2019-03-25 02:25:25 export USER=root 2019-03-25 02:25:25 ./build.sh Building TNC testing tools Building wlantest Building hostapd Building wpa_supplicant 2019-03-25 02:27:38 ./start.sh 2019-03-25 02:27:39 ./run-tests.py rrm_beacon_req_active_ignore_old_result DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_active_ignore_old_result 1/1 Test: Beacon request - active scan mode and old scan result Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP Received beacon report: opclass=81 channel=1 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=1045131510 frame_body=ad424c3edb84050064000114000372726d010882848b960c1218240301012a010432043048606c460570000000003b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00 PASS rrm_beacon_req_active_ignore_old_result 0.987778 2019-03-25 02:27:41.917874 passed all 1 test case(s) 2019-03-25 02:27:41 ./run-tests.py rrm_beacon_req_active_many DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_active_many 1/1 Test: Beacon request - active scan mode and many BSSs Starting BSS phy=phy3 ifname=wlan3 Starting BSS phy=phy3 ifname=wlan3-2 Starting BSS phy=phy3 ifname=wlan3-3 Starting BSS phy=phy3 ifname=wlan3-4 Starting BSS phy=phy3 ifname=wlan3-5 Starting BSS phy=phy3 ifname=wlan3-6 Starting AP wlan4 (old add_ap argument type) Connect STA wlan0 to AP Received beacon report: opclass=81 channel=1 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:02:00 antenna_id=0 parent_tsf=1047691500 frame_body=df10743edb8405006400110400204141414141414141414141414141414141414141414141414141414141414141010882848b960c1218240301012a010432043048606c30040100000fdd1a0050f20101000050f20202000050f2040050f20201000050f2023b0251002d1a7c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400000000040dd180050f2020101000003a4000027a4000042435d0062322e00 Received beacon report: opclass=81 channel=1 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:01:00 antenna_id=0 parent_tsf=1047691485 frame_body=d010743edb8405006400110400204141414141414141414141414141414141414141414141414141414141414141010882848b960c1218240301012a010432043048606c30040100000fdd1a0050f20101000050f20202000050f2040050f20201000050f2023b0251002d1a7c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400000000040dd180050f2020101000003a4000027a4000042435d0062322e00 Received beacon report: opclass=81 channel=1 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:05:00 antenna_id=0 parent_tsf=1047793879 frame_body=3127743edb8405006400110400204141414141414141414141414141414141414141414141414141414141414141010882848b960c1218240301012a010432043048606c30040100000fdd1a0050f20101000050f20202000050f2040050f20201000050f2023b0251002d1a7c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400000000040dd180050f2020101000003a4000027a4000042435d0062322e00 Received beacon report: opclass=81 channel=1 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=1047691516 frame_body=c910743edb8405006400010400056273732d31010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00dd50bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb Received beacon report: opclass=81 channel=1 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:01 antenna_id=0 parent_tsf=1047691516 frame_body=d210743edb8405006400010400056273732d32010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00dd50bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb Received beacon report: opclass=81 channel=1 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:02 antenna_id=0 parent_tsf=1047793910 frame_body=8c19743edb8405006400010400056273732d33010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00dd50bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb Received beacon report: opclass=81 channel=1 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:03 antenna_id=0 parent_tsf=1047793910 frame_body=7b1a743edb8405006400010400056273732d34010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00dd50bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb Received beacon report: opclass=81 channel=1 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:04 antenna_id=0 parent_tsf=1047793910 frame_body=761b743edb8405006400010400056273732d35010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00dd50bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb Received beacon report: opclass=81 channel=1 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:05 antenna_id=0 parent_tsf=1047793910 frame_body=921c743edb8405006400010400056273732d36010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00dd50bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb Received beacon report: opclass=81 channel=1 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:04:00 antenna_id=0 parent_tsf=0 frame_body=c995743edb84050064000114000372726d010882848b960c1218240301012a010432043048606c460570000000003b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00dd50aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa PASS rrm_beacon_req_active_many 2.300136 2019-03-25 02:27:44.730812 passed all 1 test case(s) 2019-03-25 02:27:44 ./run-tests.py rrm_beacon_req_active_scan_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_active_scan_fail 1/1 Test: Beacon request - Active scan failure Starting AP wlan3 Connect STA wlan0 to AP PASS rrm_beacon_req_active_scan_fail 0.559336 2019-03-25 02:27:45.836474 passed all 1 test case(s) 2019-03-25 02:27:45 ./run-tests.py rrm_beacon_req_active_single_channel DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_active_single_channel 1/1 Test: Beacon request - active scan mode with single channel Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Received beacon report: opclass=81 channel=1 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 frame_body=0cbd9f3edb84050064000114000372726d010882848b960c1218240301012a010432043048606c460570000000003b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00 PASS rrm_beacon_req_active_single_channel 0.913498 2019-03-25 02:27:47.228712 passed all 1 test case(s) 2019-03-25 02:27:47 ./run-tests.py rrm_beacon_req_active_zero_duration DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_active_zero_duration 1/1 Test: Beacon request - Action scan and zero duration Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS rrm_beacon_req_active_zero_duration 0.889061 2019-03-25 02:27:48.681810 passed all 1 test case(s) 2019-03-25 02:27:48 ./run-tests.py rrm_beacon_req_ap_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_ap_errors 1/1 Test: Beacon request - AP error cases Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP Connect STA wlan1 to AP PASS rrm_beacon_req_ap_errors 1.160694 2019-03-25 02:27:50.351561 passed all 1 test case(s) 2019-03-25 02:27:50 ./run-tests.py rrm_beacon_req_passive DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_passive 1/1 Test: Beacon request - passive scan mode Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Received beacon report: opclass=81 channel=1 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 frame_body=a896223fdb84050064000114000372726d010882848b960c1218240301012a010432043048606c460570000000003b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00 Received beacon report: opclass=81 channel=11 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:04:00 antenna_id=0 parent_tsf=1058443496 frame_body=e890163fdb840500640001040007616e6f74686572010882848b960c12182403010b0504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d160b0000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00 PASS rrm_beacon_req_passive 4.910691 2019-03-25 02:27:55.801416 passed all 1 test case(s) 2019-03-25 02:27:55 ./run-tests.py rrm_beacon_req_passive_ap_channels DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_passive_ap_channels 1/1 Test: Beacon request - passive scan mode with AP Channel Report subelement Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Received beacon report: opclass=81 channel=1 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=1060909511 frame_body=c7313c3fdb84050064000114000372726d010882848b960c1218240301012a010432043048606c460570000000003b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00 Received beacon report: opclass=81 channel=11 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:04:00 antenna_id=0 parent_tsf=1060909523 frame_body=d3313c3fdb840500640001040007616e6f74686572010882848b960c12182403010b0504000200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d160b0000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00 PASS rrm_beacon_req_passive_ap_channels 1.1957 2019-03-25 02:27:57.554810 passed all 1 test case(s) 2019-03-25 02:27:57 ./run-tests.py rrm_beacon_req_passive_no_match DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_passive_no_match 1/1 Test: Beacon request - passive scan mode and no matching BSS Starting AP wlan3 Connect STA wlan0 to AP PASS rrm_beacon_req_passive_no_match 0.717756 2019-03-25 02:27:58.852883 passed all 1 test case(s) 2019-03-25 02:27:58 ./run-tests.py rrm_beacon_req_passive_no_match_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_passive_no_match_oom 1/1 Test: Beacon request - passive scan mode and no matching BSS (OOM) Starting AP wlan3 Connect STA wlan0 to AP PASS rrm_beacon_req_passive_no_match_oom 1.004355 2019-03-25 02:28:00.328422 passed all 1 test case(s) 2019-03-25 02:28:00 ./run-tests.py rrm_beacon_req_passive_scan_vht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_passive_scan_vht 1/1 Test: Beacon request - passive scan mode - VHT Starting AP wlan3 Connect STA wlan0 to AP Received beacon report: opclass=128 channel=36 start=0 duration=100 frame_info=9 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 frame_body=33d0803fdb84050064000110000772726d2d76687401088c129824b048606c0301240706464920240417460570000000003b0280002d1a0e001bffff0000000000000000000001000000000000000000003d16240500000000000000000000000000000000000000007f080400400200000040bf0c00000000aaaa0000aaaa0000c005012a00fcffc304022e2e2edd180050f2020101000003a4000027a4000042435e0062322f00 Received beacon report: opclass=128 channel=36 start=0 duration=100 frame_info=9 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=1075544109 frame_body=2d801b40db84050064000110000772726d2d76687401088c129824b048606c0301240706464920240417460570000000003b0280002d1a0e001bffff0000000000000000000001000000000000000000003d16240500000000000000000000000000000000000000007f080400400200000040bf0c00000000aaaa0000aaaa0000c005012a00fcffc304022e2e2edd180050f2020101000003a4000027a4000042435e0062322f00 PASS rrm_beacon_req_passive_scan_vht 11.254723 2019-03-25 02:28:12.080258 passed all 1 test case(s) 2019-03-25 02:28:12 ./run-tests.py rrm_beacon_req_passive_scan_vht160 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_passive_scan_vht160 1/1 Test: Beacon request - passive scan mode - VHT160 Starting AP wlan3 Connect STA wlan0 to AP Received beacon report: opclass=129 channel=104 start=0 duration=100 frame_info=9 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 frame_body=8be05a40db84050064000110000772726d2d76687401088c129824b048606c030168070a5a4120240414640b1e00460570000000003b0281002d1a0e001bffff0000000000000000000001000000000000000000003d16680700000000000000000000000000000000000000007f080400400200000040bf0c00000000aaaa0000aaaa0000c005016a72fcffc305033c3c3c3cdd180050f2020101000003a4000027a4000042435e0062322f00 PASS rrm_beacon_req_passive_scan_vht160 3.63724 2019-03-25 02:28:16.265341 passed all 1 test case(s) 2019-03-25 02:28:16 ./run-tests.py rrm_beacon_req_table DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_table 1/1 Test: Beacon request - beacon table mode Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Received beacon report: opclass=81 channel=1 start=0 duration=0 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:04:00 antenna_id=0 parent_tsf=0 frame_body=ec966b40db840500640001040007616e6f74686572010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00 Received beacon report: opclass=81 channel=1 start=0 duration=0 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 frame_body=81956b40db84050064000114000372726d010882848b960c1218240301012a010432043048606c460570000000003b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00 PASS rrm_beacon_req_table 0.769402 2019-03-25 02:28:17.523112 passed all 1 test case(s) 2019-03-25 02:28:17 ./run-tests.py rrm_beacon_req_table_bssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_table_bssid 1/1 Test: Beacon request - beacon table mode - specific BSSID Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Received beacon report: opclass=81 channel=1 start=0 duration=0 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:04:00 antenna_id=0 parent_tsf=0 frame_body=68cb7f40db840500640001040007616e6f74686572010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00 PASS rrm_beacon_req_table_bssid 0.890598 2019-03-25 02:28:18.973790 passed all 1 test case(s) 2019-03-25 02:28:19 ./run-tests.py rrm_beacon_req_table_detail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_table_detail 1/1 Test: Beacon request - beacon table mode - reporting detail Starting AP wlan3 Connect STA wlan0 to AP Reporting Detail 0 Received beacon report: opclass=81 channel=1 start=0 duration=0 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 Reporting Detail 1 Received beacon report: opclass=81 channel=1 start=0 duration=0 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 frame_body=3aa09440db84050064000114 Reporting Detail 2 Received beacon report: opclass=81 channel=1 start=0 duration=0 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 frame_body=3aa09440db84050064000114000372726d010882848b960c1218240301012a010432043048606c460570000000003b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00 Reporting Detail 3 (invalid) Reporting Detail (too short) PASS rrm_beacon_req_table_detail 0.96736 2019-03-25 02:28:20.459421 passed all 1 test case(s) 2019-03-25 02:28:20 ./run-tests.py rrm_beacon_req_table_info DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_table_info 1/1 Test: Beacon request - beacon table mode - Reporting Information subelement Starting AP wlan3 Connect STA wlan0 to AP Unsupported reporting information 1 Invalid reporting information length PASS rrm_beacon_req_table_info 0.71967 2019-03-25 02:28:21.755920 passed all 1 test case(s) 2019-03-25 02:28:21 ./run-tests.py rrm_beacon_req_table_request DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_table_request 1/1 Test: Beacon request - beacon table mode - request element Starting AP wlan3 Connect STA wlan0 to AP Received beacon report: opclass=81 channel=1 start=0 duration=0 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 frame_body=cf00be40db84050064000114000372726d010882848b960c121824 Incorrect reporting detail with request subelement Invalid request subelement length Multiple request subelements PASS rrm_beacon_req_table_request 1.021626 2019-03-25 02:28:23.324718 passed all 1 test case(s) 2019-03-25 02:28:23 ./run-tests.py rrm_beacon_req_table_request_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_table_request_oom 1/1 Test: Beacon request - beacon table mode - request element OOM Starting AP wlan3 Connect STA wlan0 to AP PASS rrm_beacon_req_table_request_oom 0.713882 2019-03-25 02:28:24.555908 passed all 1 test case(s) ignored_by_lkp rrm_beacon_req_table_rsne 2019-03-25 02:28:24 ./run-tests.py rrm_beacon_req_table_ssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_table_ssid 1/1 Test: Beacon request - beacon table mode - specific SSID Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Received beacon report: opclass=81 channel=1 start=0 duration=0 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:04:00 antenna_id=0 parent_tsf=0 frame_body=ee30e840db840500640001040007616e6f74686572010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00 Wildcard SSID Received beacon report: opclass=81 channel=1 start=0 duration=0 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 frame_body=fe30e840db84050064000114000372726d010882848b960c1218240301012a010432043048606c460570000000003b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00 Received beacon report: opclass=81 channel=1 start=0 duration=0 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:04:00 antenna_id=0 parent_tsf=0 frame_body=ee30e840db840500640001040007616e6f74686572010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00 Too long SSID PASS rrm_beacon_req_table_ssid 0.911147 2019-03-25 02:28:25.833156 passed all 1 test case(s) 2019-03-25 02:28:25 ./run-tests.py rrm_beacon_req_table_truncated_subelem DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_table_truncated_subelem 1/1 Test: Beacon request - beacon table mode - Truncated subelement Starting AP wlan3 Connect STA wlan0 to AP PASS rrm_beacon_req_table_truncated_subelem 0.650989 2019-03-25 02:28:27.036014 passed all 1 test case(s) 2019-03-25 02:28:27 ./run-tests.py rrm_beacon_req_table_unknown_subelem DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_table_unknown_subelem 1/1 Test: Beacon request - beacon table mode - unknown subelement Starting AP wlan3 Connect STA wlan0 to AP Received beacon report: opclass=81 channel=1 start=0 duration=0 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 frame_body=cdb00d41db84050064000114000372726d010882848b960c1218240301012a010432043048606c460570000000003b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00 PASS rrm_beacon_req_table_unknown_subelem 0.433541 2019-03-25 02:28:27.953677 passed all 1 test case(s) 2019-03-25 02:28:27 ./run-tests.py rrm_beacon_req_table_vht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_table_vht 1/1 Test: Beacon request - beacon table mode - VHT Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Received beacon report: opclass=128 channel=36 start=0 duration=0 frame_info=9 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 frame_body=263f2a41db84050064000110000772726d2d76687401088c129824b048606c030124460570000000003b0280002d1a0e001bffff0000000000000000000001000000000000000000003d16240500000000000000000000000000000000000000007f080400400200000040bf0c00000000aaaa0000aaaa0000c005012a00fcffc304022e2e2edd180050f2020101000003a4000027a4000042435e0062322f00 Received beacon report: opclass=117 channel=48 start=0 duration=0 frame_info=9 rcpi=160 rsni=255 bssid=02:00:00:00:04:00 antenna_id=0 parent_tsf=0 frame_body=29a72841db84050064000100000a746573742d766874343001088c129824b048606c0301303b0275002d1a0e001bffff0000000000000000000001000000000000000000003d16300700000000000000000000000000000000000000007f080400400200000040bf0c00000000aaaa0000aaaa0000c005000000fcffc303012e2edd180050f2020101000003a4000027a4000042435e0062322f00 PASS rrm_beacon_req_table_vht 1.650455 2019-03-25 02:28:30.066398 passed all 1 test case(s) 2019-03-25 02:28:30 ./run-tests.py rrm_ftm_capa_indication DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_ftm_capa_indication 1/1 Test: FTM capability indication Starting AP wlan3 (old add_ap argument type) PASS rrm_ftm_capa_indication 0.475974 2019-03-25 02:28:31.098233 passed all 1 test case(s) 2019-03-25 02:28:31 ./run-tests.py rrm_ftm_range_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_ftm_range_req 1/1 Test: hostapd FTM range request command Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP Connect STA wlan1 to AP PASS rrm_ftm_range_req 1.324313 2019-03-25 02:28:32.874073 passed all 1 test case(s) 2019-03-25 02:28:32 ./run-tests.py rrm_ftm_range_req_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_ftm_range_req_failure 1/1 Test: hostapd FTM range request failure Starting AP wlan3 (old add_ap argument type) Connect STA wlan1 to AP PASS rrm_ftm_range_req_failure 0.792266 2019-03-25 02:28:34.435438 passed all 1 test case(s) 2019-03-25 02:28:34 ./run-tests.py rrm_ftm_range_req_timeout DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_ftm_range_req_timeout 1/1 Test: hostapd FTM range request timeout Starting AP wlan3 (old add_ap argument type) Connect STA wlan1 to AP PASS rrm_ftm_range_req_timeout 6.163195 2019-03-25 02:28:41.298112 passed all 1 test case(s) 2019-03-25 02:28:41 ./run-tests.py rrm_lci_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_lci_req 1/1 Test: hostapd lci request Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP Connect STA wlan0 to AP PASS rrm_lci_req 0.699261 2019-03-25 02:28:42.500467 passed all 1 test case(s) 2019-03-25 02:28:42 ./run-tests.py rrm_lci_req_ap_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_lci_req_ap_oom 1/1 Test: LCI report generation AP OOM and failure Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_lci_req_ap_oom 0.521026 2019-03-25 02:28:43.489155 passed all 1 test case(s) 2019-03-25 02:28:43 ./run-tests.py rrm_lci_req_get_reltime_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_lci_req_get_reltime_failure 1/1 Test: LCI report generation and os_get_reltime() failure Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_lci_req_get_reltime_failure 0.475596 2019-03-25 02:28:44.510007 passed all 1 test case(s) 2019-03-25 02:28:44 ./run-tests.py rrm_lci_req_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_lci_req_oom 1/1 Test: LCI report generation OOM Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_lci_req_oom 0.356631 2019-03-25 02:28:45.400585 passed all 1 test case(s) 2019-03-25 02:28:45 ./run-tests.py rrm_lci_req_timeout DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_lci_req_timeout 1/1 Test: hostapd lci request timeout Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_lci_req_timeout 6.017153 2019-03-25 02:28:51.928049 passed all 1 test case(s) ignored_by_lkp rrm_link_measurement ignored_by_lkp rrm_link_measurement_oom 2019-03-25 02:28:51 ./run-tests.py rrm_neighbor_db DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_neighbor_db 1/1 Test: hostapd ctrl_iface SET_NEIGHBOR Starting AP wlan3 (old add_ap argument type) PASS rrm_neighbor_db 0.223 2019-03-25 02:28:52.711190 passed all 1 test case(s) 2019-03-25 02:28:52 ./run-tests.py rrm_neighbor_rep_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_neighbor_rep_oom 1/1 Test: hostapd neighbor report OOM Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_neighbor_rep_oom 1.562432 2019-03-25 02:28:54.777614 passed all 1 test case(s) 2019-03-25 02:28:54 ./run-tests.py rrm_neighbor_rep_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_neighbor_rep_req 1/1 Test: wpa_supplicant ctrl_iface NEIGHBOR_REP_REQUEST Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan0 to AP Connect STA wlan0 to AP PASS rrm_neighbor_rep_req 0.834991 2019-03-25 02:28:56.124310 passed all 1 test case(s) 2019-03-25 02:28:56 ./run-tests.py rrm_neighbor_rep_req_busy DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_neighbor_rep_req_busy 1/1 Test: wpa_supplicant and concurrent NEIGHBOR_REP_REQUEST commands Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_neighbor_rep_req_busy 0.463673 2019-03-25 02:28:57.080712 passed all 1 test case(s) 2019-03-25 02:28:57 ./run-tests.py rrm_neighbor_rep_req_disconnect DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_neighbor_rep_req_disconnect 1/1 Test: wpa_supplicant behavior on disconnection during NEIGHBOR_REP_REQUEST Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_neighbor_rep_req_disconnect 0.545133 2019-03-25 02:28:58.134891 passed all 1 test case(s) 2019-03-25 02:28:58 ./run-tests.py rrm_neighbor_rep_req_from_conf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_neighbor_rep_req_from_conf 1/1 Test: wpa_supplicant ctrl_iface NEIGHBOR_REP_REQUEST and hostapd config Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_neighbor_rep_req_from_conf 0.435431 2019-03-25 02:28:59.136467 passed all 1 test case(s) 2019-03-25 02:28:59 ./run-tests.py rrm_neighbor_rep_req_not_supported DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_neighbor_rep_req_not_supported 1/1 Test: NEIGHBOR_REP_REQUEST for AP not supporting neighbor report Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_neighbor_rep_req_not_supported 0.492917 2019-03-25 02:29:00.167918 passed all 1 test case(s) 2019-03-25 02:29:00 ./run-tests.py rrm_neighbor_rep_req_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_neighbor_rep_req_oom 1/1 Test: wpa_supplicant ctrl_iface NEIGHBOR_REP_REQUEST OOM Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_neighbor_rep_req_oom 0.46516 2019-03-25 02:29:01.161050 passed all 1 test case(s) 2019-03-25 02:29:01 ./run-tests.py rrm_neighbor_rep_req_timeout DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_neighbor_rep_req_timeout 1/1 Test: wpa_supplicant behavior on NEIGHBOR_REP_REQUEST response timeout Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_neighbor_rep_req_timeout 1.471008 2019-03-25 02:29:03.149111 passed all 1 test case(s) 2019-03-25 02:29:03 ./run-tests.py rrm_reassociation DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_reassociation 1/1 Test: Radio measurement request - reassociation Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP Starting AP wlan4 (old add_ap argument type) PASS rrm_reassociation 1.132831 2019-03-25 02:29:04.809611 passed all 1 test case(s) 2019-03-25 02:29:04 ./run-tests.py rrm_rep_parse_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_rep_parse_proto 1/1 Test: hostapd rrm report parsing protocol testing Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_rep_parse_proto 0.48217 2019-03-25 02:29:05.790313 passed all 1 test case(s) 2019-03-25 02:29:05 ./run-tests.py rrm_req_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_req_proto 1/1 Test: Radio measurement request - protocol testing Starting AP wlan3 Connect STA wlan0 to AP PASS rrm_req_proto 0.977379 2019-03-25 02:29:07.359961 passed all 1 test case(s) 2019-03-25 02:29:07 ./run-tests.py rrm_req_reject_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_req_reject_oom 1/1 Test: Radio measurement request - OOM while rejecting a request Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_req_reject_oom 0.724198 2019-03-25 02:29:08.584252 passed all 1 test case(s) 2019-03-25 02:29:08 ./run-tests.py rrm_req_when_rrm_not_used DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_req_when_rrm_not_used 1/1 Test: Radio/link measurement request for non-RRM association Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_req_when_rrm_not_used 0.622717 2019-03-25 02:29:09.747046 passed all 1 test case(s) 2019-03-25 02:29:09 ./run-tests.py rrm_unexpected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_unexpected 1/1 Test: hostapd unexpected rrm Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_unexpected 0.424466 2019-03-25 02:29:10.687154 passed all 1 test case(s) 2019-03-25 02:29:10 ./run-tests.py rsn_ie_proto_eap_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rsn_ie_proto_eap_sta 1/1 Test: RSN element protocol testing for EAP cases on STA side Starting AP wlan3 Connect STA wlan0 to AP No RSN Capabilities field No AKM Suite fields No Pairwise Cipher Suite fields No Group Data Cipher Suite field PASS rsn_ie_proto_eap_sta 2.268197 2019-03-25 02:29:13.496264 passed all 1 test case(s) 2019-03-25 02:29:13 ./run-tests.py rsn_ie_proto_ft_psk_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rsn_ie_proto_ft_psk_sta 1/1 Test: RSN element protocol testing for FT-PSK + PMF cases on STA side Starting AP wlan3 Connect STA wlan0 to AP PMKIDCount field included Extra IE before RSNE PMKIDCount and Group Management Cipher suite fields included Extra octet after defined fields (future extensibility) No RSN Capabilities field (PMF disabled in practice) Invalid RSNE causing internal hostapd error Unexpected PMKID causing internal hostapd error PASS rsn_ie_proto_ft_psk_sta 5.440221 2019-03-25 02:29:19.439969 passed all 1 test case(s) 2019-03-25 02:29:19 ./run-tests.py rsn_ie_proto_psk_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rsn_ie_proto_psk_sta 1/1 Test: RSN element protocol testing for PSK cases on STA side Starting AP wlan3 Connect STA wlan0 to AP No RSN Capabilities field Reserved RSN Capabilities bits set Truncated RSN Capabilities field Extra pairwise cipher suite (unsupported) Extra AKM suite (unsupported) PMKIDCount field included Truncated PMKIDCount field Unexpected Group Management Cipher Suite with PMF disabled Extra octet after defined fields (future extensibility) PASS rsn_ie_proto_psk_sta 4.679065 2019-03-25 02:29:24.632242 passed all 1 test case(s) 2019-03-25 02:29:24 ./run-tests.py rsn_preauth_local_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rsn_preauth_local_errors 1/1 Test: RSN pre-authentication and local errors on AP Starting AP wlan3 PASS rsn_preauth_local_errors 0.990951 2019-03-25 02:29:26.129537 passed all 1 test case(s) 2019-03-25 02:29:26 ./run-tests.py rsn_preauth_processing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rsn_preauth_processing 1/1 Test: RSN pre-authentication processing on AP Starting AP wlan3 Connect STA wlan0 to AP PASS rsn_preauth_processing 0.468445 2019-03-25 02:29:27.104947 passed all 1 test case(s) 2019-03-25 02:29:27 ./run-tests.py sae DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae 1/1 Test: SAE with default group Starting AP wlan3 Connect STA wlan0 to AP PASS sae 0.468554 2019-03-25 02:29:28.087236 passed all 1 test case(s) 2019-03-25 02:29:28 ./run-tests.py sae_and_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_and_psk 1/1 Test: SAE and PSK enabled in network profile Starting AP wlan3 Connect STA wlan0 to AP PASS sae_and_psk 0.512642 2019-03-25 02:29:29.129562 passed all 1 test case(s) 2019-03-25 02:29:29 ./run-tests.py sae_and_psk2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_and_psk2 1/1 Test: SAE and PSK enabled in network profile (use PSK) Starting AP wlan3 Connect STA wlan0 to AP PASS sae_and_psk2 0.489852 2019-03-25 02:29:30.125433 passed all 1 test case(s) 2019-03-25 02:29:30 ./run-tests.py sae_anti_clogging DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_anti_clogging 1/1 Test: SAE anti clogging Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS sae_anti_clogging 1.058287 2019-03-25 02:29:31.714949 passed all 1 test case(s) 2019-03-25 02:29:31 ./run-tests.py sae_anti_clogging_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_anti_clogging_proto 1/1 Test: SAE anti clogging protocol testing Starting AP wlan3 Connect STA wlan0 to AP PASS sae_anti_clogging_proto 0.687484 2019-03-25 02:29:32.969013 passed all 1 test case(s) 2019-03-25 02:29:33 ./run-tests.py sae_bignum_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_bignum_failure 1/1 Test: SAE and bignum failure Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_bignum_failure 4.009008 2019-03-25 02:29:37.593679 passed all 1 test case(s) 2019-03-25 02:29:37 ./run-tests.py sae_commit_override DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_commit_override 1/1 Test: SAE commit override (hostapd) Starting AP wlan3 Connect STA wlan0 to AP PASS sae_commit_override 1.460222 2019-03-25 02:29:39.611092 passed all 1 test case(s) 2019-03-25 02:29:39 ./run-tests.py sae_commit_override2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_commit_override2 1/1 Test: SAE commit override (wpa_supplicant) Starting AP wlan3 Connect STA wlan0 to AP PASS sae_commit_override2 1.462973 2019-03-25 02:29:41.711051 passed all 1 test case(s) 2019-03-25 02:29:41 ./run-tests.py sae_connect_cmd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_connect_cmd 1/1 Test: SAE with connect command Starting AP wlan3 Connect STA wlan5 to AP PASS sae_connect_cmd 6.708696 2019-03-25 02:29:48.997783 passed all 1 test case(s) 2019-03-25 02:29:49 ./run-tests.py sae_forced_anti_clogging DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_forced_anti_clogging 1/1 Test: SAE anti clogging (forced) Starting AP wlan3 Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP PASS sae_forced_anti_clogging 1.198094 2019-03-25 02:29:50.727854 passed all 1 test case(s) 2019-03-25 02:29:50 ./run-tests.py sae_forced_anti_clogging_pw_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_forced_anti_clogging_pw_id 1/1 Test: SAE anti clogging (forced and Password Identifier) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS sae_forced_anti_clogging_pw_id 1.002678 2019-03-25 02:29:52.335447 passed all 1 test case(s) 2019-03-25 02:29:52 ./run-tests.py sae_group_nego DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_group_nego 1/1 Test: SAE group negotiation Starting AP wlan3 Connect STA wlan0 to AP PASS sae_group_nego 0.92757 2019-03-25 02:29:53.760108 passed all 1 test case(s) 2019-03-25 02:29:53 ./run-tests.py sae_groups DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_groups 1/1 Test: SAE with all supported groups Starting AP wlan3 Testing SAE group 19 Connect STA wlan0 to AP Testing SAE group 25 Connect STA wlan0 to AP Testing SAE group 26 Connect STA wlan0 to AP Testing SAE group 20 Connect STA wlan0 to AP Testing SAE group 21 Connect STA wlan0 to AP Testing SAE group 2 Connect STA wlan0 to AP Testing SAE group 5 Connect STA wlan0 to AP Testing SAE group 14 Connect STA wlan0 to AP Connection with heavy SAE group 14 Testing SAE group 15 Connect STA wlan0 to AP Connection with heavy SAE group 15 Testing SAE group 16 Connect STA wlan0 to AP Connection with heavy SAE group 16 Testing SAE group 22 Connect STA wlan0 to AP Testing SAE group 23 Connect STA wlan0 to AP Testing SAE group 24 Connect STA wlan0 to AP PASS sae_groups 4.672102 2019-03-25 02:29:59.086340 passed all 1 test case(s) 2019-03-25 02:29:59 ./run-tests.py sae_invalid_anti_clogging_token_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_invalid_anti_clogging_token_req 1/1 Test: SAE and invalid anti-clogging token request Starting AP wlan3 Connect STA wlan0 to AP PASS sae_invalid_anti_clogging_token_req 1.491759 2019-03-25 02:30:01.152689 passed all 1 test case(s) ignored_by_lkp sae_key_lifetime_in_memory 2019-03-25 02:30:01 ./run-tests.py sae_mfp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_mfp 1/1 Test: SAE and MFP enabled without sae_require_mfp Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS sae_mfp 0.995427 2019-03-25 02:30:02.667420 passed all 1 test case(s) 2019-03-25 02:30:02 ./run-tests.py sae_missing_password DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_missing_password 1/1 Test: SAE and missing password Starting AP wlan3 Connect STA wlan0 to AP PASS sae_missing_password 0.336335 2019-03-25 02:30:03.496264 passed all 1 test case(s) 2019-03-25 02:30:03 ./run-tests.py sae_mixed DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_mixed 1/1 Test: Mixed SAE and non-SAE network Starting AP wlan3 Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP PASS sae_mixed 1.143593 2019-03-25 02:30:05.088020 passed all 1 test case(s) 2019-03-25 02:30:05 ./run-tests.py sae_mixed_mfp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_mixed_mfp 1/1 Test: Mixed SAE and non-SAE network and MFP required with SAE Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS sae_mixed_mfp 0.799635 2019-03-25 02:30:06.294109 passed all 1 test case(s) 2019-03-25 02:30:06 ./run-tests.py sae_no_ffc_by_default DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_no_ffc_by_default 1/1 Test: SAE and default groups rejecting FFC Starting AP wlan3 Connect STA wlan0 to AP PASS sae_no_ffc_by_default 0.607311 2019-03-25 02:30:07.365803 passed all 1 test case(s) 2019-03-25 02:30:07 ./run-tests.py sae_no_random DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_no_random 1/1 Test: SAE and no random numbers available Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_no_random 1.6435 2019-03-25 02:30:09.542574 passed all 1 test case(s) 2019-03-25 02:30:09 ./run-tests.py sae_oom_wpas DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_oom_wpas 1/1 Test: SAE and OOM in wpa_supplicant Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_oom_wpas 1.352638 2019-03-25 02:30:11.353513 passed all 1 test case(s) 2019-03-25 02:30:11 ./run-tests.py sae_password DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_password 1/1 Test: SAE and sae_password in hostapd configuration Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS sae_password 1.113341 2019-03-25 02:30:12.966642 passed all 1 test case(s) 2019-03-25 02:30:13 ./run-tests.py sae_password_ecc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_password_ecc 1/1 Test: SAE with number of different passwords (ECC) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_password_ecc 2.714131 2019-03-25 02:30:16.239232 passed all 1 test case(s) 2019-03-25 02:30:16 ./run-tests.py sae_password_ffc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_password_ffc 1/1 Test: SAE with number of different passwords (FFC) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_password_ffc 2.387398 2019-03-25 02:30:19.127860 passed all 1 test case(s) 2019-03-25 02:30:19 ./run-tests.py sae_password_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_password_id 1/1 Test: SAE and password identifier Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_password_id 0.774733 2019-03-25 02:30:20.430722 passed all 1 test case(s) 2019-03-25 02:30:20 ./run-tests.py sae_password_id_ecc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_password_id_ecc 1/1 Test: SAE and password identifier (ECC) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_password_id_ecc 0.64973 2019-03-25 02:30:21.542356 passed all 1 test case(s) 2019-03-25 02:30:21 ./run-tests.py sae_password_id_ffc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_password_id_ffc 1/1 Test: SAE and password identifier (FFC) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_password_id_ffc 0.629465 2019-03-25 02:30:22.641626 passed all 1 test case(s) 2019-03-25 02:30:22 ./run-tests.py sae_password_long DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_password_long 1/1 Test: SAE and long password Starting AP wlan3 Connect STA wlan0 to AP PASS sae_password_long 0.420698 2019-03-25 02:30:23.559564 passed all 1 test case(s) 2019-03-25 02:30:23 ./run-tests.py sae_password_short DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_password_short 1/1 Test: SAE and short password Starting AP wlan3 Connect STA wlan0 to AP PASS sae_password_short 0.428814 2019-03-25 02:30:24.440394 passed all 1 test case(s) 2019-03-25 02:30:24 ./run-tests.py sae_pmksa_caching DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pmksa_caching 1/1 Test: SAE and PMKSA caching Starting AP wlan3 Connect STA wlan0 to AP PASS sae_pmksa_caching 0.600256 2019-03-25 02:30:25.468991 passed all 1 test case(s) 2019-03-25 02:30:25 ./run-tests.py sae_pmksa_caching_disabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pmksa_caching_disabled 1/1 Test: SAE and PMKSA caching disabled Starting AP wlan3 Connect STA wlan0 to AP PASS sae_pmksa_caching_disabled 0.636228 2019-03-25 02:30:26.527926 passed all 1 test case(s) 2019-03-25 02:30:26 ./run-tests.py sae_proto_confirm_replay DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_proto_confirm_replay 1/1 Test: SAE protocol testing - Confirm replay Starting AP wlan3 Connect STA wlan0 to AP Commit Confirm Replay Confirm Association Request PASS sae_proto_confirm_replay 0.447885 2019-03-25 02:30:27.435563 passed all 1 test case(s) 2019-03-25 02:30:27 ./run-tests.py sae_proto_ecc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_proto_ecc 1/1 Test: SAE protocol testing (ECC) Starting AP wlan3 Confirm mismatch Connect STA wlan0 to AP Commit Confirm Commit without even full cyclic group field Connect STA wlan0 to AP Commit Too short commit Connect STA wlan0 to AP Commit Invalid commit scalar (0) Connect STA wlan0 to AP Commit Invalid commit scalar (1) Connect STA wlan0 to AP Commit Invalid commit scalar (> r) Connect STA wlan0 to AP Commit Commit element not on curve Connect STA wlan0 to AP Commit Invalid commit element (y coordinate > P) Connect STA wlan0 to AP Commit Invalid commit element (x coordinate > P) Connect STA wlan0 to AP Commit Different group in commit Connect STA wlan0 to AP Commit Too short confirm Connect STA wlan0 to AP Commit Confirm PASS sae_proto_ecc 1.851553 2019-03-25 02:30:29.777545 passed all 1 test case(s) 2019-03-25 02:30:29 ./run-tests.py sae_proto_ffc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_proto_ffc 1/1 Test: SAE protocol testing (FFC) Starting AP wlan3 Confirm mismatch Connect STA wlan0 to AP Commit Confirm Too short commit Connect STA wlan0 to AP Commit Invalid element (0) in commit Connect STA wlan0 to AP Commit Invalid element (1) in commit Connect STA wlan0 to AP Commit Invalid element (> P) in commit Connect STA wlan0 to AP Commit PASS sae_proto_ffc 0.961296 2019-03-25 02:30:31.223527 passed all 1 test case(s) 2019-03-25 02:30:31 ./run-tests.py sae_proto_hostapd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_proto_hostapd 1/1 Test: SAE protocol testing with hostapd Starting AP wlan3 PASS sae_proto_hostapd 0.247246 2019-03-25 02:30:31.877452 passed all 1 test case(s) 2019-03-25 02:30:31 ./run-tests.py sae_pwe_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pwe_failure 1/1 Test: SAE and pwe failure Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_pwe_failure 1.946193 2019-03-25 02:30:34.219118 passed all 1 test case(s) 2019-03-25 02:30:34 ./run-tests.py sae_reauth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_reauth 1/1 Test: SAE reauthentication Starting AP wlan3 Connect STA wlan0 to AP PASS sae_reauth 1.741907 2019-03-25 02:30:36.409628 passed all 1 test case(s) 2019-03-25 02:30:36 ./run-tests.py sae_reflection_attack_ecc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_reflection_attack_ecc 1/1 Test: SAE reflection attack (ECC) Starting AP wlan3 Connect STA wlan0 to AP PASS sae_reflection_attack_ecc 0.922773 2019-03-25 02:30:37.818543 passed all 1 test case(s) 2019-03-25 02:30:37 ./run-tests.py sae_reflection_attack_ecc_internal DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_reflection_attack_ecc_internal 1/1 Test: SAE reflection attack (ECC) - internal Starting AP wlan3 Connect STA wlan0 to AP PASS sae_reflection_attack_ecc_internal 1.352191 2019-03-25 02:30:39.669895 passed all 1 test case(s) 2019-03-25 02:30:39 ./run-tests.py sae_reflection_attack_ffc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_reflection_attack_ffc 1/1 Test: SAE reflection attack (FFC) Starting AP wlan3 Connect STA wlan0 to AP PASS sae_reflection_attack_ffc 0.836112 2019-03-25 02:30:40.992964 passed all 1 test case(s) 2019-03-25 02:30:41 ./run-tests.py sae_reflection_attack_ffc_internal DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_reflection_attack_ffc_internal 1/1 Test: SAE reflection attack (FFC) - internal Starting AP wlan3 Connect STA wlan0 to AP PASS sae_reflection_attack_ffc_internal 1.347297 2019-03-25 02:30:42.865141 passed all 1 test case(s) ignored_by_lkp scan 2019-03-25 02:30:42 ./run-tests.py scan_abort DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_abort 1/1 Test: Aborting a full scan PASS scan_abort 0.070492 2019-03-25 02:30:43.443349 passed all 1 test case(s) 2019-03-25 02:30:43 ./run-tests.py scan_abort_on_connect DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_abort_on_connect 1/1 Test: Aborting a full scan on connection request Starting AP wlan3 Connect STA wlan0 to AP PASS scan_abort_on_connect 0.437384 2019-03-25 02:30:44.290377 passed all 1 test case(s) 2019-03-25 02:30:44 ./run-tests.py scan_and_bss_entry_removed DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_and_bss_entry_removed 1/1 Test: Last scan result and connect work processing on BSS entry update Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan5 to AP Connect STA wlan0 to AP Connect STA wlan5 to AP PASS scan_and_bss_entry_removed 3.800425 2019-03-25 02:30:48.573086 passed all 1 test case(s) 2019-03-25 02:30:48 ./run-tests.py scan_and_interface_disabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_and_interface_disabled 1/1 Test: Scan operation when interface gets disabled PASS scan_and_interface_disabled 7.32647 2019-03-25 02:30:56.310391 passed all 1 test case(s) 2019-03-25 02:30:56 ./run-tests.py scan_ap_scan_2_ap_mode DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_ap_scan_2_ap_mode 1/1 Test: AP_SCAN 2 AP mode and scan() Connect STA wlan1 to AP PASS scan_ap_scan_2_ap_mode 0.80584 2019-03-25 02:30:57.705578 passed all 1 test case(s) 2019-03-25 02:30:57 ./run-tests.py scan_bss_expiration_age DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_bss_expiration_age 1/1 Test: BSS entry expiration based on age Starting AP wlan3 Waiting for BSS entry to expire PASS scan_bss_expiration_age 10.735074 2019-03-25 02:31:08.976919 passed all 1 test case(s) 2019-03-25 02:31:09 ./run-tests.py scan_bss_expiration_count DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_bss_expiration_count 1/1 Test: BSS entry expiration based on scan results without match Starting AP wlan3 PASS scan_bss_expiration_count 0.530755 2019-03-25 02:31:10.030395 passed all 1 test case(s) 2019-03-25 02:31:10 ./run-tests.py scan_bss_expiration_on_ssid_change DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_bss_expiration_on_ssid_change 1/1 Test: BSS entry expiration when AP changes SSID Starting AP wlan3 Starting AP wlan3 Connect STA wlan0 to AP PASS scan_bss_expiration_on_ssid_change 0.723145 2019-03-25 02:31:11.274592 passed all 1 test case(s) 2019-03-25 02:31:11 ./run-tests.py scan_bss_limit DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_bss_limit 1/1 Test: Scan and wpa_supplicant BSS entry limit Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS scan_bss_limit 0.727419 2019-03-25 02:31:12.482585 passed all 1 test case(s) 2019-03-25 02:31:12 ./run-tests.py scan_bss_operations DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_bss_operations 1/1 Test: Control interface behavior on BSS parameters Starting AP wlan3 Starting AP wlan4 PASS scan_bss_operations 0.621417 2019-03-25 02:31:13.587059 passed all 1 test case(s) 2019-03-25 02:31:13 ./run-tests.py scan_chan_switch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_chan_switch 1/1 Test: Scanning and AP changing channels Starting AP wlan3 AP channel switch while not connected AP channel switch while connected Connect STA wlan0 to AP PASS scan_chan_switch 3.039461 2019-03-25 02:31:17.110699 passed all 1 test case(s) 2019-03-25 02:31:17 ./run-tests.py scan_dfs DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_dfs 1/1 Test: Scan on DFS channels Active scan seen on channels: [2412, 2417, 2422, 2427, 2432, 2437, 2442, 2447, 2452, 2457, 2462, 5180, 5200, 5220, 5240, 5745, 5765, 5785, 5805, 5825] PASS scan_dfs 4.70796 2019-03-25 02:31:22.362147 passed all 1 test case(s) 2019-03-25 02:31:22 ./run-tests.py scan_ext DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_ext 1/1 Test: Custom IE in Probe Request frame Starting AP wlan3 PASS scan_ext 0.475019 2019-03-25 02:31:23.476384 passed all 1 test case(s) 2019-03-25 02:31:23 ./run-tests.py scan_external_trigger DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_external_trigger 1/1 Test: Avoid operations during externally triggered scan Starting AP wlan3 PASS scan_external_trigger 8.437079 2019-03-25 02:31:32.879858 passed all 1 test case(s) 2019-03-25 02:31:32 ./run-tests.py scan_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_fail 1/1 Test: Scan failures Connect STA wlan0 to AP Starting AP wlan3 PASS scan_fail 0.827881 2019-03-25 02:31:34.135040 passed all 1 test case(s) 2019-03-25 02:31:34 ./run-tests.py scan_fail_type_only DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_fail_type_only 1/1 Test: Scan failures for TYPE=ONLY Starting AP wlan3 Connect STA wlan0 to AP PASS scan_fail_type_only 0.535872 2019-03-25 02:31:35.225725 passed all 1 test case(s) 2019-03-25 02:31:35 ./run-tests.py scan_filter DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_filter 1/1 Test: Filter scan results based on SSID Connect STA wlan0 to AP Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS scan_filter 0.699878 2019-03-25 02:31:36.555495 passed all 1 test case(s) 2019-03-25 02:31:36 ./run-tests.py scan_flush DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_flush 1/1 Test: Ongoing scan and FLUSH Starting AP wlan3 PASS scan_flush 0.664739 2019-03-25 02:31:37.800993 passed all 1 test case(s) 2019-03-25 02:31:37 ./run-tests.py scan_for_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_for_auth 1/1 Test: cfg80211 workaround with scan-for-auth Starting AP wlan3 Connect STA wlan0 to AP PASS scan_for_auth 0.90309 2019-03-25 02:31:39.360237 passed all 1 test case(s) 2019-03-25 02:31:39 ./run-tests.py scan_for_auth_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_for_auth_fail 1/1 Test: cfg80211 workaround with scan-for-auth failing Starting AP wlan3 Connect STA wlan0 to AP PASS scan_for_auth_fail 0.82296 2019-03-25 02:31:40.751869 passed all 1 test case(s) 2019-03-25 02:31:40 ./run-tests.py scan_for_auth_wep DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_for_auth_wep 1/1 Test: cfg80211 scan-for-auth workaround with WEP keys Starting AP wlan3 Connect STA wlan0 to AP PASS scan_for_auth_wep 0.939853 2019-03-25 02:31:42.297847 passed all 1 test case(s) 2019-03-25 02:31:42 ./run-tests.py scan_freq_list DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_freq_list 1/1 Test: Scan with SET freq_list and scan_cur_freq Starting AP wlan3 Connect STA wlan0 to AP PASS scan_freq_list 0.985378 2019-03-25 02:31:43.752410 passed all 1 test case(s) 2019-03-25 02:31:43 ./run-tests.py scan_hidden DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_hidden 1/1 Test: Control interface behavior on scan parameters Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS scan_hidden 1.453966 2019-03-25 02:31:45.852000 passed all 1 test case(s) 2019-03-25 02:31:45 ./run-tests.py scan_hidden_many DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_hidden_many 1/1 Test: scan_ssid=1 with large number of profile with hidden SSID Starting AP wlan3 PASS scan_hidden_many 2.327235 2019-03-25 02:31:48.890213 passed all 1 test case(s) 2019-03-25 02:31:48 ./run-tests.py scan_ies DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_ies 1/1 Test: Scan and both Beacon and Probe Response frame IEs Starting AP wlan3 ie: [0, 1, 3, 42, 45, 221, 50, 59, 61, 127] beacon_ie: [0, 1, 3, 42, 45, 221, 50, 59, 61, 127] PASS scan_ies 1.083889 2019-03-25 02:31:50.589789 passed all 1 test case(s) 2019-03-25 02:31:50 ./run-tests.py scan_int DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_int 1/1 Test: scan interval configuration Connect STA wlan0 to AP Waiting for scan to start Waiting for scan to complete Waiting for scan to start Waiting for scan to complete Waiting for scan to start Waiting for scan to complete times={0: 0.009999999776482582, 1: 1.040000000037253, 2: 1.0099999997764826} PASS scan_int 2.301354 2019-03-25 02:31:53.615725 passed all 1 test case(s) 2019-03-25 02:31:53 ./run-tests.py scan_mbssid_hidden_ssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_mbssid_hidden_ssid 1/1 Test: Non-transmitting BSS has hidden SSID bssid: 02:00:00:00:03:00 Starting AP wlan3 AP 02:00:00:00:03:00: {'noise': '-89', 'ssid': 'transmitted', 'bssid': '02:00:00:00:03:00', 'level': '-30', 'tsf': '1553452314386084', 'age': '0', 'snr': '59', 'capabilities': '0x0401', 'qual': '0', 'est_throughput': '65000', 'beacon_int': '100', 'flags': '[ESS]', 'freq': '2412', 'ie': '000b7472616e736d6974746564010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f004718020009530201000000550101000a53020200000132550102', 'id': '154', 'update_idx': '216'} AP 02:00:00:00:03:01: {'noise': '-89', 'ssid': '', 'bssid': '02:00:00:00:03:01', 'level': '-30', 'tsf': '1553452314386084', 'age': '0', 'snr': '59', 'capabilities': '0x0001', 'qual': '0', 'est_throughput': '65000', 'beacon_int': '100', 'flags': '[ESS]', 'freq': '2412', 'ie': '0000010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550101', 'id': '155', 'update_idx': '216'} AP 02:00:00:00:03:02: {'noise': '-89', 'ssid': '2', 'bssid': '02:00:00:00:03:02', 'level': '-30', 'tsf': '1553452314386084', 'age': '0', 'snr': '59', 'capabilities': '0x0002', 'qual': '0', 'est_throughput': '65000', 'beacon_int': '100', 'flags': '[IBSS]', 'freq': '2412', 'ie': '000132010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550102', 'id': '156', 'update_idx': '216'} PASS scan_mbssid_hidden_ssid 0.460656 2019-03-25 02:31:54.562294 passed all 1 test case(s) 2019-03-25 02:31:54 ./run-tests.py scan_multi_bssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multi_bssid 1/1 Test: Scan and Multiple BSSID element Starting AP wlan3 Starting AP wlan4 AP 02:00:00:00:03:00: {'noise': '-89', 'ssid': 'test-scan', 'bssid': '02:00:00:00:03:00', 'level': '-30', 'tsf': '1553452315648220', 'beacon_ie': '0009746573742d7363616e010882848b960c1218240301010504000200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00470100', 'age': '0', 'snr': '59', 'capabilities': '0x0401', 'qual': '0', 'est_throughput': '65000', 'beacon_int': '100', 'flags': '[ESS]', 'freq': '2412', 'ie': '0009746573742d7363616e010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00470100', 'id': '157', 'update_idx': '219'} AP 02:00:00:00:04:00: {'noise': '-89', 'ssid': 'test-scan', 'bssid': '02:00:00:00:04:00', 'level': '-30', 'tsf': '1553452315648211', 'beacon_ie': '0009746573742d7363616e010882848b960c1218240301010504000200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00470d01000a53020104000131550101', 'age': '0', 'snr': '59', 'capabilities': '0x0401', 'qual': '0', 'est_throughput': '65000', 'beacon_int': '100', 'flags': '[ESS]', 'freq': '2412', 'ie': '0009746573742d7363616e010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00470d01000a53020104000131550101', 'id': '158', 'update_idx': '219'} AP 02:00:00:00:04:01: {'noise': '-89', 'ssid': '1', 'bssid': '02:00:00:00:04:01', 'level': '-30', 'tsf': '1553452315648211', 'beacon_ie': '000131010882848b960c1218240301010504000200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550101', 'age': '0', 'snr': '59', 'capabilities': '0x0401', 'qual': '0', 'est_throughput': '65000', 'beacon_int': '100', 'flags': '[ESS]', 'freq': '2412', 'ie': '000131010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550101', 'id': '159', 'update_idx': '219'} PASS scan_multi_bssid 0.696009 2019-03-25 02:31:55.872393 passed all 1 test case(s) 2019-03-25 02:31:55 ./run-tests.py scan_multi_bssid_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multi_bssid_2 1/1 Test: Scan and Multiple BSSID element (2) Starting AP wlan3 AP 02:00:00:00:03:00: {'noise': '-89', 'ssid': 'transmitted', 'bssid': '02:00:00:00:03:00', 'level': '-30', 'tsf': '1553452316724093', 'beacon_ie': '000b7472616e736d6974746564010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00474b04001453020100000b7472616e736d6974746564550100001753020100000e6e6f6e7472616e736d697474656455010100195302010000106e6f6e7472616e736d69747465645f32550102', 'age': '0', 'snr': '59', 'capabilities': '0x0401', 'qual': '0', 'est_throughput': '65000', 'beacon_int': '100', 'flags': '[ESS]', 'freq': '2412', 'ie': '000b7472616e736d6974746564010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00474b04001453020100000b7472616e736d6974746564550100001753020100000e6e6f6e7472616e736d697474656455010100195302010000106e6f6e7472616e736d69747465645f32550102', 'id': '160', 'update_idx': '222'} AP 02:00:00:00:03:01: {'noise': '-89', 'ssid': 'nontransmitted', 'bssid': '02:00:00:00:03:01', 'level': '-30', 'tsf': '1553452316724093', 'beacon_ie': '000e6e6f6e7472616e736d6974746564010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550101', 'age': '0', 'snr': '59', 'capabilities': '0x0001', 'qual': '0', 'est_throughput': '65000', 'beacon_int': '100', 'flags': '[ESS]', 'freq': '2412', 'ie': '000e6e6f6e7472616e736d6974746564010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550101', 'id': '161', 'update_idx': '222'} AP 02:00:00:00:03:02: {'noise': '-89', 'ssid': 'nontransmitted_2', 'bssid': '02:00:00:00:03:02', 'level': '-30', 'tsf': '1553452316724093', 'beacon_ie': '00106e6f6e7472616e736d69747465645f32010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550102', 'age': '0', 'snr': '59', 'capabilities': '0x0001', 'qual': '0', 'est_throughput': '65000', 'beacon_int': '100', 'flags': '[ESS]', 'freq': '2412', 'ie': '00106e6f6e7472616e736d69747465645f32010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550102', 'id': '162', 'update_idx': '222'} PASS scan_multi_bssid_2 0.518577 2019-03-25 02:31:56.906230 passed all 1 test case(s) 2019-03-25 02:31:56 ./run-tests.py scan_multi_bssid_3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multi_bssid_3 1/1 Test: Scan and Multiple BSSID element (3) Starting AP wlan3 AP 02:00:00:00:03:00: {'noise': '-89', 'ssid': 'transmitted', 'bssid': '02:00:00:00:03:00', 'level': '-30', 'tsf': '1553452317925052', 'beacon_ie': '000b7472616e736d6974746564010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00473302001753020100000e6e6f6e7472616e736d6974746564550101001753020100000e6e6f6e7472616e736d6974746564550101', 'age': '0', 'snr': '59', 'capabilities': '0x0401', 'qual': '0', 'est_throughput': '65000', 'beacon_int': '100', 'flags': '[ESS]', 'freq': '2412', 'ie': '000b7472616e736d6974746564010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00473302001753020100000e6e6f6e7472616e736d6974746564550101001753020100000e6e6f6e7472616e736d6974746564550101', 'id': '163', 'update_idx': '225'} AP 02:00:00:00:03:01: {'noise': '-89', 'ssid': 'nontransmitted', 'bssid': '02:00:00:00:03:01', 'level': '-30', 'tsf': '1553452317925052', 'beacon_ie': '000e6e6f6e7472616e736d6974746564010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550101', 'age': '0', 'snr': '59', 'capabilities': '0x0001', 'qual': '0', 'est_throughput': '65000', 'beacon_int': '100', 'flags': '[ESS]', 'freq': '2412', 'ie': '000e6e6f6e7472616e736d6974746564010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550101', 'id': '164', 'update_idx': '225'} PASS scan_multi_bssid_3 0.632982 2019-03-25 02:31:58.111124 passed all 1 test case(s) 2019-03-25 02:31:58 ./run-tests.py scan_multi_bssid_4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multi_bssid_4 1/1 Test: Scan and Multiple BSSID element (3) Starting AP wlan3 AP 02:00:00:00:03:01: {'noise': '-89', 'ssid': 'transmitted', 'bssid': '02:00:00:00:03:01', 'level': '-30', 'tsf': '1553452319232208', 'beacon_ie': '000b7472616e736d6974746564010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00472502000a53020100000131550101000a53020100000132550102000a53020100000133550103', 'age': '1', 'snr': '59', 'capabilities': '0x0401', 'qual': '0', 'est_throughput': '65000', 'beacon_int': '100', 'flags': '[ESS]', 'freq': '2412', 'ie': '000b7472616e736d6974746564010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00472502000a53020100000131550101000a53020100000132550102000a53020100000133550103', 'id': '165', 'update_idx': '228'} AP 02:00:00:00:03:02: {'noise': '-89', 'ssid': '1', 'bssid': '02:00:00:00:03:02', 'level': '-30', 'tsf': '1553452319232208', 'beacon_ie': '000131010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550101', 'age': '1', 'snr': '59', 'capabilities': '0x0001', 'qual': '0', 'est_throughput': '65000', 'beacon_int': '100', 'flags': '[ESS]', 'freq': '2412', 'ie': '000131010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550101', 'id': '166', 'update_idx': '228'} AP 02:00:00:00:03:03: {'noise': '-89', 'ssid': '2', 'bssid': '02:00:00:00:03:03', 'level': '-30', 'tsf': '1553452319232208', 'beacon_ie': '000132010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550102', 'age': '1', 'snr': '59', 'capabilities': '0x0001', 'qual': '0', 'est_throughput': '65000', 'beacon_int': '100', 'flags': '[ESS]', 'freq': '2412', 'ie': '000132010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550102', 'id': '167', 'update_idx': '228'} AP 02:00:00:00:03:00: {'noise': '-89', 'ssid': '3', 'bssid': '02:00:00:00:03:00', 'level': '-30', 'tsf': '1553452319232208', 'beacon_ie': '000133010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550103', 'age': '1', 'snr': '59', 'capabilities': '0x0001', 'qual': '0', 'est_throughput': '65000', 'beacon_int': '100', 'flags': '[ESS]', 'freq': '2412', 'ie': '000133010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550103', 'id': '168', 'update_idx': '228'} PASS scan_multi_bssid_4 0.99366 2019-03-25 02:31:59.767654 passed all 1 test case(s) 2019-03-25 02:31:59 ./run-tests.py scan_multi_bssid_check_ie DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multi_bssid_check_ie 1/1 Test: Scan and check if nontransmitting BSS inherits IE from transmitting BSS Starting AP wlan3 trans_bss beacon_ie: [0, 1, 3, 5, 71, 42, 45, 221, 50, 59, 61, 127] nontrans_bss1 beacon_ie: [0, 1, 3, 5, 42, 45, 221, 50, 85, 59, 61, 127] check IE failed Traceback (most recent call last): File "./run-tests.py", line 466, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_scan.py", line 1703, in test_scan_multi_bssid_check_ie raise Exception("check IE failed") Exception: check IE failed FAIL scan_multi_bssid_check_ie 0.671182 2019-03-25 02:32:01.152626 passed 0 test case(s) skipped 0 test case(s) failed tests: scan_multi_bssid_check_ie 2019-03-25 02:32:01 ./run-tests.py scan_multi_bssid_fms DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multi_bssid_fms 1/1 Test: Non-transmitting BSS has different FMS IE from transmitting BSS Starting AP wlan3 trans_bss fms ie: 013901 nontrans_bss fms ie: 0229320102 PASS scan_multi_bssid_fms 0.562365 2019-03-25 02:32:02.281787 passed all 1 test case(s) 2019-03-25 02:32:02 ./run-tests.py scan_multiple_mbssid_ie DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multiple_mbssid_ie 1/1 Test: Transmitting BSS has 2 MBSSID IE bssid: 02:00:00:00:03:00 Starting AP wlan3 AP 02:00:00:00:03:00: {'noise': '-89', 'ssid': 'transmitted', 'bssid': '02:00:00:00:03:00', 'level': '-30', 'tsf': '1553452323225803', 'beacon_ie': '000b7472616e736d6974746564010882848b960c1218240301010504000200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00470d02000a53020100000131550101470d02000a53020200000132550102', 'age': '1', 'snr': '59', 'capabilities': '0x0401', 'qual': '0', 'est_throughput': '65000', 'beacon_int': '100', 'flags': '[ESS]', 'freq': '2412', 'ie': '000b7472616e736d6974746564010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00470d02000a53020100000131550101470d02000a53020200000132550102', 'id': '173', 'update_idx': '237'} AP 02:00:00:00:03:01: {'noise': '-89', 'ssid': '1', 'bssid': '02:00:00:00:03:01', 'level': '-30', 'tsf': '1553452323225803', 'beacon_ie': '000131010882848b960c1218240301010504000200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550101', 'age': '1', 'snr': '59', 'capabilities': '0x0001', 'qual': '0', 'est_throughput': '65000', 'beacon_int': '100', 'flags': '[ESS]', 'freq': '2412', 'ie': '000131010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550101', 'id': '174', 'update_idx': '237'} AP 02:00:00:00:03:02: {'noise': '-89', 'ssid': '2', 'bssid': '02:00:00:00:03:02', 'level': '-30', 'tsf': '1553452323225803', 'beacon_ie': '000132010882848b960c1218240301010504000200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550102', 'age': '1', 'snr': '59', 'capabilities': '0x0002', 'qual': '0', 'est_throughput': '65000', 'beacon_int': '100', 'flags': '[IBSS]', 'freq': '2412', 'ie': '000132010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101000003a4000027a4000042435e0062322f00550102', 'id': '175', 'update_idx': '237'} PASS scan_multiple_mbssid_ie 0.531222 2019-03-25 02:32:03.383401 passed all 1 test case(s) 2019-03-25 02:32:03 ./run-tests.py scan_new_only DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_new_only 1/1 Test: Scan and only_new=1 multiple times Starting AP wlan3 PASS scan_new_only 1.330143 2019-03-25 02:32:05.350733 passed all 1 test case(s) ignored_by_lkp scan_only 2019-03-25 02:32:05 ./run-tests.py scan_parsing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_parsing 1/1 Test: Scan result parsing SCAN_RESULTS: bssid / frequency / signal level / flags / ssid 02:ff:00:00:00:02 1234 10 [WEP] test 02:ff:00:00:00:03 0 0 02:ff:00:00:00:04 0 0 02:ff:00:00:00:05 58320 0 [DMG] dmg 02:ff:00:00:00:06 60480 0 [DMG][IBSS] dmg 02:ff:00:00:00:07 62640 0 [DMG][PBSS] dmg 02:ff:00:00:00:08 64800 0 [DMG][ESS] dmg 02:ff:00:00:00:09 2412 1 [WEP][ESS] upd 02:ff:00:00:00:00 0 0 BSS output: id=177 bssid=02:ff:00:00:00:02 freq=1234 beacon_int=102 capabilities=0x1234 qual=10 noise=10 level=10 tsf=1234605616436508552 age=123 ie=000474657374 flags=[WEP] ssid=test snr=10 est_throughput=100 update_idx=253 beacon_ie=000474657374 BSS output: id=178 bssid=02:ff:00:00:00:03 freq=0 beacon_int=0 capabilities=0x0000 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0000 flags= ssid= snr=0 est_throughput=0 update_idx=253 beacon_ie=0003ffff BSS output: id=179 bssid=02:ff:00:00:00:04 freq=0 beacon_int=0 capabilities=0x0000 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=00000101 flags= ssid= snr=0 est_throughput=0 update_idx=253 beacon_ie=0000 BSS output: id=180 bssid=02:ff:00:00:00:05 freq=58320 beacon_int=0 capabilities=0x0000 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0003646d67 flags=[DMG] ssid=dmg snr=0 est_throughput=0 update_idx=253 BSS output: id=181 bssid=02:ff:00:00:00:06 freq=60480 beacon_int=0 capabilities=0x0001 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0003646d67 flags=[DMG][IBSS] ssid=dmg snr=0 est_throughput=0 update_idx=253 BSS output: id=182 bssid=02:ff:00:00:00:07 freq=62640 beacon_int=0 capabilities=0x0002 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0003646d67 flags=[DMG][PBSS] ssid=dmg snr=0 est_throughput=0 update_idx=253 BSS output: id=183 bssid=02:ff:00:00:00:08 freq=64800 beacon_int=0 capabilities=0x0003 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0003646d67 flags=[DMG][ESS] ssid=dmg snr=0 est_throughput=0 update_idx=253 BSS output: id=184 bssid=02:ff:00:00:00:09 freq=2412 beacon_int=0 capabilities=0x0011 qual=0 noise=0 level=1 tsf=0000000000000000 age=0 ie=0003757064010182 flags=[WEP][ESS] ssid=upd snr=0 est_throughput=0 update_idx=253 BSS output: id=185 bssid=02:ff:00:00:00:00 freq=0 beacon_int=0 capabilities=0x0000 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0000 flags= ssid= snr=0 est_throughput=0 update_idx=253 Discovered BSSs: ['02:ff:00:00:00:02', '02:ff:00:00:00:03', '02:ff:00:00:00:04', '02:ff:00:00:00:05', '02:ff:00:00:00:06', '02:ff:00:00:00:07', '02:ff:00:00:00:08', '02:ff:00:00:00:09', '02:ff:00:00:00:00'] Update BSS parameters Updated BSS: id=184 bssid=02:ff:00:00:00:09 freq=2412 beacon_int=0 capabilities=0x0002 qual=0 noise=0 level=2 tsf=0000000000000000 age=0 ie=000375706401028204 flags=[IBSS] ssid=upd snr=0 est_throughput=0 update_idx=254 PASS scan_parsing 0.092269 2019-03-25 02:32:06.202686 passed all 1 test case(s) 2019-03-25 02:32:06 ./run-tests.py scan_probe_req_events DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_probe_req_events 1/1 Test: Probe Request frame RX events from hostapd Starting AP wlan3 PASS scan_probe_req_events 1.070569 2019-03-25 02:32:07.867751 passed all 1 test case(s) 2019-03-25 02:32:07 ./run-tests.py scan_random_mac DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_random_mac 1/1 Test: Random MAC address in scans Starting AP wlan3 Probe Request frames seen from: ['c2:8f:18:03:d4:b4', 'f2:11:22:33:44:55', 'f2:11:33:8b:85:86'] PASS scan_random_mac 0.896514 2019-03-25 02:32:09.357250 passed all 1 test case(s) 2019-03-25 02:32:09 ./run-tests.py scan_random_mac_connected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_random_mac_connected 1/1 Test: Random MAC address in scans while connected Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS scan_random_mac_connected 0.745475 2019-03-25 02:32:10.615180 passed all 1 test case(s) 2019-03-25 02:32:10 ./run-tests.py scan_reqs_with_non_scan_radio_work DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_reqs_with_non_scan_radio_work 1/1 Test: SCAN commands while non-scan radio_work is in progress PASS scan_reqs_with_non_scan_radio_work 4.209422 2019-03-25 02:32:15.337517 passed all 1 test case(s) ignored_by_lkp scan_setband 2019-03-25 02:32:15 ./run-tests.py scan_specific_bssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_specific_bssid 1/1 Test: Scan for a specific BSSID Starting AP wlan3 PASS scan_specific_bssid 0.576075 2019-03-25 02:32:16.419887 passed all 1 test case(s) 2019-03-25 02:32:16 ./run-tests.py scan_specify_ssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_specify_ssid 1/1 Test: Control interface behavior on scan SSID parameter Starting AP wlan3 PASS scan_specify_ssid 0.701641 2019-03-25 02:32:17.705827 passed all 1 test case(s) 2019-03-25 02:32:17 ./run-tests.py scan_trigger_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_trigger_failure 1/1 Test: Scan trigger to the driver failing Starting AP wlan3 Connect STA wlan0 to AP PASS scan_trigger_failure 1.492709 2019-03-25 02:32:19.726495 passed all 1 test case(s) 2019-03-25 02:32:19 ./run-tests.py scan_tsf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_tsf 1/1 Test: Scan and TSF updates from Beacon/Probe Response frames Starting AP wlan3 TSF: 1553452340429008 TSF: 1553452340531407 TSF: 1553452340633809 TSF: 1553452340838608 TSF: 1553452340941007 TSF: 1553452341145806 TSF: 1553452341207610 TSF: 1553452341260369 TSF: 1553452341389816 TSF: 1553452341456118 TSF: 1553452341556694 TSF: 1553452341760208 PASS scan_tsf 1.791713 2019-03-25 02:32:21.980827 passed all 1 test case(s) ignored_by_lkp sigma_dut_ap_cipher_ccmp_128 ignored_by_lkp sigma_dut_ap_cipher_ccmp_256 ignored_by_lkp sigma_dut_ap_cipher_ccmp_gcmp_1 ignored_by_lkp sigma_dut_ap_cipher_ccmp_gcmp_2 ignored_by_lkp sigma_dut_ap_cipher_gcmp_128 ignored_by_lkp sigma_dut_ap_cipher_gcmp_256 ignored_by_lkp sigma_dut_ap_cipher_gcmp_256_group_ccmp ignored_by_lkp sigma_dut_ap_dpp_pkex_responder ignored_by_lkp sigma_dut_ap_dpp_qr ignored_by_lkp sigma_dut_ap_dpp_qr_legacy ignored_by_lkp sigma_dut_ap_dpp_qr_legacy_psk ignored_by_lkp sigma_dut_ap_dpp_self_config ignored_by_lkp sigma_dut_ap_eap ignored_by_lkp sigma_dut_ap_eap_osen ignored_by_lkp sigma_dut_ap_eap_sha256 ignored_by_lkp sigma_dut_ap_ent_ft_eap ignored_by_lkp sigma_dut_ap_ft_eap ignored_by_lkp sigma_dut_ap_ft_psk ignored_by_lkp sigma_dut_ap_hs20 ignored_by_lkp sigma_dut_ap_osen ignored_by_lkp sigma_dut_ap_override_rsne ignored_by_lkp sigma_dut_ap_owe ignored_by_lkp sigma_dut_ap_owe_ecgroupid ignored_by_lkp sigma_dut_ap_owe_transition_mode ignored_by_lkp sigma_dut_ap_owe_transition_mode_2 ignored_by_lkp sigma_dut_ap_psk ignored_by_lkp sigma_dut_ap_psk_sae ignored_by_lkp sigma_dut_ap_psk_sha256 ignored_by_lkp sigma_dut_ap_pskhex ignored_by_lkp sigma_dut_ap_sae ignored_by_lkp sigma_dut_ap_sae_group ignored_by_lkp sigma_dut_ap_sae_password ignored_by_lkp sigma_dut_ap_suite_b ignored_by_lkp sigma_dut_basic ignored_by_lkp sigma_dut_dpp_incompatible_roles_init ignored_by_lkp sigma_dut_dpp_incompatible_roles_resp ignored_by_lkp sigma_dut_dpp_pkex_init_configurator ignored_by_lkp sigma_dut_dpp_pkex_responder_proto ignored_by_lkp sigma_dut_dpp_proto_initiator ignored_by_lkp sigma_dut_dpp_proto_initiator_pkex ignored_by_lkp sigma_dut_dpp_proto_peer_disc_req ignored_by_lkp sigma_dut_dpp_proto_responder ignored_by_lkp sigma_dut_dpp_proto_responder_pkex ignored_by_lkp sigma_dut_dpp_proto_stop_at_initiator ignored_by_lkp sigma_dut_dpp_proto_stop_at_initiator_enrollee ignored_by_lkp sigma_dut_dpp_proto_stop_at_responder ignored_by_lkp sigma_dut_dpp_qr_init_configurator_1 ignored_by_lkp sigma_dut_dpp_qr_init_configurator_2 ignored_by_lkp sigma_dut_dpp_qr_init_configurator_3 ignored_by_lkp sigma_dut_dpp_qr_init_configurator_4 ignored_by_lkp sigma_dut_dpp_qr_init_configurator_5 ignored_by_lkp sigma_dut_dpp_qr_init_configurator_6 ignored_by_lkp sigma_dut_dpp_qr_init_configurator_7 ignored_by_lkp sigma_dut_dpp_qr_init_configurator_both ignored_by_lkp sigma_dut_dpp_qr_init_configurator_neg_freq ignored_by_lkp sigma_dut_dpp_qr_init_enrollee ignored_by_lkp sigma_dut_dpp_qr_init_enrollee_psk 2019-03-25 02:32:22 ./stop.sh 2019-03-25 02:32:23 ./start.sh channels=4 2019-03-25 02:32:24 ./stop.sh