over DS Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_over_ds_ocv 1.985539 2021-01-18 07:16:14.675448 passed all 1 test case(s) 2021-01-18 07:16:14 ./run-tests.py ap_ft_ptk_rekey_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_ptk_rekey_ap 1/1 Test: WPA2-PSK-FT PTK rekeying triggered by AP after roam Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_ptk_rekey_ap 4.055358 2021-01-18 07:16:18.861389 passed all 1 test case(s) 2021-01-18 07:16:18 ./run-tests.py ap_hs20_auto_interworking DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_auto_interworking 1/1 Test: Hotspot 2.0 connection with auto_interworking=1 Starting AP wlan3 PASS ap_hs20_auto_interworking 5.074748 2021-01-18 07:16:24.059931 passed all 1 test case(s) 2021-01-18 07:16:24 ./run-tests.py ap_hs20_eap_unknown DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_eap_unknown 1/1 Test: Hotspot 2.0 connection with unknown EAP method Starting AP wlan3 PASS ap_hs20_eap_unknown 0.537017 2021-01-18 07:16:24.721301 passed all 1 test case(s) 2021-01-18 07:16:24 ./run-tests.py ap_hs20_req_conn_capab DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_req_conn_capab 1/1 Test: Hotspot 2.0 network selection with req_conn_capab Starting AP wlan3 Not used in home network Used in roaming network Verify that req_conn_capab does not prevent connection if no other network is available Additional req_conn_capab checks Starting AP wlan4 PASS ap_hs20_req_conn_capab 1.826074 2021-01-18 07:16:26.672368 passed all 1 test case(s) 2021-01-18 07:16:26 ./run-tests.py ap_ht_op_class_116 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht_op_class_116 1/1 Test: HT40 on operationg class 116 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht_op_class_116 1.597179 2021-01-18 07:16:28.394175 passed all 1 test case(s) 2021-01-18 07:16:28 ./run-tests.py ap_open_sta_enable_disable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_sta_enable_disable 1/1 Test: AP with open mode and wpa_supplicant ENABLE/DISABLE_NETWORK Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan5 to AP PASS ap_open_sta_enable_disable 0.947414 2021-01-18 07:16:29.466205 passed all 1 test case(s) 2021-01-18 07:16:29 ./run-tests.py ap_open_sta_ps DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_sta_ps 1/1 Test: Station power save operation Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_sta_ps 1.413355 2021-01-18 07:16:31.004311 passed all 1 test case(s) 2021-01-18 07:16:31 ./run-tests.py ap_pmf_beacon_protection_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_beacon_protection_mismatch 1/1 Test: WPA2-PSK Beacon protection MIC mismatch Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_beacon_protection_mismatch 2.418877 2021-01-18 07:16:33.547344 passed all 1 test case(s) 2021-01-18 07:16:33 ./run-tests.py ap_pmf_sta_sa_query_no_response DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_sta_sa_query_no_response 1/1 Test: WPA2-PSK AP with station using SA Query and getting no response Connect STA wlan0 to AP PASS ap_pmf_sta_sa_query_no_response 4.726932 2021-01-18 07:16:38.398962 passed all 1 test case(s) 2021-01-18 07:16:38 ./run-tests.py ap_vendor_elements DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vendor_elements 1/1 Test: WPA2-PSK AP with vendor elements added Starting AP wlan3 Connect STA wlan0 to AP PASS ap_vendor_elements 0.93081 2021-01-18 07:16:39.454313 passed all 1 test case(s) 2021-01-18 07:16:39 ./run-tests.py ap_vlan_file_parsing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vlan_file_parsing 1/1 Test: hostapd vlan_file/mac_file parsing Starting AP wlan3 PASS ap_vlan_file_parsing 0.413193 2021-01-18 07:16:39.992167 passed all 1 test case(s) 2021-01-18 07:16:40 ./run-tests.py ap_wpa2_eap_ext_enable_network_while_connected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ext_enable_network_while_connected 1/1 Test: WPA2-Enterprise interactive identity entry and ENABLE_NETWORK Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wpa2_eap_ext_enable_network_while_connected 1.867019 2021-01-18 07:16:41.983238 passed all 1 test case(s) 2021-01-18 07:16:42 ./run-tests.py ap_wpa2_eap_fast_eap_sim_ext DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_eap_sim_ext 1/1 Test: WPA2-Enterprise connection using EAP-FAST/EAP-SIM and external GSM auth Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_eap_sim_ext 0.888133 2021-01-18 07:16:42.999438 passed all 1 test case(s) 2021-01-18 07:16:43 ./run-tests.py ap_wpa2_eap_fast_eap_vendor DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_eap_vendor 1/1 Test: WPA2-Enterprise connection using EAP-FAST/EAP-vendor Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_eap_vendor 0.860354 2021-01-18 07:16:43.984111 passed all 1 test case(s) 2021-01-18 07:16:44 ./run-tests.py ap_wpa2_eap_peap_eap_sim DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_peap_eap_sim 1/1 Test: WPA2-Enterprise connection using EAP-PEAP/EAP-SIM Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_peap_eap_sim 0.88753 2021-01-18 07:16:45.000410 passed all 1 test case(s) 2021-01-18 07:16:45 ./run-tests.py ap_wpa2_eap_peap_eap_sim_ext DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_peap_eap_sim_ext 1/1 Test: WPA2-Enterprise connection using EAP-PEAP/EAP-SIM and external GSM auth Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_peap_eap_sim_ext 0.894483 2021-01-18 07:16:46.019412 passed all 1 test case(s) 2021-01-18 07:16:46 ./run-tests.py ap_wpa2_eap_tls_intermediate_ca_ocsp_revoked DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_intermediate_ca_ocsp_revoked 1/1 Test: EAP-TLS with intermediate server/user CA and OCSP on revoked server certificate openssl ocsp -reqout /tmp/lkp/tmpk1baiyd4 -issuer auth_serv/iCA-server/cacert.pem -sha256 -cert auth_serv/iCA-server/server-revoked.pem -no_nonce -text openssl result: OCSP Request Data: Version: 1 (0x0) Requestor List: Certificate ID: Hash Algorithm: sha256 Issuer Name Hash: FAB1B86F06B383391C5EFAA640F93045D4B1BD99310D7336B3702F491F8E1B1A Issuer Key Hash: A3384E272FD776BC182DFA0C742314020C6FCA51238325C0B8CBC7F98B904112 Serial Number: 5C9DE4A6D17A49C88375E75768F77216B2AEB783 openssl ocsp -index auth_serv/iCA-server/index.txt -rsigner auth_serv/iCA-server/cacert.pem -rkey auth_serv/iCA-server/private/cakey.pem -CA auth_serv/iCA-server/cacert.pem -issuer auth_serv/iCA-server/cacert.pem -verify_other auth_serv/iCA-server/cacert.pem -trust_other -ndays 7 -reqin /tmp/lkp/tmpk1baiyd4 -resp_no_certs -respout /tmp/lkp/tmp890wf73z -text openssl result: OCSP Request Data: Version: 1 (0x0) Requestor List: Certificate ID: Hash Algorithm: sha256 Issuer Name Hash: FAB1B86F06B383391C5EFAA640F93045D4B1BD99310D7336B3702F491F8E1B1A Issuer Key Hash: A3384E272FD776BC182DFA0C742314020C6FCA51238325C0B8CBC7F98B904112 Serial Number: 5C9DE4A6D17A49C88375E75768F77216B2AEB783 OCSP Response Data: OCSP Response Status: successful (0x0) Response Type: Basic OCSP Response Version: 1 (0x0) Responder Id: C = FI, O = w1.fi, CN = Server Intermediate CA Produced At: Jan 18 07:16:46 2021 GMT Responses: Certificate ID: Hash Algorithm: sha256 Issuer Name Hash: FAB1B86F06B383391C5EFAA640F93045D4B1BD99310D7336B3702F491F8E1B1A Issuer Key Hash: A3384E272FD776BC182DFA0C742314020C6FCA51238325C0B8CBC7F98B904112 Serial Number: 5C9DE4A6D17A49C88375E75768F77216B2AEB783 Cert Status: revoked Revocation Time: May 3 15:20:10 2020 GMT This Update: Jan 18 07:16:46 2021 GMT Next Update: Jan 25 07:16:46 2021 GMT Signature Algorithm: sha256WithRSAEncryption 3e:9f:20:52:3a:50:f1:95:59:eb:07:11:35:9e:99:e5:34:8d: c0:1c:48:49:6b:c2:21:69:ff:12:f3:8d:67:89:1f:58:7b:0b: 40:98:29:c6:1f:fb:b0:54:96:e2:e3:65:0e:04:bf:19:80:41: 8c:a4:ca:ae:3c:a4:14:2e:16:68:3a:03:35:03:f9:2c:aa:5c: 32:fa:ba:c4:74:dd:78:a0:7f:77:28:53:78:f4:59:ef:3e:d1: e4:12:05:e5:ab:50:db:ce:d4:d1:24:88:28:64:d0:2c:58:4c: 9b:9e:aa:9b:00:23:8f:a6:b1:3b:43:ca:f5:a5:bb:f7:2c:b3: 93:65:b1:64:34:f5:81:13:1f:61:07:be:9f:6f:63:cc:1d:69: 1d:a0:08:bd:1f:76:05:20:c9:11:da:17:06:d1:f8:7c:e4:30: 52:11:37:0c:d1:66:a9:b6:06:66:7d:c0:e7:40:df:c5:22:4a: cb:ea:d9:46:7b:98:b6:fa:37:7a:03:cf:32:09:03:73:64:6e: 98:18:ef:f6:33:90:85:0e:aa:fc:92:7a:af:87:f1:9a:3a:dc: a6:75:22:44:95:db:11:17:53:d0:0f:41:87:99:78:29:18:e6: e0:f1:d5:f6:34:7a:7b:2e:76:92:8f:37:fe:a8:8a:14:d5:1f: 78:85:51:90 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_intermediate_ca_ocsp_revoked 0.847318 2021-01-18 07:16:46.992710 passed all 1 test case(s) 2021-01-18 07:16:47 ./run-tests.py ap_wpa2_eap_ttls_eap_mschapv2_server_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_eap_mschapv2_server_oom 1/1 Test: WPA2-Enterprise connection using EAP-TTLS/EAP-MSCHAPv2 - server OOM Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_eap_mschapv2_server_oom 1.932255 2021-01-18 07:16:49.057195 passed all 1 test case(s) 2021-01-18 07:16:49 ./run-tests.py ap_wpa2_eap_ttls_server_cert_eku_client_server DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_server_cert_eku_client_server 1/1 Test: WPA2-Enterprise using EAP-TTLS and server cert with client and server EKU Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_server_cert_eku_client_server 0.82954 2021-01-18 07:16:50.012288 passed all 1 test case(s) 2021-01-18 07:16:50 ./run-tests.py ap_wpa2_eap_ttls_server_cert_hash DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_server_cert_hash 1/1 Test: WPA2-Enterprise connection using EAP-TTLS and server certificate hash Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_server_cert_hash 1.454199 2021-01-18 07:16:51.590287 passed all 1 test case(s) 2021-01-18 07:16:51 ./run-tests.py ap_wpa2_gtk_initial_rsc_tkip DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_gtk_initial_rsc_tkip 1/1 Test: Initial group cipher RSC (TKIP) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_gtk_initial_rsc_tkip 10.99963 2021-01-18 07:17:02.713745 passed all 1 test case(s) 2021-01-18 07:17:02 ./run-tests.py ap_wpa2_in_different_bridge DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_in_different_bridge 1/1 Test: hostapd behavior with interface in different bridge Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_in_different_bridge 1.567197 2021-01-18 07:17:04.405404 passed all 1 test case(s) 2021-01-18 07:17:04 ./run-tests.py ap_wps_er_http_client DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_client 1/1 Test: WPS ER and HTTP client special cases HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 HTTP server received: POST /wps_control HTTP/1.1 HTTP header: Host: 127.0.0.1:12345 HTTP header: Content-Type: text/xml; charset="utf-8" HTTP header: Content-Length: 280 HTTP header: SOAPACTION: "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo" HTTP server received: SUBSCRIBE /wps_event HTTP/1.1 HTTP header: HOST: 127.0.0.1:12345 HTTP header: CALLBACK: HTTP header: NT: upnp:event HTTP header: TIMEOUT: Second-1800 Event URL: http://127.0.0.1:49152/event/44733469/1 HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 PASS ap_wps_er_http_client 7.081419 2021-01-18 07:17:11.611378 passed all 1 test case(s) 2021-01-18 07:17:11 ./run-tests.py ap_wps_invalid_assoc_req_elem DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_invalid_assoc_req_elem 1/1 Test: WPS and invalid IE in Association Request frame Starting AP wlan3 PASS ap_wps_invalid_assoc_req_elem 2.895211 2021-01-18 07:17:14.631352 passed all 1 test case(s) 2021-01-18 07:17:14 ./run-tests.py dbus_tdls_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_tdls_oom 1/1 Test: D-Bus TDLS operations during OOM No dbus module available Skip test case: No dbus module available SKIP dbus_tdls_oom 0.040761 2021-01-18 07:17:14.795969 passed all 0 test case(s) skipped 1 test case(s) 2021-01-18 07:17:14 ./run-tests.py dfs_radar_chanlist_vht80 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dfs_radar_chanlist_vht80 1/1 Test: DFS chanlist when radar is detected and VHT80 configured Starting AP wlan3 on DFS channel Starting AP wlan3 Trigger a simulated radar event Connect STA wlan0 to AP Country code at the end: 00 PASS dfs_radar_chanlist_vht80 5.656441 2021-01-18 07:17:20.577178 passed all 1 test case(s) 2021-01-18 07:17:20 ./run-tests.py dpp_config_dpp_gen_prime256v1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_dpp_gen_prime256v1 1/1 Test: Generate DPP Config Object for DPP network (P-256) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication DPP authentication did not succeed (Responder) Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 859, in test_dpp_config_dpp_gen_prime256v1 configurator=True) File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 394, in run_dpp_qr_code_auth_unicast stop_responder=stop_responder) File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 3875, in wait_auth_success raise Exception("DPP authentication did not succeed (Responder)") Exception: DPP authentication did not succeed (Responder) FAIL dpp_config_dpp_gen_prime256v1 5.083848 2021-01-18 07:17:25.789959 passed 0 test case(s) skipped 0 test case(s) failed tests: dpp_config_dpp_gen_prime256v1 2021-01-18 07:17:25 ./run-tests.py dpp_config_dpp_gen_secp384r1_secp384r1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_dpp_gen_secp384r1_secp384r1 1/1 Test: Generate DPP Config Object for DPP network (P-384 + P-384) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_dpp_gen_secp384r1_secp384r1 0.2373 2021-01-18 07:17:26.158406 passed all 1 test case(s) 2021-01-18 07:17:26 ./run-tests.py dpp_config_no_csign DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_no_csign 1/1 Test: DPP Config Object error - no csign dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_no_csign 2.175501 2021-01-18 07:17:28.459757 passed all 1 test case(s) 2021-01-18 07:17:28 ./run-tests.py dpp_config_signed_connector_error_no_dot_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_signed_connector_error_no_dot_2 1/1 Test: DPP Config Object signedConnector error - no dot(2) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication DPP authentication did not succeed (Responder) Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 1144, in test_dpp_config_signed_connector_error_no_dot_2 run_dpp_config_error(dev, apdev, build_conf_obj(signed_connector=conn)) File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 1056, in run_dpp_config_error require_conf_failure=conf_failure) File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 394, in run_dpp_qr_code_auth_unicast stop_responder=stop_responder) File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 3875, in wait_auth_success raise Exception("DPP authentication did not succeed (Responder)") Exception: DPP authentication did not succeed (Responder) FAIL dpp_config_signed_connector_error_no_dot_2 5.086732 2021-01-18 07:17:33.674045 passed 0 test case(s) skipped 0 test case(s) failed tests: dpp_config_signed_connector_error_no_dot_2 2021-01-18 07:17:33 ./run-tests.py dpp_pkex_curve_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_curve_mismatch 1/1 Test: DPP and PKEX with mismatching curve PASS dpp_pkex_curve_mismatch 2.094433 2021-01-18 07:17:35.898156 passed all 1 test case(s) 2021-01-18 07:17:35 ./run-tests.py dpp_proto_auth_resp_r_auth_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_resp_r_auth_mismatch 1/1 Test: DPP protocol testing - R-auth mismatch in Auth Resp PASS dpp_proto_auth_resp_r_auth_mismatch 2.105385 2021-01-18 07:17:38.128631 passed all 1 test case(s) 2021-01-18 07:17:38 ./run-tests.py dpp_qr_code_keygen_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_keygen_fail 1/1 Test: DPP QR Code and keygen failure PASS dpp_qr_code_keygen_fail 0.044825 2021-01-18 07:17:38.298837 passed all 1 test case(s) 2021-01-18 07:17:38 ./run-tests.py dpp_two_initiators DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_two_initiators 1/1 Test: DPP and two initiators Unexpected result: <3>DPP-FAIL Configurator rejected configuration Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 4464, in test_dpp_two_initiators "DPP-FAIL Already in DPP authentication exchange - ignore new one") File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 52, in wait_dpp_fail raise Exception("Unexpected result: " + ev) Exception: Unexpected result: <3>DPP-FAIL Configurator rejected configuration FAIL dpp_two_initiators 0.073818 2021-01-18 07:17:38.497817 passed 0 test case(s) skipped 0 test case(s) failed tests: dpp_two_initiators 2021-01-18 07:17:38 ./run-tests.py ext_password_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ext_password_eap 1/1 Test: External password storage for EAP password Starting AP wlan3 Connect STA wlan0 to AP PASS ext_password_eap 0.973908 2021-01-18 07:17:39.606010 passed all 1 test case(s) 2021-01-18 07:17:39 ./run-tests.py fils_sk_pfs_26 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_pfs_26 1/1 Test: FILS SK with PFS (DH group 26) Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS fils_sk_pfs_26 1.159497 2021-01-18 07:17:40.890428 passed all 1 test case(s) 2021-01-18 07:17:40 ./run-tests.py fst_sta_start_session_bad_session_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_start_session_bad_session_id 1/1 Test: FST STA start session - bad session id Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (Session ID) PASS fst_sta_start_session_bad_session_id 2.137155 2021-01-18 07:17:43.152090 passed all 1 test case(s) 2021-01-18 07:17:43 ./run-tests.py grpform_go_neg_stopped DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_go_neg_stopped 1/1 Test: GO Negotiation stopped after TX start wlan1: Trying to discover peer 02:00:00:00:00:00 PASS grpform_go_neg_stopped 1.050386 2021-01-18 07:17:44.327727 passed all 1 test case(s) 2021-01-18 07:17:44 ./run-tests.py hapd_ctrl_eapol_reauth_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_eapol_reauth_errors 1/1 Test: hostapd and EAPOL_REAUTH errors Starting AP wlan3 PASS hapd_ctrl_eapol_reauth_errors 0.438384 2021-01-18 07:17:44.891352 passed all 1 test case(s) 2021-01-18 07:17:44 ./run-tests.py he80plus80 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he80plus80 1/1 Test: HE with 80+80 MHz channel width Starting AP wlan3 Starting AP wlan4 Connect STA wlan1 to AP PASS he80plus80 1.904203 2021-01-18 07:17:46.921377 passed all 1 test case(s) 2021-01-18 07:17:46 ./run-tests.py he_wifi_generation DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_wifi_generation 1/1 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan5 to AP Country code at the end: 00 PASS he_wifi_generation 2.032662 2021-01-18 07:17:49.079441 passed all 1 test case(s) 2021-01-18 07:17:49 ./run-tests.py ibss_rsn_tkip DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_rsn_tkip 1/1 Test: IBSS RSN with TKIP as the cipher wlan0 waiting for IBSS start/join to complete wlan1 waiting for IBSS start/join to complete wlan0 waiting for 4-way handshake completion with wlan1 02:00:00:00:01:00 wlan1 waiting for 4-way handshake completion with wlan0 02:00:00:00:00:00 PASS ibss_rsn_tkip 8.793589 2021-01-18 07:17:57.998127 passed all 1 test case(s) 2021-01-18 07:17:58 ./run-tests.py mesh_secure_gcmp_gmac DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_gcmp_gmac 1/1 Test: Secure mesh with GCMP-128 and BIP-GMAC-128 PASS mesh_secure_gcmp_gmac 1.291765 2021-01-18 07:17:59.414325 passed all 1 test case(s) 2021-01-18 07:17:59 ./run-tests.py nfc_invalid_ndef_record DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_invalid_ndef_record 1/1 Test: Invalid NFC NDEF record handling PASS nfc_invalid_ndef_record 0.042264 2021-01-18 07:17:59.580644 passed all 1 test case(s) 2021-01-18 07:17:59 ./run-tests.py nfc_wps_handover DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_handover 1/1 Test: Connect to WPS AP with NFC connection handover Starting AP wlan3 NFC connection handover PASS nfc_wps_handover 1.328063 2021-01-18 07:18:01.032241 passed all 1 test case(s) 2021-01-18 07:18:01 ./run-tests.py obss_coex_report_handling2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START obss_coex_report_handling2 1/1 Test: Overlapping BSS scan report handling with obss_interval=1 and no overlap Starting AP wlan3 Connect STA wlan0 to AP PASS obss_coex_report_handling2 3.539684 2021-01-18 07:18:04.695368 passed all 1 test case(s) 2021-01-18 07:18:04 ./run-tests.py p2ps_adv_go_persistent_no_peer_entry DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_adv_go_persistent_no_peer_entry 1/1 Test: P2PS advertisement as GO having persistent group (no peer entry) Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS p2ps_adv_go_persistent_no_peer_entry 3.303068 2021-01-18 07:18:08.123259 passed all 1 test case(s) 2021-01-18 07:18:08 ./run-tests.py radius_acct_failure_sta_data DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_acct_failure_sta_data 1/1 Test: RADIUS Accounting and failure to get STA data Starting AP wlan3 Connect STA wlan0 to AP PASS radius_acct_failure_sta_data 0.828401 2021-01-18 07:18:09.075401 passed all 1 test case(s) 2021-01-18 07:18:09 ./run-tests.py radius_auth_unreachable2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_auth_unreachable2 1/1 Test: RADIUS Authentication server unreachable (2) Starting AP wlan3 Connect STA wlan0 to AP Checking for RADIUS retries radiusAuthClientAccessRetransmissions: 1 PASS radius_auth_unreachable2 4.796399 2021-01-18 07:18:13.996467 passed all 1 test case(s) 2021-01-18 07:18:14 ./run-tests.py radius_protocol DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_protocol 1/1 Test: RADIUS Authentication protocol tests with a fake server Starting AP wlan3 Connect STA wlan0 to AP Received authentication request Connect STA wlan0 to AP Received authentication request Add Message-Authenticator Use incorrect RADIUS shared secret Connect STA wlan0 to AP Received authentication request Add Message-Authenticator Received authentication request Add Message-Authenticator Connect STA wlan0 to AP Received authentication request Add Message-Authenticator Include two Message-Authenticator attributes PASS radius_protocol 5.715058 2021-01-18 07:18:19.835399 passed all 1 test case(s) 2021-01-18 07:18:19 ./run-tests.py radius_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_psk 1/1 Test: WPA2 with PSK from RADIUS Starting AP wlan3 Connect STA wlan0 to AP Received authentication request Connect STA wlan1 to AP Received authentication request PASS radius_psk 2.119514 2021-01-18 07:18:22.081536 passed all 1 test case(s) 2021-01-18 07:18:22 ./run-tests.py rrm_beacon_req_table_request_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_table_request_oom 1/1 Test: Beacon request - beacon table mode - request element OOM Starting AP wlan3 Connect STA wlan0 to AP PASS rrm_beacon_req_table_request_oom 1.106744 2021-01-18 07:18:23.317311 passed all 1 test case(s) 2021-01-18 07:18:23 ./run-tests.py rrm_link_measurement_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_link_measurement_oom 1/1 Test: Radio measurement request - link measurement OOM Skip test case: Required RRM capabilities are not supported SKIP rrm_link_measurement_oom 0.042312 2021-01-18 07:18:23.483872 passed all 0 test case(s) skipped 1 test case(s) 2021-01-18 07:18:23 ./run-tests.py rrm_neighbor_rep_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_neighbor_rep_req 1/1 Test: wpa_supplicant ctrl_iface NEIGHBOR_REP_REQUEST Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan0 to AP Connect STA wlan0 to AP PASS rrm_neighbor_rep_req 1.496302 2021-01-18 07:18:25.105370 passed all 1 test case(s) 2021-01-18 07:18:25 ./run-tests.py rsn_preauth_processing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rsn_preauth_processing 1/1 Test: RSN pre-authentication processing on AP Starting AP wlan3 Connect STA wlan0 to AP PASS rsn_preauth_processing 0.863815 2021-01-18 07:18:26.093218 passed all 1 test case(s) 2021-01-18 07:18:26 ./run-tests.py sae_pk_missing_ie DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pk_missing_ie 1/1 Test: SAE-PK and missing SAE-PK IE in confirm Starting AP wlan3 Connect STA wlan0 to AP PASS sae_pk_missing_ie 2.442482 2021-01-18 07:18:28.661495 passed all 1 test case(s) 2021-01-18 07:18:28 ./run-tests.py sae_pk_only DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pk_only 1/1 Test: SAE-PK only Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS sae_pk_only 1.267646 2021-01-18 07:18:30.054381 passed all 1 test case(s) 2021-01-18 07:18:30 ./run-tests.py scan_bss_expiration_count DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_bss_expiration_count 1/1 Test: BSS entry expiration based on scan results without match Starting AP wlan3 PASS scan_bss_expiration_count 0.827944 2021-01-18 07:18:31.006657 passed all 1 test case(s) 2021-01-18 07:18:31 ./run-tests.py scan_random_mac_connected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_random_mac_connected 1/1 Test: Random MAC address in scans while connected Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS scan_random_mac_connected 1.265154 2021-01-18 07:18:32.397285 passed all 1 test case(s) 2021-01-18 07:18:32 ./run-tests.py sigma_dut_ap_dpp_tcp_enrollee_init DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_dpp_tcp_enrollee_init 1/1 Test: sigma_dut DPP AP as TCP Enrollee/initiator Skip test case: sigma_dut not available SKIP sigma_dut_ap_dpp_tcp_enrollee_init 0.11249 2021-01-18 07:18:32.634834 passed all 0 test case(s) skipped 1 test case(s) 2021-01-18 07:18:32 ./run-tests.py sigma_dut_ap_ent_ft_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_ent_ft_eap 1/1 Test: sigma_dut controlled AP WPA-EAP and FT-EAP Skip test case: sigma_dut not available SKIP sigma_dut_ap_ent_ft_eap 0.103295 2021-01-18 07:18:32.863293 passed all 0 test case(s) skipped 1 test case(s) 2021-01-18 07:18:32 ./run-tests.py sigma_dut_ap_vht40 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_vht40 1/1 Test: sigma_dut controlled AP and VHT40 Skip test case: sigma_dut not available SKIP sigma_dut_ap_vht40 0.114717 2021-01-18 07:18:33.102823 passed all 0 test case(s) skipped 1 test case(s) 2021-01-18 07:18:33 ./run-tests.py sigma_dut_client_privacy DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_client_privacy 1/1 Test: sigma_dut client privacy Starting AP wlan3 Skip test case: sigma_dut not available SKIP sigma_dut_client_privacy 0.42407 2021-01-18 07:18:33.651346 passed all 0 test case(s) skipped 1 test case(s) 2021-01-18 07:18:33 ./run-tests.py sigma_dut_dpp_incompatible_roles_resp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_incompatible_roles_resp 1/1 Test: sigma_dut DPP roles incompatible (Responder) Skip test case: sigma_dut not available SKIP sigma_dut_dpp_incompatible_roles_resp 0.044547 2021-01-18 07:18:33.820884 passed all 0 test case(s) skipped 1 test case(s) 2021-01-18 07:18:33 ./run-tests.py suite_b_192_rsa_ecdhe_radius_rsa2048_client DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_192_rsa_ecdhe_radius_rsa2048_client 1/1 Test: Suite B 192-bit level and RSA (ECDHE) and RSA2048 client Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_192_rsa_ecdhe_radius_rsa2048_client 1.304394 2021-01-18 07:18:35.251981 passed all 1 test case(s) 2021-01-18 07:18:35 ./run-tests.py tnc_fast DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tnc_fast 1/1 Test: TNC FAST Starting AP wlan3 Connect STA wlan0 to AP PASS tnc_fast 0.847054 2021-01-18 07:18:36.223233 passed all 1 test case(s) 2021-01-18 07:18:36 ./run-tests.py wep_shared_key_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wep_shared_key_auth 1/1 Test: WEP Shared Key authentication Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS wep_shared_key_auth 1.393089 2021-01-18 07:18:37.743450 passed all 1 test case(s) 2021-01-18 07:18:37 ./run-tests.py wpa2_ocv_vht80plus80 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_vht80plus80 1/1 Test: OCV with VHT80+80 channel Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS wpa2_ocv_vht80plus80 17.401307 2021-01-18 07:18:55.269855 passed all 1 test case(s) 2021-01-18 07:18:55 ./run-tests.py wpas_ctrl_dup_network_global DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_dup_network_global 1/1 Test: wpa_supplicant ctrl_iface DUP_NETWORK (global) Starting AP wlan3 Connect STA wlan0 to AP PASS wpas_ctrl_dup_network_global 0.904912 2021-01-18 07:18:56.299437 passed all 1 test case(s) 2021-01-18 07:18:56 ./run-tests.py wpas_ctrl_get_capability DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_get_capability 1/1 Test: wpa_supplicant ctrl_iface GET_CAPABILITY GET_CAPABILITY key_mgmt iftype=STATION: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE'] GET_CAPABILITY key_mgmt iftype=AP_VLAN: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE'] GET_CAPABILITY key_mgmt iftype=AP: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE'] GET_CAPABILITY key_mgmt iftype=P2P_GO: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE'] GET_CAPABILITY key_mgmt iftype=P2P_CLIENT: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE'] GET_CAPABILITY key_mgmt iftype=P2P_DEVICE: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE'] GET_CAPABILITY key_mgmt iftype=MESH: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE'] GET_CAPABILITY key_mgmt iftype=IBSS: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE'] GET_CAPABILITY key_mgmt iftype=NAN: ['NONE', 'IEEE8021X', 'WPA-EAP', 'WPA-PSK', 'WPA-EAP-SUITE-B', 'WPA-EAP-SUITE-B-192', 'OWE', 'DPP', 'FILS-SHA256', 'FILS-SHA384', 'FT-FILS-SHA256', 'FT-FILS-SHA384', 'FT-PSK', 'FT-EAP', 'SAE'] GET_CAPABILITY key_mgmt iftype=UNKNOWN: None PASS wpas_ctrl_get_capability 0.04336 2021-01-18 07:18:56.467729 passed all 1 test case(s) 2021-01-18 07:18:56 ./run-tests.py wpas_ctrl_set_lci_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_set_lci_errors 1/1 Test: wpa_supplicant SET lci error cases PASS wpas_ctrl_set_lci_errors 0.084169 2021-01-18 07:18:56.702036 passed all 1 test case(s) 2021-01-18 07:18:56 ./run-tests.py wps_ext_cred_proto_encr_type_missing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_cred_proto_encr_type_missing 1/1 Test: WPS and Credential: Encr Type missing Starting AP wlan3 PASS wps_ext_cred_proto_encr_type_missing 0.93755 2021-01-18 07:18:57.772048 passed all 1 test case(s) 2021-01-18 07:18:57 ./run-tests.py wps_ext_cred_proto_network_key_missing_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_cred_proto_network_key_missing_open 1/1 Test: WPS and Credential: Network Key missing (open) Starting AP wlan3 PASS wps_ext_cred_proto_network_key_missing_open 0.927873 2021-01-18 07:18:58.824248 passed all 1 test case(s) 2021-01-18 07:18:58 ./run-tests.py wps_ext_proto_ack_m3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_ack_m3 1/1 Test: WPS and ACK M3 Starting AP wlan3 PASS wps_ext_proto_ack_m3 1.028458 2021-01-18 07:18:59.977247 passed all 1 test case(s) 2021-01-18 07:18:59 ./run-tests.py wps_ext_proto_ack_m3_no_r_nonce DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_ack_m3_no_r_nonce 1/1 Test: WPS and ACK M3 missing R-Nonce Starting AP wlan3 PASS wps_ext_proto_ack_m3_no_r_nonce 1.027771 2021-01-18 07:19:01.129276 passed all 1 test case(s) 2021-01-18 07:19:01 ./stop.sh wpa_supplicant/hostapd/hlr_auc_gw did not exit - try to force them to die