2022-05-28 14:38:24 export USER=root 2022-05-28 14:38:24 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2022-05-28 14:39:11 ./start.sh 2022-05-28 14:39:12 ./run-tests.py ap_acs_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_acs_errors 1/1 Test: Automatic channel selection failures Starting AP wlan3 Removing BSS wlan3 Starting AP wlan3 PASS ap_acs_errors 0.972722 2022-05-28 14:39:14.146679 passed all 1 test case(s) 2022-05-28 14:39:14 ./run-tests.py ap_eapol_version DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_eapol_version 1/1 Test: hostapd eapol_version configuration Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_eapol_version 1.964066 2022-05-28 14:39:16.294048 passed all 1 test case(s) 2022-05-28 14:39:16 ./run-tests.py ap_element_parse DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_element_parse 1/1 Test: Information element parsing - extra coverage Starting AP wlan3 PASS ap_element_parse 0.304993 2022-05-28 14:39:16.768920 passed all 1 test case(s) 2022-05-28 14:39:16 ./run-tests.py ap_ft_eap_cui DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_eap_cui 1/1 Test: WPA2-EAP-FT AP with CUI Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP Roaming association rejected Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 1519, in test_ap_ft_eap_cui generic_ap_ft_eap(dev, apdev, vlan=False, cui=True) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 1487, in generic_ap_ft_eap conndev=conndev, only_one_way=only_one_way) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 273, in run_roams dev.roam(ap1['bssid']) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1235, in roam raise Exception("Roaming association rejected") Exception: Roaming association rejected FAIL ap_ft_eap_cui 2.019561 2022-05-28 14:39:18.963140 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_ft_eap_cui 2022-05-28 14:39:18 ./run-tests.py ap_ft_many DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_many 1/1 Test: WPA2-PSK-FT AP multiple times Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP Roaming association rejected Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 437, in test_ap_ft_many run_roams(dev[0], apdev, hapd0, hapd1, ssid, passphrase, roams=50) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 273, in run_roams dev.roam(ap1['bssid']) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1235, in roam raise Exception("Roaming association rejected") Exception: Roaming association rejected FAIL ap_ft_many 1.922176 2022-05-28 14:39:21.058942 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_ft_many 2022-05-28 14:39:21 ./run-tests.py ap_ft_over_ds_unexpected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_over_ds_unexpected 1/1 Test: WPA2-PSK-FT AP over DS and unexpected response Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Foreign STA address No over-the-DS in progress Non-zero status code Foreign Target AP No IEs Invalid IEs (trigger parsing failure) Too short MDIE Mobility domain mismatch No FTIE FTIE SNonce mismatch No R0KH-ID subelem in FTIE No R0KH-ID subelem mismatch in FTIE No R1KH-ID subelem in FTIE No RSNE PASS ap_ft_over_ds_unexpected 1.389309 2022-05-28 14:39:22.624086 passed all 1 test case(s) 2022-05-28 14:39:22 ./run-tests.py ap_ft_pmf_bip_cmac_128 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_pmf_bip_cmac_128 1/1 Test: WPA2-PSK-FT AP with PMF/BIP-CMAC-128 Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP Roaming association rejected Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 549, in test_ap_ft_pmf_bip_cmac_128 run_ap_ft_pmf_bip(dev, apdev, "AES-128-CMAC") File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 580, in run_ap_ft_pmf_bip group_mgmt=cipher) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 273, in run_roams dev.roam(ap1['bssid']) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1235, in roam raise Exception("Roaming association rejected") Exception: Roaming association rejected FAIL ap_ft_pmf_bip_cmac_128 1.981388 2022-05-28 14:39:24.770954 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_ft_pmf_bip_cmac_128 2022-05-28 14:39:24 ./run-tests.py ap_ft_vlan_over_ds DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_vlan_over_ds 1/1 Test: WPA2-PSK-FT AP over DS with VLAN Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_vlan_over_ds 3.531099 2022-05-28 14:39:28.463030 passed all 1 test case(s) 2022-05-28 14:39:28 ./run-tests.py ap_hs20_disallow_aps DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_disallow_aps 1/1 Test: Hotspot 2.0 connection and disallow_aps Starting AP wlan3 Verify disallow_aps bssid Verify disallow_aps ssid Verify disallow_aps clear PASS ap_hs20_disallow_aps 4.188689 2022-05-28 14:39:32.817062 passed all 1 test case(s) 2022-05-28 14:39:32 ./run-tests.py ap_hs20_username_unknown DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_username_unknown 1/1 Test: Hotspot 2.0 connection in username/password credential (no domain in cred) Starting AP wlan3 Connection timed out Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 1402, in test_ap_hs20_username_unknown interworking_connect(dev[0], bssid, "TTLS") File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 143, in interworking_connect interworking_auth(dev, method) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 152, in interworking_auth dev.wait_connected(timeout=15) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1411, in wait_connected raise Exception(error) Exception: Connection timed out FAIL ap_hs20_username_unknown 15.809804 2022-05-28 14:39:48.785005 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_hs20_username_unknown 2022-05-28 14:39:48 ./run-tests.py ap_hs20_username_unknown2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_username_unknown2 1/1 Test: Hotspot 2.0 connection in username/password credential (no domain advertized) Starting AP wlan3 Connection timed out Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 1421, in test_ap_hs20_username_unknown2 interworking_connect(dev[0], bssid, "TTLS") File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 143, in interworking_connect interworking_auth(dev, method) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_hs20.py", line 152, in interworking_auth dev.wait_connected(timeout=15) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1411, in wait_connected raise Exception(error) Exception: Connection timed out FAIL ap_hs20_username_unknown2 15.824138 2022-05-28 14:40:04.771661 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_hs20_username_unknown2 2022-05-28 14:40:04 ./run-tests.py ap_ht_op_class_124 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht_op_class_124 1/1 Test: HT20 on operationg class 124 Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht_op_class_124 1.617269 2022-05-28 14:40:06.573423 passed all 1 test case(s) 2022-05-28 14:40:06 ./run-tests.py ap_open_disconnect_in_ps DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_disconnect_in_ps 1/1 Test: Disconnect with the client in PS to regression-test a kernel bug Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_disconnect_in_ps 1.828274 2022-05-28 14:40:08.561227 passed all 1 test case(s) 2022-05-28 14:40:08 ./run-tests.py ap_open_sta_statistics DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_sta_statistics 1/1 Test: AP with open mode and STA statistics Starting AP wlan3 Connect STA wlan0 to AP stats1: {'addr': '02:00:00:00:00:00', 'flags': '[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][HT]', 'aid': '1', 'capability': '0x421', 'listen_interval': '5', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'timeout_next': 'NULLFUNC POLL', 'rx_packets': '2', 'tx_packets': '2', 'rx_bytes': '123', 'tx_bytes': '169', 'inactive_msec': '2', 'signal': '-30', 'rx_rate_info': '0', 'tx_rate_info': '10', 'ht_mcs_bitmask': 'ffff0000000000000000', 'connected_time': '0', 'supp_op_classes': '5151525354737475767778797a7b7c7d7e7f808182', 'ht_caps_info': '0x107e', 'ext_capab': '04004a8201404040000120'} stats2: {'addr': '02:00:00:00:00:00', 'flags': '[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][HT]', 'aid': '1', 'capability': '0x421', 'listen_interval': '5', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'timeout_next': 'NULLFUNC POLL', 'rx_packets': '5', 'tx_packets': '3', 'rx_bytes': '266', 'tx_bytes': '202', 'inactive_msec': '272', 'signal': '-30', 'rx_rate_info': '130 mcs 8', 'tx_rate_info': '10', 'ht_mcs_bitmask': 'ffff0000000000000000', 'connected_time': '0', 'supp_op_classes': '5151525354737475767778797a7b7c7d7e7f808182', 'ht_caps_info': '0x107e', 'ext_capab': '04004a8201404040000120'} stats3: {'addr': '02:00:00:00:00:00', 'flags': '[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][HT]', 'aid': '1', 'capability': '0x421', 'listen_interval': '5', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'timeout_next': 'NULLFUNC POLL', 'rx_packets': '9', 'tx_packets': '5', 'rx_bytes': '3339', 'tx_bytes': '1755', 'inactive_msec': '7', 'signal': '-30', 'rx_rate_info': '130 mcs 8', 'tx_rate_info': '110', 'ht_mcs_bitmask': 'ffff0000000000000000', 'connected_time': '0', 'supp_op_classes': '5151525354737475767778797a7b7c7d7e7f808182', 'ht_caps_info': '0x107e', 'ext_capab': '04004a8201404040000120'} PASS ap_open_sta_statistics 0.851793 2022-05-28 14:40:09.571847 passed all 1 test case(s) 2022-05-28 14:40:09 ./run-tests.py ap_pmf_inject_data DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_inject_data 1/1 Test: WPA2-PSK AP with PMF and Data frame injection Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_inject_data 1.217024 2022-05-28 14:40:10.950007 passed all 1 test case(s) 2022-05-28 14:40:10 ./run-tests.py ap_qosmap_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_qosmap_invalid 1/1 Test: QoS mapping ctrl_iface error handling Starting AP wlan3 Connect STA wlan0 to AP PASS ap_qosmap_invalid 0.772397 2022-05-28 14:40:11.884068 passed all 1 test case(s) 2022-05-28 14:40:11 ./run-tests.py ap_remove_during_acs DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_remove_during_acs 1/1 Test: Remove interface during ACS Starting AP wlan3 Removing BSS wlan3 Starting AP wlan3 Removing BSS wlan3 PASS ap_remove_during_acs 6.933905 2022-05-28 14:40:18.979418 passed all 1 test case(s) 2022-05-28 14:40:19 ./run-tests.py ap_remove_during_ht_coex_scan3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_remove_during_ht_coex_scan3 1/1 Test: Remove second BSS during HT co-ex scan in multi-BSS configuration Starting AP wlan3 Removing BSS wlan3-2 PASS ap_remove_during_ht_coex_scan3 0.094333 2022-05-28 14:40:19.231878 passed all 1 test case(s) 2022-05-28 14:40:19 ./run-tests.py ap_track_sta_no_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_track_sta_no_auth 1/1 Test: Dualband AP rejecting authentication from dualband STA on 2.4 GHz Starting AP wlan3 Starting AP wlan4 Connect STA wlan1 to AP Connect STA wlan0 to AP Country code at the end: 00 PASS ap_track_sta_no_auth 1.999634 2022-05-28 14:40:21.403158 passed all 1 test case(s) 2022-05-28 14:40:21 ./run-tests.py ap_tx_queue_params_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_tx_queue_params_invalid 1/1 Test: Invalid TX queue params set (cwmin/cwmax) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_tx_queue_params_invalid 0.91611 2022-05-28 14:40:22.477693 passed all 1 test case(s) 2022-05-28 14:40:22 ./run-tests.py ap_wpa2_eap_ttls_dh_params_dsa DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_dh_params_dsa 1/1 Test: WPA2-Enterprise connection using EAP-TTLS and setting DH params (DSA) Starting AP wlan3 Connect STA wlan0 to AP EAP success timed out Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 5062, in test_ap_wpa2_eap_ttls_dh_params_dsa dh_file="auth_serv/dsaparam.pem") File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 165, in eap_connect expect_cert_error=expect_cert_error) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 221, in eap_check_auth raise Exception("EAP success timed out") Exception: EAP success timed out FAIL ap_wpa2_eap_ttls_dh_params_dsa 10.624251 2022-05-28 14:40:33.261028 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wpa2_eap_ttls_dh_params_dsa 2022-05-28 14:40:33 ./run-tests.py ap_wpa2_gtk_initial_rsc_ccmp_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_gtk_initial_rsc_ccmp_256 1/1 Test: Initial group cipher RSC (CCMP-256) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_gtk_initial_rsc_ccmp_256 10.928835 2022-05-28 14:40:44.352691 passed all 1 test case(s) 2022-05-28 14:40:44 ./run-tests.py ap_wpa2_psk_ap_control_port DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ap_control_port 1/1 Test: WPA2-PSK AP with nl80211 control port in AP mode Starting AP wlan3 AP driver flags: ['SME', 'AP', 'SET_KEYS_AFTER_ASSOC_DONE', 'HT_2040_COEX', 'P2P_CONCURRENT', 'P2P_CAPABLE', 'AP_TEARDOWN_SUPPORT', 'P2P_MGMT_AND_NON_P2P', 'VALID_ERROR_CODES', 'OFFCHANNEL_TX', 'EAPOL_TX_STATUS', 'DEAUTH_TX_STATUS', 'TDLS_SUPPORT', 'TDLS_EXTERNAL_SETUP', 'AP_UAPSD', 'AP_MLME', 'SAE', 'IBSS', 'RADAR', 'QOS_MAPPING', 'AP_CSA', 'MESH', 'HT_IBSS', 'VHT_IBSS', 'FULL_AP_CLIENT_STATE', 'SUPPORT_FILS', 'BEACON_RATE_LEGACY', 'CONTROL_PORT', 'SAFE_PTK0_REKEYS', 'BEACON_PROTECTION', 'EXTENDED_KEY_ID'] AP driver flags2: ['CONTROL_PORT_RX', 'CONTROL_PORT_TX_STATUS', 'UNKNOWN'] STA driver flags: ['SME', 'AP', 'SET_KEYS_AFTER_ASSOC_DONE', 'HT_2040_COEX', 'P2P_CONCURRENT', 'P2P_CAPABLE', 'AP_TEARDOWN_SUPPORT', 'P2P_MGMT_AND_NON_P2P', 'VALID_ERROR_CODES', 'OFFCHANNEL_TX', 'EAPOL_TX_STATUS', 'DEAUTH_TX_STATUS', 'TDLS_SUPPORT', 'TDLS_EXTERNAL_SETUP', 'AP_UAPSD', 'AP_MLME', 'SAE', 'IBSS', 'RADAR', 'QOS_MAPPING', 'AP_CSA', 'MESH', 'HT_IBSS', 'VHT_IBSS', 'FULL_AP_CLIENT_STATE', 'SUPPORT_FILS', 'BEACON_RATE_LEGACY', 'CONTROL_PORT', 'SAFE_PTK0_REKEYS', 'BEACON_PROTECTION', 'EXTENDED_KEY_ID'] STA driver flags2: ['CONTROL_PORT_RX', 'CONTROL_PORT_TX_STATUS', 'UNKNOWN'] Connect STA wlan0 to AP PASS ap_wpa2_psk_ap_control_port 1.550406 2022-05-28 14:40:46.062366 passed all 1 test case(s) 2022-05-28 14:40:46 ./run-tests.py ap_wpa2_psk_file_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_file_errors 1/1 Test: WPA2-PSK AP with various PSK file error and success cases Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_wpa2_psk_file_errors 2.565329 2022-05-28 14:40:48.786792 passed all 1 test case(s) 2022-05-28 14:40:48 ./run-tests.py ap_wpa2_psk_rsne_mismatch_ap2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_rsne_mismatch_ap2 1/1 Test: RSNE mismatch in EAPOL-Key msg 3/4 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_rsne_mismatch_ap2 0.784917 2022-05-28 14:40:49.733601 passed all 1 test case(s) 2022-05-28 14:40:49 ./run-tests.py ap_wpa2_tdls_double_tpk_m2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_tdls_double_tpk_m2 1/1 Test: Double TPK M2 during TDLS setup initiation Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Setup TDLS PASS ap_wpa2_tdls_double_tpk_m2 2.714068 2022-05-28 14:40:52.606958 passed all 1 test case(s) 2022-05-28 14:40:52 ./run-tests.py ap_wps_er_config_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_config_ap 1/1 Test: WPS ER configuring AP over UPnP Starting AP wlan3 Connect ER to the AP Connect STA wlan0 to AP WPS configuration step Connect STA wlan0 to AP WPS ER restart PASS ap_wps_er_config_ap 3.383709 2022-05-28 14:40:56.150224 passed all 1 test case(s) 2022-05-28 14:40:56 ./run-tests.py ap_wps_er_http_client_timeout DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_client_timeout 1/1 Test: WPS ER and HTTP client timeout HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 PASS ap_wps_er_http_client_timeout 33.104957 2022-05-28 14:41:29.415152 passed all 1 test case(s) 2022-05-28 14:41:29 ./run-tests.py ap_wps_http_timeout DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_http_timeout 1/1 Test: WPS AP/ER and HTTP timeout Starting AP wlan3 PASS ap_wps_http_timeout 31.416533 2022-05-28 14:42:00.990078 passed all 1 test case(s) 2022-05-28 14:42:01 ./run-tests.py ap_wps_m2_dev_passwd_id_change_pbc_to_pin DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_m2_dev_passwd_id_change_pbc_to_pin 1/1 Test: WPS and M2 with different Device Password ID (PBC to PIN) Starting AP wlan3 PASS ap_wps_m2_dev_passwd_id_change_pbc_to_pin 0.961286 2022-05-28 14:42:02.112292 passed all 1 test case(s) 2022-05-28 14:42:02 ./run-tests.py ap_wps_m2_dev_passwd_id_p2p DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_m2_dev_passwd_id_p2p 1/1 Test: WPS and M2 with different Device Password ID (P2P) Starting AP wlan3 PASS ap_wps_m2_dev_passwd_id_p2p 0.935451 2022-05-28 14:42:03.208291 passed all 1 test case(s) 2022-05-28 14:42:03 ./run-tests.py ap_wps_random_uuid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_random_uuid 1/1 Test: WPS and random UUID on Enrollee Starting AP wlan3 Seen UUIDs: ['6714bdeb-56ac-4d05-95ee-307fdb64f2e5', '0e4b49dc-c856-4bd3-9b77-dcbcd9ac3d83', '3cf5d458-d543-4abf-b3c3-d521194362b4'] PASS ap_wps_random_uuid 1.242983 2022-05-28 14:42:04.613936 passed all 1 test case(s) 2022-05-28 14:42:04 ./run-tests.py ap_wps_while_connected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_while_connected 1/1 Test: WPS PBC provisioning while connected to another AP Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP WPS provisioning step PASS ap_wps_while_connected 2.019709 2022-05-28 14:42:06.795168 passed all 1 test case(s) 2022-05-28 14:42:06 ./run-tests.py ap_wps_wsc_done_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_wsc_done_oom 1/1 Test: WPS and OOM for WSC_Done on STA Starting AP wlan3 PASS ap_wps_wsc_done_oom 0.946683 2022-05-28 14:42:07.908668 passed all 1 test case(s) 2022-05-28 14:42:07 ./run-tests.py autogo_start_during_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_start_during_scan 1/1 Test: P2P autonomous GO started during ongoing manual scan Start autonomous GO wlan0 Try to connect the client to the GO wlan1: Trying to discover peer 02:00:00:00:00:00 Client connected PASS autogo_start_during_scan 1.802032 2022-05-28 14:42:09.867733 passed all 1 test case(s) 2022-05-28 14:42:09 ./run-tests.py concurrent_invitation_channel_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START concurrent_invitation_channel_mismatch 1/1 Test: P2P persistent group invitation and channel mismatch Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group Connect to an infrastructure AP Starting AP wlan3 Connect STA wlan0 to AP wlan1: Trying to discover peer 02:00:00:00:00:00 PASS concurrent_invitation_channel_mismatch 3.266446 2022-05-28 14:42:13.293425 passed all 1 test case(s) 2022-05-28 14:42:13 ./run-tests.py dbus_p2p_discovery DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_p2p_discovery 1/1 Test: D-Bus P2P discovery No dbus module available Skip test case: No dbus module available SKIP dbus_p2p_discovery 0.065004 2022-05-28 14:42:13.519752 passed all 0 test case(s) skipped 1 test case(s) 2022-05-28 14:42:13 ./run-tests.py dfs_radar_no_ht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dfs_radar_no_ht 1/1 Test: DFS chanlist when radar is detected and no HT configured Starting AP wlan3 on DFS channel Starting AP wlan3 Trigger a simulated radar event Connect STA wlan0 to AP Country code at the end: 00 PASS dfs_radar_no_ht 4.487441 2022-05-28 14:42:18.167494 passed all 1 test case(s) 2022-05-28 14:42:18 ./run-tests.py dpp_config_jws_error_prot_hdr_no_typ DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jws_error_prot_hdr_no_typ 1/1 Test: DPP Config Object JWS error - protected header - no typ dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jws_error_prot_hdr_no_typ 0.084788 2022-05-28 14:42:18.412731 passed all 1 test case(s) 2022-05-28 14:42:18 ./run-tests.py dpp_configurator_enrollee_brainpoolP256r1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_configurator_enrollee_brainpoolP256r1 1/1 Test: DPP Configurator enrolling (brainpoolP256r1) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_configurator_enrollee_brainpoolP256r1 0.09185 2022-05-28 14:42:18.662502 passed all 1 test case(s) 2022-05-28 14:42:18 ./run-tests.py dpp_duplicated_auth_conf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_duplicated_auth_conf 1/1 Test: DPP and duplicated Authentication Confirmation PASS dpp_duplicated_auth_conf 0.082018 2022-05-28 14:42:18.901945 passed all 1 test case(s) 2022-05-28 14:42:18 ./run-tests.py dpp_pfs_connect_cmd_ap_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pfs_connect_cmd_ap_2 1/1 Test: DPP PFS and cfg80211 connect command (PFS not allowed by AP) Starting AP wlan3 Connect STA wlan5 to AP Connect STA wlan5 to AP Connect STA wlan5 to AP PASS dpp_pfs_connect_cmd_ap_2 2.133439 2022-05-28 14:42:21.195867 passed all 1 test case(s) 2022-05-28 14:42:21 ./run-tests.py dpp_pkex_code_mismatch_limit DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_code_mismatch_limit 1/1 Test: DPP and PKEX with mismatching code limit PASS dpp_pkex_code_mismatch_limit 0.091154 2022-05-28 14:42:21.446106 passed all 1 test case(s) 2022-05-28 14:42:21 ./run-tests.py dpp_pkex_hostapd_responder DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_hostapd_responder 1/1 Test: DPP PKEX with hostapd as responder Starting AP wlan3 PASS dpp_pkex_hostapd_responder 0.340087 2022-05-28 14:42:21.947044 passed all 1 test case(s) 2022-05-28 14:42:21 ./run-tests.py dpp_proto_conf_resp_no_config_obj DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_conf_resp_no_config_obj 1/1 Test: DPP protocol testing - no Config Object in Conf Resp PASS dpp_proto_conf_resp_no_config_obj 0.080454 2022-05-28 14:42:22.186517 passed all 1 test case(s) 2022-05-28 14:42:22 ./run-tests.py dpp_qr_code_config_event_initiator_set_comeback DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_config_event_initiator_set_comeback 1/1 Test: DPP QR Code and config event on Configurator Initiator (set comeback) PASS dpp_qr_code_config_event_initiator_set_comeback 0.217299 2022-05-28 14:42:22.562682 passed all 1 test case(s) 2022-05-28 14:42:22 ./run-tests.py eap_proto_gpsk_server DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_gpsk_server 1/1 Test: EAP-GPSK protocol testing for the server Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_gpsk_server 7.425031 2022-05-28 14:42:30.147087 passed all 1 test case(s) 2022-05-28 14:42:30 ./run-tests.py eap_proto_mschapv2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_mschapv2 1/1 Test: EAP-MSCHAPv2 protocol tests Starting AP wlan3 RUN: 0 Connect STA wlan0 to AP mschapv2_handler - RX 020c00090175736572 Test: Missing payload RUN: 1 Connect STA wlan0 to AP mschapv2_handler - RX 02d500090175736572 Test: Unknown MSCHAPv2 op_code RUN: 2 Connect STA wlan0 to AP mschapv2_handler - RX 02f800090175736572 Test: Invalid ms_len and unknown MSCHAPv2 op_code RUN: 3 Connect STA wlan0 to AP mschapv2_handler - RX 02e800090175736572 Test: Success before challenge RUN: 4 Connect STA wlan0 to AP mschapv2_handler - RX 025600090175736572 Test: Failure before challenge - required challenge field not present mschapv2_handler - RX 020600061a04 Test: Failure RUN: 5 Connect STA wlan0 to AP mschapv2_handler - RX 024200090175736572 Test: Failure before challenge - invalid failure challenge len mschapv2_handler - RX 020800061a04 Test: Failure RUN: 6 Connect STA wlan0 to AP mschapv2_handler - RX 02e200090175736572 Test: Failure before challenge - invalid failure challenge len mschapv2_handler - RX 020a00061a04 Test: Failure RUN: 7 Connect STA wlan0 to AP mschapv2_handler - RX 025600090175736572 Test: Failure before challenge - invalid failure challenge mschapv2_handler - RX 020c00061a04 Test: Failure RUN: 8 Connect STA wlan0 to AP mschapv2_handler - RX 023900090175736572 Test: Failure before challenge - password expired mschapv2_handler - RX 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 Test: Success after password change RUN: 9 Connect STA wlan0 to AP mschapv2_handler - RX 026200090175736572 Test: Invalid challenge length RUN: 10 Connect STA wlan0 to AP mschapv2_handler - RX 026700090175736572 Test: Too short challenge packet RUN: 11 Connect STA wlan0 to AP mschapv2_handler - RX 02b700090175736572 Test: Challenge mschapv2_handler - RX 0212003f1a0200003a31f64d71d81006edffd3c3c7e7d9be791500000000000000005aa7f527c8939a867e2278721dbc4683339ea4d42f7417e60075736572 Test: Failure - password expired mschapv2_handler - RX 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 Test: Success after password change enc_hash: 4c29b5fd3d2c18f8944b0f2e3477e43c peer_challenge: fe0d5d7999bf2bacba1f1109c157a8de nt_response: 8aef3ebe49316252407b2c554952b14990d8b5f1d1734cff flags: 0000 auth_challenge: 00112233445566778899aabbccddeeff Success message payload: S=D79A90B39E09BD17BF573428E90949F9A97D2CD2 mschapv2_handler - RX 021400061a03 Test: EAP-Success RUN: 12 Connect STA wlan0 to AP mschapv2_handler - RX 025900090175736572 Test: Failure - password expired mschapv2_handler - RX 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 Test: Success after password change enc_hash: 4c29b5fd3d2c18f8944b0f2e3477e43c peer_challenge: c9701aef4aceaf9ce01efca0f78b3080 nt_response: 3ac00ef4c51a8a7a6770bcfca7a023a158eacccdfde0a0a7 flags: 0000 auth_challenge: 00112233445566778899aabbccddeeff Success message payload: S=644C74FD94EEDD48A48E07CFF82EE856B3FB1ECA mschapv2_handler - RX 021700061a03 Test: EAP-Success RUN: 13 Connect STA wlan0 to AP mschapv2_handler - RX 02f700090175736572 Test: Challenge mschapv2_handler - RX 0219003f1a0200003a310ef84adc9e6815a4025d436764429da60000000000000000ed7f6b2da5885072fd1069e911ab37cb327b190cfd68ea0c0075736572 Test: Failure - authentication failure RUN: 14 Connect STA wlan0 to AP mschapv2_handler - RX 02ee00090175736572 Test: Challenge mschapv2_handler - RX 021b003f1a0200003a315e18ea877271c1cfaf6b0fe8914bcefa000000000000000079cf1b300ac28c99c4c9ea6748a8015bbdec68ac46025fd50075736572 Test: Failure - authentication failure mschapv2_handler - RX 021c00061a04 Test: Failure RUN: 15 Connect STA wlan0 to AP mschapv2_handler - RX 028b00090175736572 Test: Challenge - invalid ms_len and workaround disabled PASS eap_proto_mschapv2 5.731523 2022-05-28 14:42:36.037404 passed all 1 test case(s) 2022-05-28 14:42:36 ./run-tests.py eap_proto_pax_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_pax_errors 1/1 Test: EAP-PAX local error cases Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_pax_errors 4.548191 2022-05-28 14:42:40.747795 passed all 1 test case(s) 2022-05-28 14:42:40 ./run-tests.py eap_proto_sake_errors_server DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_sake_errors_server 1/1 Test: EAP-SAKE local error cases on server Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_sake_errors_server 7.669024 2022-05-28 14:42:48.577591 passed all 1 test case(s) 2022-05-28 14:42:48 ./run-tests.py eap_teap_basic_password_auth_id2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_basic_password_auth_id2 1/1 Test: EAP-TEAP with Basic-Password-Auth (eap_teap_id=2) Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_basic_password_auth_id2 0.778897 2022-05-28 14:42:49.520104 passed all 1 test case(s) 2022-05-28 14:42:49 ./run-tests.py eap_ttls_eap_gtc_session_resumption DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_ttls_eap_gtc_session_resumption 1/1 Test: EAP-TTLS/EAP-GTC session resumption Starting AP wlan3 Connect STA wlan0 to AP EAP success timed out Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 6309, in test_eap_ttls_eap_gtc_session_resumption ca_cert="auth_serv/ca.pem", phase2="autheap=GTC") File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 165, in eap_connect expect_cert_error=expect_cert_error) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_eap.py", line 221, in eap_check_auth raise Exception("EAP success timed out") Exception: EAP success timed out FAIL eap_ttls_eap_gtc_session_resumption 10.619469 2022-05-28 14:43:00.299994 passed 0 test case(s) skipped 0 test case(s) failed tests: eap_ttls_eap_gtc_session_resumption 2022-05-28 14:43:00 ./run-tests.py fst_ap_config_pri_large DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_config_pri_large 1/1 Test: FST AP configuration Priority too large kill_pid: pidfile logs/current/myhostapd.pid does not exist - try again after a second kill_pid: pidfile logs/current/myhostapd.pid does not exist - could not kill the process PASS fst_ap_config_pri_large 1.092845 2022-05-28 14:43:01.553482 passed all 1 test case(s) 2022-05-28 14:43:01 ./run-tests.py fst_ap_session_request_with_no_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_session_request_with_no_session 1/1 Test: FST AP session request with no session Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Frame received, session created PASS fst_ap_session_request_with_no_session 2.185022 2022-05-28 14:43:03.897113 passed all 1 test case(s) 2022-05-28 14:43:03 ./run-tests.py fst_setup_response_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_setup_response_proto 1/1 Test: FST protocol testing for Setup Response Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP PASS fst_setup_response_proto 2.022928 2022-05-28 14:43:06.080335 passed all 1 test case(s) 2022-05-28 14:43:06 ./run-tests.py gas_anqp_venue_url DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_anqp_venue_url 1/1 Test: GAS/ANQP and Venue URL Starting AP wlan3 PASS gas_anqp_venue_url 0.539135 2022-05-28 14:43:06.779074 passed all 1 test case(s) 2022-05-28 14:43:06 ./run-tests.py go_neg_pbc_vs_pin DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START go_neg_pbc_vs_pin 1/1 Test: P2P GO Negotiation with one device using PBC and the other PIN wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 PASS go_neg_pbc_vs_pin 0.580618 2022-05-28 14:43:07.520100 passed all 1 test case(s) 2022-05-28 14:43:07 ./run-tests.py grpform_wait_peer DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_wait_peer 1/1 Test: P2P group formation wait for peer to become ready wlan0: Trying to discover peer 02:00:00:00:01:00 PASS grpform_wait_peer 4.914256 2022-05-28 14:43:12.595958 passed all 1 test case(s) 2022-05-28 14:43:12 ./run-tests.py hapd_ctrl_not_yet_fully_enabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_not_yet_fully_enabled 1/1 Test: hostapd and ctrl_iface commands when BSS not yet fully enabled Starting AP wlan3 PASS hapd_ctrl_not_yet_fully_enabled 0.077541 2022-05-28 14:43:12.836056 passed all 1 test case(s) 2022-05-28 14:43:12 ./run-tests.py hapd_ctrl_setband DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_setband 1/1 Test: hostapd and setband Starting AP wlan3 PASS hapd_ctrl_setband 0.178385 2022-05-28 14:43:13.173255 passed all 1 test case(s) 2022-05-28 14:43:13 ./run-tests.py hs20_pps_mo_1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hs20_pps_mo_1 1/1 Test: Hotspot 2.0 PPS MO with username/password credential Starting AP wlan3 set_pps result: Set PPS MO info to wpa_supplicant - SP FQDN wi-fi.org wpa_command(ifname='wlan0', cmd='REMOVE_CRED provisioning_sp=wi-fi.org') - UpdateIdentifier = 1 wpa_command(ifname='wlan0', cmd='ADD_CRED') wpa_command(ifname='wlan0', cmd='SET_CRED 0 update_identifier 1') wpa_command(ifname='wlan0', cmd='SET_CRED 0 provisioning_sp "wi-fi.org"') credential localname: 'Cred01' - Policy - Policy/PreferredRoamingPartnerList//Priority = 10 - Policy/PreferredRoamingPartnerList//FQDN_Match = another.example.org,includeSubdomains wpa_command(ifname='wlan0', cmd='SET_CRED 0 roaming_partner "another.example.org,0,10,*"') - Policy/PreferredRoamingPartnerList//Priority = 20 - Policy/PreferredRoamingPartnerList//FQDN_Match = example.com,exactMatch wpa_command(ifname='wlan0', cmd='SET_CRED 0 roaming_partner "example.com,1,20,*"') - Policy/PolicyUpdate - CredentialPriority = 1 wpa_command(ifname='wlan0', cmd='SET_CRED 0 sp_priority 1') - AAAServerTrustRoot - TODO - SubscriptionUpdate - HomeSP - HomeSP/FriendlyName = Example Operator - HomeSP/FQDN = w1.fi wpa_command(ifname='wlan0', cmd='SET_CRED 0 domain "w1.fi"') wpa_command(ifname='wlan0', cmd='SET_CRED 0 domain_suffix_match "w1.fi"') - HomeSP/RoamingConsortiumOI = 010203040506 wpa_command(ifname='wlan0', cmd='SET_CRED 0 roaming_consortiums "010203040506"') - Credential - Credential/CreationDate = 2012-12-01T12:00:00Z - Credential/UsernamePassword - Credential/UsernamePassword/Username = hs20-test wpa_command(ifname='wlan0', cmd='SET_CRED 0 username "hs20-test"') - Credential/UsernamePassword/Password = password wpa_command(ifname='wlan0', cmd='SET_CRED 0 password 70617373776f7264') - Credential/UsernamePassword/MachineManaged = TRUE - Credential/UsernamePassword/EAPMethod - Credential/UsernamePassword/EAPMethod/EAPType = 21 wpa_command(ifname='wlan0', cmd='SET_CRED 0 eap TTLS') - Credential/UsernamePassword/EAPMethod/InnerMethod = MS-CHAP-V2 wpa_command(ifname='wlan0', cmd='SET_CRED 0 phase2 "auth=MSCHAPV2"') - Credential/Realm = w1.fi wpa_command(ifname='wlan0', cmd='SET_CRED 0 realm "w1.fi"') PASS hs20_pps_mo_1 1.121502 2022-05-28 14:43:14.454175 passed all 1 test case(s) 2022-05-28 14:43:14 ./run-tests.py ibss_rsn_group_rekey DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_rsn_group_rekey 1/1 Test: IBSS RSN group rekeying Start IBSS on the first STA wlan0 waiting for IBSS start/join to complete Join two STAs to the IBSS wlan1 waiting for IBSS start/join to complete wlan0 waiting for 4-way handshake completion with wlan1 02:00:00:00:01:00 wlan1 waiting for 4-way handshake completion with wlan0 02:00:00:00:00:00 PASS ibss_rsn_group_rekey 13.394475 2022-05-28 14:43:28.009175 passed all 1 test case(s) 2022-05-28 14:43:28 ./run-tests.py ieee8021x_static_wep104 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_static_wep104 1/1 Test: IEEE 802.1X connection using static WEP104 Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_static_wep104 0.9958 2022-05-28 14:43:29.163647 passed all 1 test case(s) 2022-05-28 14:43:29 ./run-tests.py macsec_hostapd_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_hostapd_eap 1/1 Test: MACsec EAP with hostapd ip link: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eth0: mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000 link/ether 64:00:6a:30:91:ac brd ff:ff:ff:ff:ff:ff 3: wlan0: mtu 1500 qdisc mq state DORMANT mode DORMANT group default qlen 1000 link/ether 02:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 4: wlan1: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:01:00 brd ff:ff:ff:ff:ff:ff 5: wlan2: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:02:00 brd ff:ff:ff:ff:ff:ff 6: wlan3: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:03:00 brd ff:ff:ff:ff:ff:ff 7: wlan4: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:04:00 brd ff:ff:ff:ff:ff:ff 8: wlan5: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:05:00 brd ff:ff:ff:ff:ff:ff 9: wlan6: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:06:00 brd ff:ff:ff:ff:ff:ff 10: hwsim0: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ieee802.11/radiotap 12:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_hostapd_eap 0.194576 2022-05-28 14:43:29.517312 passed all 0 test case(s) skipped 1 test case(s) 2022-05-28 14:43:29 ./run-tests.py mbo_cell_capa_update_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_cell_capa_update_pmf 1/1 Test: MBO cellular data capability update with PMF required Starting AP wlan3 Connect STA wlan0 to AP PASS mbo_cell_capa_update_pmf 1.074535 2022-05-28 14:43:30.950038 passed all 1 test case(s) 2022-05-28 14:43:30 ./run-tests.py mesh_select_network DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_select_network 1/1 Test: Mesh network and SELECT_NETWORK PASS mesh_select_network 0.782407 2022-05-28 14:43:31.890528 passed all 1 test case(s) 2022-05-28 14:43:31 ./run-tests.py multi_ap_wps_split_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_wps_split_open 1/1 Test: WPS on split fronthaul and backhaul AP with open fronthaul Starting AP wlan4 Starting AP wlan3 PASS multi_ap_wps_split_open 9.461088 2022-05-28 14:43:41.511002 passed all 1 test case(s) 2022-05-28 14:43:41 ./run-tests.py nfc_wps_handover_pk_hash_mismatch_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_handover_pk_hash_mismatch_sta 1/1 Test: WPS NFC connection handover with invalid pkhash from station (negative) Starting AP wlan3 NFC connection handover PASS nfc_wps_handover_pk_hash_mismatch_sta 0.916509 2022-05-28 14:43:42.584841 passed all 1 test case(s) 2022-05-28 14:43:42 ./run-tests.py p2p_channel_drv_pref_go_neg4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_channel_drv_pref_go_neg4 1/1 Test: P2P GO Negotiation with P2P client device channel preference Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS p2p_channel_drv_pref_go_neg4 2.195809 2022-05-28 14:43:44.940138 passed all 1 test case(s) 2022-05-28 14:43:44 ./run-tests.py p2p_device_join_no_group_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_device_join_no_group_iface 1/1 Test: P2P join-group using cfg80211 P2P Device (no separate group interface) Try to connect the client to the GO wlan7: Trying to discover peer 02:00:00:00:00:00 Client connected Terminate persistent group PASS p2p_device_join_no_group_iface 2.409257 2022-05-28 14:43:47.509725 passed all 1 test case(s) 2022-05-28 14:43:47 ./run-tests.py p2p_ext_discovery_go DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_ext_discovery_go 1/1 Test: P2P device discovery with vendor specific extensions for GO wlan1: Trying to discover peer 02:00:00:00:00:00 PASS p2p_ext_discovery_go 0.591765 2022-05-28 14:43:48.258197 passed all 1 test case(s) 2022-05-28 14:43:48 ./run-tests.py p2p_ext_vendor_elem_go_neg_resp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_ext_vendor_elem_go_neg_resp 1/1 Test: VENDOR_ELEM in GO Negotiation Response frames wlan1: Trying to discover peer 02:00:00:00:00:00 PASS p2p_ext_vendor_elem_go_neg_resp 0.323748 2022-05-28 14:43:48.742307 passed all 1 test case(s) 2022-05-28 14:43:48 ./run-tests.py p2p_go_move_reg_change DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_go_move_reg_change 1/1 Test: P2P GO move due to regulatory change Start autonomous GO wlan0 Try to connect the client to the GO wlan1: Trying to discover peer 02:00:00:00:00:00 Client connected PASS p2p_go_move_reg_change 7.554251 2022-05-28 14:43:56.455370 passed all 1 test case(s) 2022-05-28 14:43:56 ./run-tests.py p2p_listen_and_offchannel_tx DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_listen_and_offchannel_tx 1/1 Test: P2P_LISTEN behavior with offchannel TX wlan0: Trying to discover peer 02:00:00:00:01:00 wlan2: Trying to discover peer 02:00:00:00:00:00 PASS p2p_listen_and_offchannel_tx 0.584605 2022-05-28 14:43:57.198398 passed all 1 test case(s) 2022-05-28 14:43:57 ./run-tests.py p2p_msg_invitation_req_to_go DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_msg_invitation_req_to_go 1/1 Test: P2P protocol tests for invitation request processing on GO device Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group PASS p2p_msg_invitation_req_to_go 2.791892 2022-05-28 14:44:00.146132 passed all 1 test case(s) 2022-05-28 14:44:00 ./run-tests.py p2ps_connect_p2p_device2_no_group_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_connect_p2p_device2_no_group_iface 1/1 Test: P2PS connection using cfg80211 P2P Device (reverse) (no separate group interface) PASS p2ps_connect_p2p_device2_no_group_iface 2.41605 2022-05-28 14:44:02.722915 passed all 1 test case(s) 2022-05-28 14:44:02 ./run-tests.py pasn_ccmp_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_ccmp_256 1/1 Test: PASN authentication with WPA2/CCMP256 AP Starting AP wlan3 sta: TK: ddf8c7c2a83aa590a75b317c9bc26042ac37b6f68d665991cc7c813762291eeb KDK: ap : TK: ddf8c7c2a83aa590a75b317c9bc26042ac37b6f68d665991cc7c813762291eeb KDK: PASS pasn_ccmp_256 0.648669 2022-05-28 14:44:03.527410 passed all 1 test case(s) 2022-05-28 14:44:03 ./run-tests.py pasn_comeback DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_comeback 1/1 Test: PASN authentication with comeback flow Starting AP wlan3 sta: TK: 2e3e2c63c1433921b27f7a11cd822d80 KDK: ap : TK: 2e3e2c63c1433921b27f7a11cd822d80 KDK: PASS pasn_comeback 0.608799 2022-05-28 14:44:04.292637 passed all 1 test case(s) 2022-05-28 14:44:04 ./run-tests.py pasn_fils_sha384 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_fils_sha384 1/1 Test: PASN FILS authentication using SHA-384 Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP sta: TK: 27cc5a413b2cafd7c47c57c573a0cb04 KDK: ap : TK: 27cc5a413b2cafd7c47c57c573a0cb04 KDK: PASS pasn_fils_sha384 1.195409 2022-05-28 14:44:05.645951 passed all 1 test case(s) 2022-05-28 14:44:05 ./run-tests.py persistent_group_in_grpform DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START persistent_group_in_grpform 1/1 Test: P2P persistent group parameters re-used in group formation Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 PASS persistent_group_in_grpform 4.021991 2022-05-28 14:44:09.826191 passed all 1 test case(s) 2022-05-28 14:44:09 ./run-tests.py pmksa_cache_preauth_vlan_used_per_sta_vif DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pmksa_cache_preauth_vlan_used_per_sta_vif 1/1 Test: RSN pre-authentication to generate PMKSA cache entry (station with VLAN set, per_sta_vif=1) Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS pmksa_cache_preauth_vlan_used_per_sta_vif 3.010531 2022-05-28 14:44:12.996820 passed all 1 test case(s) 2022-05-28 14:44:13 ./run-tests.py radius_acct DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_acct 1/1 Test: RADIUS Accounting Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Checking for RADIUS counters PASS radius_acct 1.700935 2022-05-28 14:44:14.855451 passed all 1 test case(s) 2022-05-28 14:44:14 ./run-tests.py radius_acct_unreachable4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_acct_unreachable4 1/1 Test: RADIUS Accounting server unreachable and multiple STAs Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS radius_acct_unreachable4 7.076793 2022-05-28 14:44:22.090622 passed all 1 test case(s) 2022-05-28 14:44:22 ./run-tests.py rfkill_autogo DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rfkill_autogo 1/1 Test: rfkill block/unblock for autonomous P2P GO rfkill block 0 rfkill block 1 rfkill unblock 0 rfkill unblock 1 PASS rfkill_autogo 1.748291 2022-05-28 14:44:23.997894 passed all 1 test case(s) 2022-05-28 14:44:24 ./run-tests.py rrm_beacon_req_table_detail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_table_detail 1/1 Test: Beacon request - beacon table mode - reporting detail Starting AP wlan3 Connect STA wlan0 to AP Reporting Detail 0 Received beacon report: opclass=81 channel=1 start=0 duration=0 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 fragment_id=0100 Reporting Detail 1 Received beacon report: opclass=81 channel=1 start=0 duration=0 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 frame_body=edd0847513e0050064000114 fragment_id=0100 Reporting Detail 2 Received beacon report: opclass=81 channel=1 start=0 duration=0 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 frame_body=edd0847513e0050064000114000372726d010882848b960c1218240301012a010432043048606c460570000000003b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00 fragment_id=0100 Reporting Detail 3 (invalid) Reporting Detail (too short) PASS rrm_beacon_req_table_detail 0.890325 2022-05-28 14:44:25.044681 passed all 1 test case(s) 2022-05-28 14:44:25 ./run-tests.py sae_key_lifetime_in_memory DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_key_lifetime_in_memory 1/1 Test: SAE and key lifetime in memory Starting AP wlan3 Connect STA wlan0 to AP Reading process memory (pid=4526) [heap] 0x557b6a4b2000-0x557b6a4ea000 is at 12288-241664 [stack] 0x7ffff42fe000-0x7ffff4320000 is at 991232-1130496 Total process memory read: 1130496 bytes Checking keys in memory while associated Skip test case: Password not found while associated SKIP sae_key_lifetime_in_memory 1.824342 2022-05-28 14:44:27.028966 passed all 0 test case(s) skipped 1 test case(s) 2022-05-28 14:44:27 ./run-tests.py sae_proto_hostapd_status_126 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_proto_hostapd_status_126 1/1 Test: SAE protocol testing with hostapd (status code 126) Starting AP wlan3 PASS sae_proto_hostapd_status_126 0.450924 2022-05-28 14:44:27.642377 passed all 1 test case(s) 2022-05-28 14:44:27 ./run-tests.py scan_flush DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_flush 1/1 Test: Ongoing scan and FLUSH Starting AP wlan3 PASS scan_flush 0.450034 2022-05-28 14:44:28.254226 passed all 1 test case(s) 2022-05-28 14:44:28 ./run-tests.py scan_multi_bssid_fms DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multi_bssid_fms 1/1 Test: Non-transmitting BSS has different FMS IE from transmitting BSS Starting AP wlan3 trans_bss fms ie: 013901 nontrans_bss fms ie: 0229320102 PASS scan_multi_bssid_fms 0.479493 2022-05-28 14:44:28.896456 passed all 1 test case(s) 2022-05-28 14:44:28 ./run-tests.py sigma_dut_eap_ttls_uosc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_eap_ttls_uosc 1/1 Test: sigma_dut controlled STA and EAP-TTLS with UOSC Starting AP wlan3 Skip test case: sigma_dut not available SKIP sigma_dut_eap_ttls_uosc 0.433256 2022-05-28 14:44:29.491686 passed all 0 test case(s) skipped 1 test case(s) 2022-05-28 14:44:29 ./run-tests.py sigma_dut_sae DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_sae 1/1 Test: sigma_dut controlled SAE association Skip test case: sigma_dut not available SKIP sigma_dut_sae 0.069604 2022-05-28 14:44:29.721740 passed all 0 test case(s) skipped 1 test case(s) 2022-05-28 14:44:29 ./run-tests.py ssid_hidden_wpa2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ssid_hidden_wpa2 1/1 Test: Hidden SSID with WPA2-PSK Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan0 to AP PASS ssid_hidden_wpa2 2.46069 2022-05-28 14:44:32.343599 passed all 1 test case(s) 2022-05-28 14:44:32 ./run-tests.py wext_wep_shared_key_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wext_wep_shared_key_auth 1/1 Test: WEP Shared Key authentication Starting AP wlan3 Connect STA wlan5 to AP Connect STA wlan5 to AP PASS wext_wep_shared_key_auth 5.109568 2022-05-28 14:44:37.610375 passed all 1 test case(s) 2022-05-28 14:44:37 ./run-tests.py wifi_display_persistent_group DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wifi_display_persistent_group 1/1 Test: P2P persistent group formation and re-invocation with Wi-Fi Display enabled Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group Re-invoke persistent group from client wlan1: Trying to discover peer 02:00:00:00:00:00 Terminate persistent group Re-invoke persistent group from GO wlan0: Trying to discover peer 02:00:00:00:01:00 Terminate persistent group Try to connect the client to the GO wlan2: Trying to discover peer 02:00:00:00:00:00 Client connected wlan1: Trying to discover peer 02:00:00:00:00:00 PASS wifi_display_persistent_group 7.27379 2022-05-28 14:44:45.042733 passed all 1 test case(s) 2022-05-28 14:44:45 ./run-tests.py wmediumd_scan_only_one DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wmediumd_scan_only_one 1/1 Test: Test that scanning with a single active AP only returns that one (wmediund) Starting AP wlan3 PASS wmediumd_scan_only_one 3.924928 2022-05-28 14:44:49.125042 passed all 1 test case(s) 2022-05-28 14:44:49 ./run-tests.py wnm_bss_tm_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_tm_errors 1/1 Test: WNM BSS Transition Management errors Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_bss_tm_errors 0.857421 2022-05-28 14:44:50.141408 passed all 1 test case(s) 2022-05-28 14:44:50 ./run-tests.py wnm_bss_tm_nei_11b DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_tm_nei_11b 1/1 Test: WNM BSS Transition Management and 11g neighbor Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Preferred Candidate List (matching neighbor for another BSS) without Disassociation Imminent PASS wnm_bss_tm_nei_11b 1.921083 2022-05-28 14:44:52.221027 passed all 1 test case(s) 2022-05-28 14:44:52 ./run-tests.py wnm_bss_tm_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_tm_req 1/1 Test: BSS Transition Management Request Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_bss_tm_req 1.000457 2022-05-28 14:44:53.381748 passed all 1 test case(s) 2022-05-28 14:44:53 ./run-tests.py wpas_ctrl_log_level DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_log_level 1/1 Test: wpa_supplicant ctrl_iface LOG_LEVEL PASS wpas_ctrl_log_level 0.070596 2022-05-28 14:44:53.611068 passed all 1 test case(s) 2022-05-28 14:44:53 ./run-tests.py wps_ext_proto_nack_m3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_nack_m3 1/1 Test: WPS and NACK M3 Starting AP wlan3 PASS wps_ext_proto_nack_m3 0.901038 2022-05-28 14:44:54.670034 passed all 1 test case(s) 2022-05-28 14:44:54 ./stop.sh