group: group-32, test: group-32 2025-08-05 16:47:38 export USER=root 2025-08-05 16:47:38 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2025-08-05 16:48:26 ./start.sh 2025-08-05 16:48:27 ./run-tests.py ap_acs_exclude_dfs DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_acs_exclude_dfs 1/1 Test: Automatic channel selection, exclude DFS Starting AP wlan3 Exception during test execution: AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 585, in main t(dev, apdev, params) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_acs.py", line 511, in test_ap_acs_exclude_dfs force_prev_ap_on_5g(apdev[0]) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_acs.py", line 25, in force_prev_ap_on_5g hostapd.add_ap(ap, {"ssid": "open", "hw_mode": "a", File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL ap_acs_exclude_dfs 6.749479 2025-08-05 16:48:34.970727 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_acs_exclude_dfs 2025-08-05 16:48:35 ./run-tests.py ap_anqp_no_sharing_diff_ess DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_anqp_no_sharing_diff_ess 1/1 Test: ANQP no sharing between ESSs Starting AP wlan3 Starting AP wlan4 Normal network selection with shared ANQP results PASS ap_anqp_no_sharing_diff_ess 1.767192 2025-08-05 16:48:37.023451 passed all 1 test case(s) 2025-08-05 16:48:37 ./run-tests.py ap_cipher_ccmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cipher_ccmp 1/1 Test: WPA2-PSK/CCMP connection Starting AP wlan3 Connect STA wlan0 to AP PASS ap_cipher_ccmp 1.144279 2025-08-05 16:48:38.443507 passed all 1 test case(s) 2025-08-05 16:48:38 ./run-tests.py ap_cipher_replay_protection_sta_ccmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cipher_replay_protection_sta_ccmp 1/1 Test: CCMP replay protection on STA (TK) Starting AP wlan3 Connect STA wlan0 to AP Exception during test execution: invalid literal for int() with base 10: '' Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 587, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ciphers.py", line 644, in test_ap_cipher_replay_protection_sta_ccmp run_ap_cipher_replay_protection_sta(dev, apdev, "CCMP") File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ciphers.py", line 707, in run_ap_cipher_replay_protection_sta replays = get_tk_replay_counter(phy, keytype) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ciphers.py", line 580, in get_tk_replay_counter return int(f.read()) ^^^^^^^^^^^^^ ValueError: invalid literal for int() with base 10: '' FAIL ap_cipher_replay_protection_sta_ccmp 1.588807 2025-08-05 16:48:40.304025 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_cipher_replay_protection_sta_ccmp 2025-08-05 16:48:40 ./run-tests.py ap_ft_mixed DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_mixed 1/1 Test: WPA2-PSK-FT mixed-mode AP Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_mixed 2.678264 2025-08-05 16:48:43.261749 passed all 1 test case(s) 2025-08-05 16:48:43 ./run-tests.py ap_ft_oom4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_oom4 1/1 Test: WPA2-PSK-FT and OOM (4) Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_ft_oom4 2.591641 2025-08-05 16:48:46.132048 passed all 1 test case(s) 2025-08-05 16:48:46 ./run-tests.py ap_ft_ptk_rekey2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_ptk_rekey2 1/1 Test: WPA2-PSK-FT PTK rekeying triggered by station after one roam Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP PASS ap_ft_ptk_rekey2 2.923381 2025-08-05 16:48:49.329717 passed all 1 test case(s) 2025-08-05 16:48:49 ./run-tests.py ap_ft_ptk_rekey_ap2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_ptk_rekey_ap2 1/1 Test: WPA2-PSK-FT PTK rekeying triggered by AP after one roam Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP PASS ap_ft_ptk_rekey_ap2 4.289563 2025-08-05 16:48:53.893586 passed all 1 test case(s) 2025-08-05 16:48:53 ./run-tests.py ap_hs20_eap_peap_mschapv2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_eap_peap_mschapv2 1/1 Test: Hotspot 2.0 connection with PEAP/MSCHAPV2 Starting AP wlan3 PASS ap_hs20_eap_peap_mschapv2 1.782955 2025-08-05 16:48:55.953200 passed all 1 test case(s) 2025-08-05 16:48:55 ./run-tests.py ap_hs20_interworking_add_network DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_interworking_add_network 1/1 Test: Hotspot 2.0 connection using INTERWORKING_ADD_NETWORK Starting AP wlan3 PASS ap_hs20_interworking_add_network 1.187351 2025-08-05 16:48:57.411752 passed all 1 test case(s) 2025-08-05 16:48:57 ./run-tests.py ap_hs20_req_conn_capab_and_roaming_partner_preference DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_req_conn_capab_and_roaming_partner_preference 1/1 Test: Hotspot 2.0 and req_conn_capab with roaming partner preference Starting AP wlan3 Starting AP wlan4 PASS ap_hs20_req_conn_capab_and_roaming_partner_preference 2.876636 2025-08-05 16:49:00.565317 passed all 1 test case(s) 2025-08-05 16:49:00 ./run-tests.py ap_hs20_terms_and_conditions_sql2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_terms_and_conditions_sql2 1/1 Test: Hotspot 2.0 Terms and Conditions using SQLite for user DB Starting AP wlan4 Starting AP wlan3 current_sessions: [('02:00:00:00:00:00', 'anonymous@example.com', '1754412542', '127.0.0.1', 1, None, None)] current_sessions: [('02:00:00:00:00:00', 'anonymous@example.com', '1754412542', '127.0.0.1', 0, 0, 1)] PASS ap_hs20_terms_and_conditions_sql2 3.732526 2025-08-05 16:49:04.573110 passed all 1 test case(s) 2025-08-05 16:49:04 ./run-tests.py ap_ht_op_class_122 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht_op_class_122 1/1 Test: HT40 on operating class 122 Starting AP wlan3 Skip test case: Channel not supported SKIP ap_ht_op_class_122 5.780028 2025-08-05 16:49:10.628370 passed all 0 test case(s) skipped 1 test case(s) 2025-08-05 16:49:10 ./run-tests.py ap_open_select_any DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_select_any 1/1 Test: AP with open mode and select any network Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_open_select_any 0.990702 2025-08-05 16:49:11.894931 passed all 1 test case(s) 2025-08-05 16:49:11 ./run-tests.py ap_open_select_twice DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_select_twice 1/1 Test: AP with open mode and select network twice Connect STA wlan0 to AP Starting AP wlan3 PASS ap_open_select_twice 1.046618 2025-08-05 16:49:13.215797 passed all 1 test case(s) 2025-08-05 16:49:13 ./run-tests.py ap_pmf_sta_unprot_deauth_burst DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_sta_unprot_deauth_burst 1/1 Test: WPA2-PSK AP with station receiving burst of unprotected Deauthentication frames Connect STA wlan0 to AP PASS ap_pmf_sta_unprot_deauth_burst 16.281591 2025-08-05 16:49:29.768187 passed all 1 test case(s) 2025-08-05 16:49:29 ./run-tests.py ap_pmf_sta_unprot_deauth_burst_hostapd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_sta_unprot_deauth_burst_hostapd 1/1 Test: WPA2-PSK AP with station receiving burst of unprotected Deauthentication frames (hostapd) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_sta_unprot_deauth_burst_hostapd 16.287005 2025-08-05 16:49:46.329337 passed all 1 test case(s) 2025-08-05 16:49:46 ./run-tests.py ap_sae_tdls DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_sae_tdls 1/1 Test: SAE AP and two stations using TDLS Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Setup TDLS Teardown TDLS Setup TDLS PASS ap_sae_tdls 6.6663 2025-08-05 16:49:53.270485 passed all 1 test case(s) 2025-08-05 16:49:53 ./run-tests.py ap_wpa2_bridge_fdb DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_bridge_fdb 1/1 Test: Bridge FDB entry removal Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_wpa2_bridge_fdb 2.733165 2025-08-05 16:49:56.278350 passed all 1 test case(s) 2025-08-05 16:49:56 ./run-tests.py ap_wpa2_delayed_group_m1_retransmission_igtk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_delayed_group_m1_retransmission_igtk 1/1 Test: Delayed group M1 retransmission (check IGTK protection) Skip test case: Not running under VM SKIP ap_wpa2_delayed_group_m1_retransmission_igtk 0.064947 2025-08-05 16:49:56.621275 passed all 0 test case(s) skipped 1 test case(s) 2025-08-05 16:49:56 ./run-tests.py ap_wpa2_eap_peap_eap_mschapv2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_peap_eap_mschapv2 1/1 Test: WPA2-Enterprise connection using EAP-PEAP/EAP-MSCHAPv2 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Password as hash value Connect STA wlan0 to AP Negative test with incorrect password Connect STA wlan0 to AP PASS ap_wpa2_eap_peap_eap_mschapv2 2.286083 2025-08-05 16:49:59.189806 passed all 1 test case(s) 2025-08-05 16:49:59 ./run-tests.py ap_wpa2_eap_reauth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_reauth 1/1 Test: WPA2-Enterprise and Authenticator forcing reauthentication Starting AP wlan3 Connect STA wlan0 to AP Wait for reauthentication PASS ap_wpa2_eap_reauth 2.962861 2025-08-05 16:50:02.433570 passed all 1 test case(s) 2025-08-05 16:50:02 ./run-tests.py ap_wpa2_eap_sim_db_sqlite DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_sim_db_sqlite 1/1 Test: EAP-SIM DB error cases (SQLite) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_sim_db_sqlite 1.076022 2025-08-05 16:50:03.784945 passed all 1 test case(s) 2025-08-05 16:50:03 ./run-tests.py ap_wpa2_eap_sim_ext_replace_sim3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_sim_ext_replace_sim3 1/1 Test: EAP-SIM with external GSM auth, replacing SIM, and no identity in config Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_sim_ext_replace_sim3 1.40998 2025-08-05 16:50:05.474496 passed all 1 test case(s) 2025-08-05 16:50:05 ./run-tests.py ap_wpa2_eap_tls_check_cert_subject DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_check_cert_subject 1/1 Test: EAP-TLS and server checking client subject name Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_check_cert_subject 1.069007 2025-08-05 16:50:06.820264 passed all 1 test case(s) 2025-08-05 16:50:06 ./run-tests.py ap_wpa2_eap_tls_diff_ca_trust3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_diff_ca_trust3 1/1 Test: WPA2-Enterprise connection using EAP-TTLS/PAP and different CA trust Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_diff_ca_trust3 1.393243 2025-08-05 16:50:08.508879 passed all 1 test case(s) 2025-08-05 16:50:08 ./run-tests.py ap_wpa2_eap_tls_domain_match_cn DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_domain_match_cn 1/1 Test: WPA2-Enterprise using EAP-TLS and domainmatch (CN) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_domain_match_cn 1.087487 2025-08-05 16:50:09.874688 passed all 1 test case(s) 2025-08-05 16:50:09 ./run-tests.py ap_wpa2_eap_ttls_13 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_13 1/1 Test: EAP-TTLS and TLS 1.3 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_13 1.485786 2025-08-05 16:50:11.634539 passed all 1 test case(s) 2025-08-05 16:50:11 ./run-tests.py ap_wpa2_igtk_initial_rsc_bip_gmac_128 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_igtk_initial_rsc_bip_gmac_128 1/1 Test: Initial management group cipher RSC (BIP-GMAC-128) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_igtk_initial_rsc_bip_gmac_128 2.07627 2025-08-05 16:50:13.981729 passed all 1 test case(s) 2025-08-05 16:50:14 ./run-tests.py ap_wpa2_sha256_ptk_rekey_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_sha256_ptk_rekey_ap 1/1 Test: WPA2-PSK/SHA256 AKM AP and PTK rekey enforced by AP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_sha256_ptk_rekey_ap 3.1113 2025-08-05 16:50:17.370563 passed all 1 test case(s) 2025-08-05 16:50:17 ./run-tests.py ap_wpa_eap_peap_eap_mschapv2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa_eap_peap_eap_mschapv2 1/1 Test: WPA-Enterprise connection using EAP-PEAP/EAP-MSCHAPv2 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa_eap_peap_eap_mschapv2 1.709078 2025-08-05 16:50:19.349307 passed all 1 test case(s) 2025-08-05 16:50:19 ./run-tests.py ap_wps_adv_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_adv_oom 1/1 Test: WPS AP and advertisement OOM Starting AP wlan3 PASS ap_wps_adv_oom 1.458075 2025-08-05 16:50:21.079750 passed all 1 test case(s) 2025-08-05 16:50:21 ./run-tests.py ap_wps_conf_pin_gcmp_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_conf_pin_gcmp_256 1/1 Test: WPS PIN provisioning with configured AP using GCMP-256 Starting AP wlan3 WPS provisioning step PASS ap_wps_conf_pin_gcmp_256 2.245777 2025-08-05 16:50:23.599797 passed all 1 test case(s) 2025-08-05 16:50:23 ./run-tests.py ap_wps_invalid_wps_config_passphrase DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_invalid_wps_config_passphrase 1/1 Test: AP configuration using wps_config command with invalid passphrase Starting AP wlan3 PASS ap_wps_invalid_wps_config_passphrase 0.534972 2025-08-05 16:50:24.409559 passed all 1 test case(s) 2025-08-05 16:50:24 ./run-tests.py ap_wps_pbc_pin_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_pbc_pin_mismatch 1/1 Test: WPS PBC/PIN mismatch Starting AP wlan3 PASS ap_wps_pbc_pin_mismatch 1.309728 2025-08-05 16:50:25.998027 passed all 1 test case(s) 2025-08-05 16:50:26 ./run-tests.py ap_wps_random_psk_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_random_psk_fail 1/1 Test: WPS and no random for PSK on AP Starting AP wlan3 PASS ap_wps_random_psk_fail 4.064844 2025-08-05 16:50:30.334632 passed all 1 test case(s) 2025-08-05 16:50:30 ./run-tests.py ap_wps_tkip DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_tkip 1/1 Test: WPS AP trying to enable TKIP Starting AP wlan3 PASS ap_wps_tkip 0.55789 2025-08-05 16:50:31.172281 passed all 1 test case(s) 2025-08-05 16:50:31 ./run-tests.py dbus_anqp_get DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_anqp_get 1/1 Test: D-Bus ANQP get test Starting AP wlan3 PASS dbus_anqp_get 1.233368 2025-08-05 16:50:32.679707 passed all 1 test case(s) 2025-08-05 16:50:32 ./run-tests.py dbus_nan_usd_publish DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_nan_usd_publish 1/1 Test: D-Bus NAN USD publish PASS dbus_nan_usd_publish 15.082784 2025-08-05 16:50:48.032563 passed all 1 test case(s) 2025-08-05 16:50:48 ./run-tests.py dpp_auth_req_retries_multi_chan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_auth_req_retries_multi_chan 1/1 Test: DPP initiator retries with no ACK and multiple channels PASS dpp_auth_req_retries_multi_chan 2.424433 2025-08-05 16:50:50.726830 passed all 1 test case(s) 2025-08-05 16:50:50 ./run-tests.py dpp_config_connector_error_expired_3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_connector_error_expired_3 1/1 Test: DPP Config Object connector error - expired 3 r=b5b910771e70a5d685a05862108471fdc8d2c61b915ea927e4b2d1d481054b62 s=f96fc8b5503f652f27446df678e9dd3027c70d381534b1e2e509fec3732f61f2 dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_connector_error_expired_3 0.144951 2025-08-05 16:50:51.146250 passed all 1 test case(s) 2025-08-05 16:50:51 ./run-tests.py dpp_config_no_discovery DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_no_discovery 1/1 Test: DPP Config Object error - no discovery dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_no_discovery 0.120283 2025-08-05 16:50:51.542087 passed all 1 test case(s) 2025-08-05 16:50:51 ./run-tests.py dpp_config_unsupported_cred_akm DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_unsupported_cred_akm 1/1 Test: DPP Config Object error - unsupported cred::akm dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_unsupported_cred_akm 0.124701 2025-08-05 16:50:51.949602 passed all 1 test case(s) 2025-08-05 16:50:51 ./run-tests.py dpp_proto_auth_resp_no_r_proto_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_resp_no_r_proto_key 1/1 Test: DPP protocol testing - no R-Proto Key in Auth Resp PASS dpp_proto_auth_resp_no_r_proto_key 0.20165 2025-08-05 16:50:52.426657 passed all 1 test case(s) 2025-08-05 16:50:52 ./run-tests.py dpp_proto_pkex_cr_req_no_bootstrap_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_pkex_cr_req_no_bootstrap_key 1/1 Test: DPP protocol testing - no Bootstrap Key in PKEX Commit-Reveal Request PASS dpp_proto_pkex_cr_req_no_bootstrap_key 0.174913 2025-08-05 16:50:52.878094 passed all 1 test case(s) 2025-08-05 16:50:52 ./run-tests.py dpp_qr_code_auth_mutual_bp_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_auth_mutual_bp_256 1/1 Test: DPP QR Code and authentication exchange (mutual, autogen BP-256) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication dev0 scans QR Code PASS dpp_qr_code_auth_mutual_bp_256 0.242817 2025-08-05 16:50:53.399280 passed all 1 test case(s) 2025-08-05 16:50:53 ./run-tests.py eap_gpsk_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_gpsk_errors 1/1 Test: EAP-GPSK error cases Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_gpsk_errors 10.25497 2025-08-05 16:51:03.929737 passed all 1 test case(s) 2025-08-05 16:51:03 ./run-tests.py eap_proto_pwd_invalid_scalar DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_pwd_invalid_scalar 1/1 Test: EAP-pwd protocol tests - invalid server scalar Starting AP wlan3 Connect STA wlan0 to AP pwd_handler - RX 02f2000d017077642075736572 Test: Valid id exchange pwd_handler - RX 02f3001734010013010100000000007077642075736572 Test: Commit payload with invalid scalar Starting AP wlan3 Connect STA wlan0 to AP pwd_handler - RX 0213000d017077642075736572 Test: Valid id exchange pwd_handler - RX 0214001734010013010100000000007077642075736572 Test: Commit payload with invalid scalar Starting AP wlan3 Connect STA wlan0 to AP pwd_handler - RX 02f5000d017077642075736572 Test: Valid id exchange pwd_handler - RX 02f6001734010013010100000000007077642075736572 Test: Commit payload with invalid scalar Starting AP wlan3 Connect STA wlan0 to AP pwd_handler - RX 0265000d017077642075736572 Test: Valid id exchange pwd_handler - RX 0266001734010013010100000000007077642075736572 Test: Commit payload with invalid scalar pwd_handler - RX 026700663402f9fe6f030f66b70595232113272f35baee729533f2ef1005498746ed8957ecb5d6fa6a5697aaa820c283f9273518f80add7a18a90e48384fade389b0687f8cb9e8820bc8793f6de5e96f3587f1bd3e23127bbbd56197d8fd7d34dcb3064b39e7 Confirm message next - should not get here PASS eap_proto_pwd_invalid_scalar 3.8382 2025-08-05 16:51:08.038132 passed all 1 test case(s) 2025-08-05 16:51:08 ./run-tests.py eap_teap_basic_password_auth_user_and_machine_fail_machine DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_basic_password_auth_user_and_machine_fail_machine 1/1 Test: EAP-TEAP with Basic-Password-Auth using user and machine credentials (fail machine) Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_basic_password_auth_user_and_machine_fail_machine 1.035444 2025-08-05 16:51:09.353730 passed all 1 test case(s) 2025-08-05 16:51:09 ./run-tests.py eht_6ghz_320mhz_3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eht_6ghz_320mhz_3 1/1 Test: EHT with 320 MHz channel width on 6 GHz center 31 primary 37 Skip test case: 6 GHz frequency is not supported SKIP eht_6ghz_320mhz_3 0.294108 2025-08-05 16:51:09.917223 passed all 0 test case(s) skipped 1 test case(s) 2025-08-05 16:51:09 ./run-tests.py eht_mld_gtk_rekey_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eht_mld_gtk_rekey_failure 1/1 Test: AP MLD and GTK rekeying failure with MLD client connection using two links Adding link on: ifname=wlan7 Adding link on: ifname=wlan7 Connect STA wlan8 to AP PASS eht_mld_gtk_rekey_failure 10.182014 2025-08-05 16:51:20.380188 passed all 1 test case(s) 2025-08-05 16:51:20 ./run-tests.py ext_password_file_with_partially_matching_keys DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ext_password_file_with_partially_matching_keys 1/1 Test: External password (file) storage with partially matching keys Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ext_password_file_with_partially_matching_keys 1.072829 2025-08-05 16:51:21.723053 passed all 1 test case(s) 2025-08-05 16:51:21 ./run-tests.py fst_ap_remove_session_no_params DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_remove_session_no_params 1/1 Test: FST AP remove session - no params Starting AP wlan3 (old add_ap argument type) Exception during test execution: AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 585, in main t(dev, apdev, params) File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 1400, in test_fst_ap_remove_session_no_params fst_remove_session(apdev, test_params, remove_scenario_no_params, True) File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 476, in fst_remove_session ap1, ap2, sta1, sta2 = fst_module_aux.start_two_ap_sta_pairs(apdev) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 78, in start_two_ap_sta_pairs ap1.start() File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 613, in start self.hapd = hostapd.add_ap(self.iface, params) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL fst_ap_remove_session_no_params 5.315472 2025-08-05 16:51:27.313901 passed 0 test case(s) skipped 0 test case(s) failed tests: fst_ap_remove_session_no_params 2025-08-05 16:51:27 ./run-tests.py fst_ap_start_session_negative_llt DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_start_session_negative_llt 1/1 Test: FST AP start session - negative llt Starting AP wlan3 (old add_ap argument type) Exception during test execution: AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 585, in main t(dev, apdev, params) File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 1186, in test_fst_ap_start_session_negative_llt fst_start_session(apdev, test_params, bad_param_negative_llt, True) File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 95, in fst_start_session ap1, ap2, sta1, sta2 = fst_module_aux.start_two_ap_sta_pairs(apdev) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 78, in start_two_ap_sta_pairs ap1.start() File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 613, in start self.hapd = hostapd.add_ap(self.iface, params) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL fst_ap_start_session_negative_llt 5.302898 2025-08-05 16:51:32.893356 passed 0 test case(s) skipped 0 test case(s) failed tests: fst_ap_start_session_negative_llt 2025-08-05 16:51:32 ./run-tests.py fst_ap_start_session_no_add_params DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_start_session_no_add_params 1/1 Test: FST AP start session - no add params Starting AP wlan3 (old add_ap argument type) Exception during test execution: AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 585, in main t(dev, apdev, params) File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 1157, in test_fst_ap_start_session_no_add_params fst_start_session(apdev, test_params, bad_param_session_add_no_params, True) File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 95, in fst_start_session ap1, ap2, sta1, sta2 = fst_module_aux.start_two_ap_sta_pairs(apdev) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 78, in start_two_ap_sta_pairs ap1.start() File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 613, in start self.hapd = hostapd.add_ap(self.iface, params) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL fst_ap_start_session_no_add_params 5.324614 2025-08-05 16:51:38.503344 passed 0 test case(s) skipped 0 test case(s) failed tests: fst_ap_start_session_no_add_params 2025-08-05 16:51:38 ./run-tests.py fst_attach_zero_llt DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_attach_zero_llt 1/1 Test: FST attach with llt=0 PASS fst_attach_zero_llt 0.302301 2025-08-05 16:51:39.082510 passed all 1 test case(s) 2025-08-05 16:51:39 ./run-tests.py fst_sta_config_pri_zero DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_config_pri_zero 1/1 Test: FST STA configuration Priority zero kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - try again after a second kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - could not kill the process PASS fst_sta_config_pri_zero 1.317201 2025-08-05 16:51:40.671400 passed all 1 test case(s) 2025-08-05 16:51:40 ./run-tests.py fst_sta_connect_to_fst_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_connect_to_fst_ap 1/1 Test: FST STA connecting to FST AP Starting AP wlan3 (old add_ap argument type) Exception during test execution: AP startup failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 585, in main t(dev, apdev, params) File "/lkp/benchmarks/hwsim/tests/hwsim/test_fst_module.py", line 766, in test_fst_sta_connect_to_fst_ap ap1, ap2, sta1, sta2 = fst_module_aux.start_two_ap_sta_pairs(apdev) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 78, in start_two_ap_sta_pairs ap1.start() File "/lkp/benchmarks/hwsim/tests/hwsim/fst_module_aux.py", line 613, in start self.hapd = hostapd.add_ap(self.iface, params) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/lkp/benchmarks/hwsim/tests/hwsim/hostapd.py", line 719, in add_ap raise Exception("AP startup failed") Exception: AP startup failed FAIL fst_sta_connect_to_fst_ap 5.263655 2025-08-05 16:51:46.209775 passed 0 test case(s) skipped 0 test case(s) failed tests: fst_sta_connect_to_fst_ap 2025-08-05 16:51:46 ./run-tests.py gas_anqp_venue_url_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_anqp_venue_url_pmf 1/1 Test: GAS/ANQP and Venue URL with PMF Starting AP wlan3 Connect STA wlan0 to AP PASS gas_anqp_venue_url_pmf 1.667859 2025-08-05 16:51:48.152545 passed all 1 test case(s) 2025-08-05 16:51:48 ./run-tests.py grpform_goneg_fail_with_group_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_goneg_fail_with_group_iface 1/1 Test: P2P group formation fails while using group interface wlan0: Trying to discover peer 02:00:00:00:01:00 PASS grpform_goneg_fail_with_group_iface 0.438725 2025-08-05 16:51:48.863728 passed all 1 test case(s) 2025-08-05 16:51:48 ./run-tests.py grpform_pref_chan_go_overridden DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_pref_chan_go_overridden 1/1 Test: P2P group formation preferred channel selection by GO overridden by client Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS grpform_pref_chan_go_overridden 3.126484 2025-08-05 16:51:52.269399 passed all 1 test case(s) 2025-08-05 16:51:52 ./run-tests.py hapd_ctrl_vendor_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_vendor_errors 1/1 Test: hostapd and VENDOR errors Starting AP wlan3 PASS hapd_ctrl_vendor_errors 0.527483 2025-08-05 16:51:53.069938 passed all 1 test case(s) 2025-08-05 16:51:53 ./run-tests.py ieee8021x_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_open 1/1 Test: IEEE 802.1X connection using open network Starting AP wlan3 Connect STA wlan0 to AP Test EAPOL-Logoff PASS ieee8021x_open 1.487117 2025-08-05 16:51:54.830355 passed all 1 test case(s) 2025-08-05 16:51:54 ./run-tests.py macsec_psk_ckn_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_ckn_mismatch 1/1 Test: MACsec PSK (CKN mismatch) ip macsec: 77: macsec0: protect on validate strict sc off sa off encrypt on send_sci on end_station off scb off replay off cipher suite: GCM-AES-128, using ICV length 16 TXSC: 6a6a5fd7e3ff0001 on SA 0 offload: off ip link: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eth0: mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000 link/ether 98:90:96:e4:18:ed brd ff:ff:ff:ff:ff:ff altname eno1 altname enp0s25 3: wlan0: mtu 1500 qdisc noqueue state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 4: wlan1: mtu 1500 qdisc noqueue state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:01:00 brd ff:ff:ff:ff:ff:ff 5: wlan2: mtu 1500 qdisc noqueue state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:02:00 brd ff:ff:ff:ff:ff:ff 6: wlan3: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:03:00 brd ff:ff:ff:ff:ff:ff 7: wlan4: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:04:00 brd ff:ff:ff:ff:ff:ff 8: wlan5: mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:05:00 brd ff:ff:ff:ff:ff:ff 9: wlan6: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:06:00 brd ff:ff:ff:ff:ff:ff 10: hwsim0: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ieee802.11/radiotap 12:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 75: veth1@veth0: mtu 1500 qdisc noqueue state UP mode DEFAULT group default qlen 1000 link/ether e2:98:19:72:a1:bc brd ff:ff:ff:ff:ff:ff 76: veth0@veth1: mtu 1500 qdisc noqueue state UP mode DEFAULT group default qlen 1000 link/ether 6a:6a:5f:d7:e3:ff brd ff:ff:ff:ff:ff:ff 77: macsec0@veth0: mtu 1468 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 6a:6a:5f:d7:e3:ff brd ff:ff:ff:ff:ff:ff wpas0 STATUS: bssid=01:80:c2:00:00:03 freq=0 ssid= id=0 mode=station pairwise_cipher=NONE group_cipher=NONE key_mgmt=NONE wpa_state=COMPLETED address=6a:6a:5f:d7:e3:ff PAE KaY status=Not-Active Authenticated=No Secured=No Failed=No Actor Priority=255 Key Server Priority=0 Is Key Server=No Number of Keys Distributed=0 Number of Keys Received=0 MKA Hello Time=2000 actor_sci=6a:6a:5f:d7:e3:ff@1 key_server_sci=00:00:00:00:00:00@0 participant_idx=0 ckn=11223344 mi=73f2c6759e6918408cf1936e mn=0 active=No participant=No retain=No live_peers=0 potential_peers=0 is_key_server=Yes is_elected=No uuid=ecce3620-403e-574b-b592-f3c71db0b7f1 wpas1 STATUS: bssid=01:80:c2:00:00:03 freq=0 ssid= id=0 mode=station pairwise_cipher=NONE group_cipher=NONE key_mgmt=NONE wpa_state=COMPLETED address=e2:98:19:72:a1:bc PAE KaY status=Not-Active Authenticated=No Secured=No Failed=No Actor Priority=100 Key Server Priority=0 Is Key Server=No Number of Keys Distributed=0 Number of Keys Received=0 MKA Hello Time=2000 actor_sci=e2:98:19:72:a1:bc@1 key_server_sci=00:00:00:00:00:00@0 participant_idx=0 ckn=1122334455667788 mi=9e3f9a2017e452155dafa437 mn=0 active=No participant=No retain=No live_peers=0 potential_peers=0 is_key_server=Yes is_elected=No uuid=ecce3620-403e-574b-b592-f3c71db0b7f1 wpas0 STATUS-DRIVER: ifname=veth0 ifi=77 parent_ifname=macsec0 parent_ifi=76 wpas1 STATUS-DRIVER: ifname=veth1 ifi=78 parent_ifname=macsec1 parent_ifi=75 PASS macsec_psk_ckn_mismatch 9.471726 2025-08-05 16:52:04.582139 passed all 1 test case(s) 2025-08-05 16:52:04 ./run-tests.py mbo_assoc_disallow DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_assoc_disallow 1/1 Test: MBO and association disallowed Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS mbo_assoc_disallow 2.948665 2025-08-05 16:52:07.803156 passed all 1 test case(s) 2025-08-05 16:52:07 ./run-tests.py mesh_sae_anti_clogging DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_sae_anti_clogging 1/1 Test: Mesh using SAE and anti-clogging PASS mesh_sae_anti_clogging 4.128907 2025-08-05 16:52:12.207449 passed all 1 test case(s) 2025-08-05 16:52:12 ./run-tests.py nfc_p2p_static_handover_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_static_handover_invalid 1/1 Test: NFC static handover with invalid contents Unknown OOB GO Neg channel No OOB GO Neg channel attribute No Device Info attribute PASS nfc_p2p_static_handover_invalid 0.069149 2025-08-05 16:52:12.551349 passed all 1 test case(s) 2025-08-05 16:52:12 ./run-tests.py nfc_wps_password_token_ap_preconf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_password_token_ap_preconf 1/1 Test: WPS registrar configuring an AP using preconfigured AP password token Starting AP wlan3 WPS configuration step PASS nfc_wps_password_token_ap_preconf 5.882933 2025-08-05 16:52:18.710277 passed all 1 test case(s) 2025-08-05 16:52:18 ./run-tests.py owe_transition_mode_open_only_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START owe_transition_mode_open_only_ap 1/1 Test: Opportunistic Wireless Encryption transition mode connect to open-only AP Starting AP wlan3 Connect STA wlan0 to AP PASS owe_transition_mode_open_only_ap 2.573556 2025-08-05 16:52:21.556557 passed all 1 test case(s) 2025-08-05 16:52:21 ./run-tests.py p2p_listen_chan_optimize DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_listen_chan_optimize 1/1 Test: P2P listen channel optimization wlan0: Trying to discover peer 02:00:00:00:05:00 Starting AP wlan3 Connect STA wlan5 to AP wlan0: Trying to discover peer 02:00:00:00:05:00 wlan0: Trying to discover peer 02:00:00:00:05:00 PASS p2p_listen_chan_optimize 3.545268 2025-08-05 16:52:25.375086 passed all 1 test case(s) 2025-08-05 16:52:25 ./run-tests.py p2p_msg_group_info DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_msg_group_info 1/1 Test: P2P protocol tests for Group Info parsing PASS p2p_msg_group_info 4.66387 2025-08-05 16:52:30.312605 passed all 1 test case(s) 2025-08-05 16:52:30 ./run-tests.py p2ps_feature_capability_mac_udp_autoaccept DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_feature_capability_mac_udp_autoaccept 1/1 Test: P2PS PD Feature Capability CPT: advertiser MAC:UDP, seeker UDP:MAC, autoaccept PASS p2ps_feature_capability_mac_udp_autoaccept 1.022519 2025-08-05 16:52:31.608775 passed all 1 test case(s) 2025-08-05 16:52:31 ./run-tests.py p2ps_pd_follow_on_status_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_pd_follow_on_status_failure 1/1 Test: P2PS PD follow on request with status 11 PASS p2ps_pd_follow_on_status_failure 1.10216 2025-08-05 16:52:32.983737 passed all 1 test case(s) 2025-08-05 16:52:33 ./run-tests.py persistent_group DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START persistent_group 1/1 Test: P2P persistent group formation and re-invocation Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group Re-invoke persistent group from client wlan1: Trying to discover peer 02:00:00:00:00:00 Terminate persistent group Re-invoke persistent group from GO wlan0: Trying to discover peer 02:00:00:00:01:00 Terminate persistent group Remove group on the client and try to invite from GO wlan0: Trying to discover peer 02:00:00:00:01:00 PASS persistent_group 7.658176 2025-08-05 16:52:40.917188 passed all 1 test case(s) 2025-08-05 16:52:40 ./run-tests.py radius_acct_unreachable2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_acct_unreachable2 1/1 Test: RADIUS Accounting server unreachable(2) Starting AP wlan3 Connect STA wlan0 to AP Checking for RADIUS retries PASS radius_acct_unreachable2 5.070754 2025-08-05 16:52:46.262436 passed all 1 test case(s) 2025-08-05 16:52:46 ./run-tests.py rfkill_p2p_discovery_p2p_dev DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rfkill_p2p_discovery_p2p_dev 1/1 Test: rfkill block/unblock P2P Discovery with P2P Device rfkill block 0 rfkill block 1 rfkill unblock 0 rfkill unblock 1 wlan7: Trying to discover peer 02:00:00:00:00:00 rfkill block 0 rfkill block 1 rfkill unblock 0 rfkill unblock 1 wlan1: Trying to discover peer 42:00:00:00:09:00 PASS rfkill_p2p_discovery_p2p_dev 2.508541 2025-08-05 16:52:49.046951 passed all 1 test case(s) 2025-08-05 16:52:49 ./run-tests.py rrm_beacon_req_active_ap_channels_unknown_opclass DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_active_ap_channels_unknown_opclass 1/1 Test: Beacon request - active scan mode with AP Channel Report subelement and unknown opclass Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS rrm_beacon_req_active_ap_channels_unknown_opclass 1.546024 2025-08-05 16:52:50.869100 passed all 1 test case(s) 2025-08-05 16:52:50 ./run-tests.py rrm_beacon_req_table_info DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_table_info 1/1 Test: Beacon request - beacon table mode - Reporting Information subelement Starting AP wlan3 Connect STA wlan0 to AP Unsupported reporting information 1 Invalid reporting information length PASS rrm_beacon_req_table_info 1.193988 2025-08-05 16:52:52.336194 passed all 1 test case(s) 2025-08-05 16:52:52 ./run-tests.py rrm_neighbor_rep_req_timeout DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_neighbor_rep_req_timeout 1/1 Test: wpa_supplicant behavior on NEIGHBOR_REP_REQUEST response timeout Starting AP wlan3 Connect STA wlan0 to AP PASS rrm_neighbor_rep_req_timeout 2.00329 2025-08-05 16:52:54.615643 passed all 1 test case(s) 2025-08-05 16:52:54 ./run-tests.py rssi_based_assoc_rej_timeout DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rssi_based_assoc_rej_timeout 1/1 Test: RSSI-based association rejection: no assoc request during retry timeout Starting AP wlan3 Set APs RSSI rejection threshold to -45 dBm, retry timeout: 5 Starting AP wlan3 Set STAs TX RSSI to -50 STA is trying to connect Connect STA wlan0 to AP Validate that STA did not connect or sent assoc request within retry timeout PASS rssi_based_assoc_rej_timeout 11.366944 2025-08-05 16:53:06.258812 passed all 1 test case(s) 2025-08-05 16:53:06 ./run-tests.py sae_auth_restart DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_auth_restart 1/1 Test: SAE and authentication restarts with H2E/looping Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_auth_restart 1.869197 2025-08-05 16:53:08.401549 passed all 1 test case(s) 2025-08-05 16:53:08 ./run-tests.py sae_forced_anti_clogging_h2e_loop DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_forced_anti_clogging_h2e_loop 1/1 Test: SAE anti clogging (forced, H2E + loop) Starting AP wlan3 Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP PASS sae_forced_anti_clogging_h2e_loop 2.220965 2025-08-05 16:53:10.904214 passed all 1 test case(s) 2025-08-05 16:53:10 ./run-tests.py sae_h2e_rsnxe_mismatch_ap3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_h2e_rsnxe_mismatch_ap3 1/1 Test: SAE H2E and RSNXE mismatch in EAPOL-Key msg 3/4 Starting AP wlan3 Connect STA wlan0 to AP PASS sae_h2e_rsnxe_mismatch_ap3 1.041797 2025-08-05 16:53:12.226119 passed all 1 test case(s) 2025-08-05 16:53:12 ./run-tests.py sae_password_id_ecc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_password_id_ecc 1/1 Test: SAE and password identifier (ECC) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_password_id_ecc 1.558078 2025-08-05 16:53:14.054287 passed all 1 test case(s) 2025-08-05 16:53:14 ./run-tests.py sae_reauth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_reauth 1/1 Test: SAE reauthentication Starting AP wlan3 Connect STA wlan0 to AP PASS sae_reauth 2.577119 2025-08-05 16:53:16.903613 passed all 1 test case(s) 2025-08-05 16:53:16 ./run-tests.py sae_reflection_attack_ffc_internal DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_reflection_attack_ffc_internal 1/1 Test: SAE reflection attack (FFC) - internal Starting AP wlan3 Connect STA wlan0 to AP PASS sae_reflection_attack_ffc_internal 1.689555 2025-08-05 16:53:18.871138 passed all 1 test case(s) 2025-08-05 16:53:18 ./run-tests.py sae_reject DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_reject 1/1 Test: SAE and AP rejecting connection Starting AP wlan3 Connect STA wlan0 to AP PASS sae_reject 0.719586 2025-08-05 16:53:19.861217 passed all 1 test case(s) 2025-08-05 16:53:19 ./run-tests.py scan_bss_expiration_age DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_bss_expiration_age 1/1 Test: BSS entry expiration based on age Starting AP wlan3 Waiting for BSS entry to expire PASS scan_bss_expiration_age 17.365806 2025-08-05 16:53:37.506677 passed all 1 test case(s) 2025-08-05 16:53:37 ./run-tests.py scan_ies DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_ies 1/1 Test: Scan and both Beacon and Probe Response frame IEs Starting AP wlan3 ie: [0, 1, 3, 42, 50, 59, 45, 61, 127, 221] beacon_ie: [0, 1, 3, 42, 50, 59, 45, 61, 127, 221] PASS scan_ies 1.234541 2025-08-05 16:53:39.017769 passed all 1 test case(s) 2025-08-05 16:53:39 ./run-tests.py sigma_dut_dpp_pkex_responder DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_pkex_responder 1/1 Test: sigma_dut DPP/PKEX as responder Skip test case: sigma_dut not available SKIP sigma_dut_dpp_pkex_responder 0.069651 2025-08-05 16:53:39.364046 passed all 0 test case(s) skipped 1 test case(s) 2025-08-05 16:53:39 ./run-tests.py sigma_dut_dpp_qr_resp_1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_resp_1 1/1 Test: sigma_dut DPP/QR responder (conf index 1) Skip test case: sigma_dut not available SKIP sigma_dut_dpp_qr_resp_1 0.060972 2025-08-05 16:53:39.698440 passed all 0 test case(s) skipped 1 test case(s) 2025-08-05 16:53:39 ./run-tests.py sigma_dut_dpp_qr_resp_9 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_resp_9 1/1 Test: sigma_dut DPP/QR responder (conf index 9) Skip test case: sigma_dut not available SKIP sigma_dut_dpp_qr_resp_9 0.064352 2025-08-05 16:53:40.046314 passed all 0 test case(s) skipped 1 test case(s) 2025-08-05 16:53:40 ./run-tests.py sigma_dut_dpp_reconfig_enrollee DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_reconfig_enrollee 1/1 Test: sigma_dut DPP reconfiguration (Enrollee) Starting AP wlan3 Skip test case: sigma_dut not available SKIP sigma_dut_dpp_reconfig_enrollee 0.565258 2025-08-05 16:53:40.888457 passed all 0 test case(s) skipped 1 test case(s) 2025-08-05 16:53:40 ./run-tests.py sigma_dut_owe_ptk_workaround DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_owe_ptk_workaround 1/1 Test: sigma_dut controlled OWE station with PTK workaround Starting AP wlan3 Skip test case: sigma_dut not available SKIP sigma_dut_owe_ptk_workaround 0.553867 2025-08-05 16:53:41.718292 passed all 0 test case(s) skipped 1 test case(s) 2025-08-05 16:53:41 ./run-tests.py sigma_dut_sae_groups DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_sae_groups 1/1 Test: sigma_dut controlled SAE association with group negotiation Skip test case: sigma_dut not available SKIP sigma_dut_sae_groups 0.06175 2025-08-05 16:53:42.057962 passed all 0 test case(s) skipped 1 test case(s) 2025-08-05 16:53:42 ./run-tests.py spp_amsdu_gcmp256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START spp_amsdu_gcmp256 1/1 Test: SPP A-MSDU with GCMP-256 Starting AP wlan3 Connect STA wlan0 to AP PASS spp_amsdu_gcmp256 5.783309 2025-08-05 16:53:48.115252 passed all 1 test case(s) 2025-08-05 16:53:48 ./run-tests.py wnm_sleep_mode_rsn_ocv DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_sleep_mode_rsn_ocv 1/1 Test: WNM Sleep Mode - RSN with OCV Starting AP wlan3 Connect STA wlan0 to AP Going to WNM Sleep Mode Waking up from WNM Sleep Mode PASS wnm_sleep_mode_rsn_ocv 2.229977 2025-08-05 16:53:50.617337 passed all 1 test case(s) 2025-08-05 16:53:50 ./run-tests.py wpas_ap_open_isolate DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_open_isolate 1/1 Test: wpa_supplicant AP mode - open network with client isolation Connect STA wlan1 to AP Connect STA wlan2 to AP PASS wpas_ap_open_isolate 3.04354 2025-08-05 16:53:53.931527 passed all 1 test case(s) 2025-08-05 16:53:53 ./run-tests.py wpas_ctrl_bssid_ignore DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_bssid_ignore 1/1 Test: wpa_supplicant ctrl_iface BSSID_IGNORE PASS wpas_ctrl_bssid_ignore 0.067463 2025-08-05 16:53:54.271684 passed all 1 test case(s) 2025-08-05 16:53:54 ./run-tests.py wpas_ctrl_level DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_level 1/1 Test: wpa_supplicant ctrl_iface LEVEL PASS wpas_ctrl_level 0.165141 2025-08-05 16:53:54.706775 passed all 1 test case(s) 2025-08-05 16:53:54 ./run-tests.py wpas_ctrl_set_radio_disabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_set_radio_disabled 1/1 Test: wpa_supplicant SET radio_disabled PASS wpas_ctrl_set_radio_disabled 0.060198 2025-08-05 16:53:55.041385 passed all 1 test case(s) 2025-08-05 16:53:55 ./run-tests.py wpas_mesh_dynamic_interface_remove DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_mesh_dynamic_interface_remove 1/1 Test: wpa_supplicant mesh with dynamic interface and removal mesh5 address 42:00:00:00:05:00 PASS wpas_mesh_dynamic_interface_remove 2.261298 2025-08-05 16:53:57.581636 passed all 1 test case(s) 2025-08-05 16:53:57 ./run-tests.py wps_ext_ap_settings_reject_encr_type DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_ap_settings_reject_encr_type 1/1 Test: WPS and AP Settings: reject Encr Type Starting AP wlan3 PASS wps_ext_ap_settings_reject_encr_type 1.14459 2025-08-05 16:53:58.998943 passed all 1 test case(s) 2025-08-05 16:53:59 ./run-tests.py wps_ext_m2_nack_invalid_msg_type DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_m2_nack_invalid_msg_type 1/1 Test: WPS proto: M2 followed by NACK with invalid Msg Type Starting AP wlan3 PASS wps_ext_m2_nack_invalid_msg_type 1.559574 2025-08-05 16:54:00.828906 passed all 1 test case(s) 2025-08-05 16:54:00 ./run-tests.py wps_ext_proto_nack_m3_no_e_nonce DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_nack_m3_no_e_nonce 1/1 Test: WPS and NACK M3 missing E-Nonce Starting AP wlan3 PASS wps_ext_proto_nack_m3_no_e_nonce 2.016182 2025-08-05 16:54:03.117782 passed all 1 test case(s) 2025-08-05 16:54:03 ./run-tests.py wps_ext_proto_nack_m3_no_msg_type DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_nack_m3_no_msg_type 1/1 Test: WPS and NACK M3 no Message Type Starting AP wlan3 PASS wps_ext_proto_nack_m3_no_msg_type 1.987178 2025-08-05 16:54:05.382390 passed all 1 test case(s) 2025-08-05 16:54:05 ./stop.sh