Advertisement
gfaster

wpa_supplicant reason=3 -d

Sep 22nd, 2021
384
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 171.80 KB | None | 0 0
  1. pi@raspberrypi:~ $ sudo wpa_supplicant -c/etc/wpa_supplicant/wpa_supplicant.conf -iwlan0 -Dnl80211,wext -d
  2. wpa_supplicant v2.8-devel
  3. random: getrandom() support available
  4. Successfully initialized wpa_supplicant
  5. Initializing interface 'wlan0' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'nl80211,wext' ctrl_interface 'N/A' bridge 'N/A'
  6. Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf'
  7. Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
  8. ctrl_interface='DIR=/var/run/wpa_supplicant GROUP=netdev'
  9. update_config=1
  10. ap_scan=1
  11. country='US'
  12. Priority group 0
  13. id=0 ssid='eduroam'
  14. nl80211: Using driver-based roaming
  15. nl80211: TDLS supported
  16. nl80211: Supported cipher 00-0f-ac:1
  17. nl80211: Supported cipher 00-0f-ac:5
  18. nl80211: Supported cipher 00-0f-ac:2
  19. nl80211: Supported cipher 00-0f-ac:4
  20. nl80211: Supported cipher 00-0f-ac:6
  21. nl80211: Using driver-based off-channel TX
  22. nl80211: Supported vendor command: vendor_id=0x1018 subcmd=1
  23. nl80211: Use separate P2P group interface (driver advertised support)
  24. nl80211: Enable multi-channel concurrent (driver advertised support)
  25. nl80211: use P2P_DEVICE support
  26. nl80211: interface wlan0 in phy phy0
  27. nl80211: Set mode ifindex 3 iftype 2 (STATION)
  28. nl80211: Subscribe to mgmt frames with non-AP handle 0x1dddea0
  29. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0104
  30. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040a
  31. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040b
  32. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040c
  33. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040d
  34. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090a
  35. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090b
  36. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090c
  37. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090d
  38. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0409506f9a09
  39. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=7f506f9a09
  40. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0409506f9a1a
  41. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0801
  42. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040e
  43. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=12
  44. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=06
  45. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a07
  46. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a11
  47. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a1a
  48. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=1101
  49. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=1102
  50. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0505
  51. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0500
  52. rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
  53. netlink: Operstate: ifindex=3 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
  54. Add interface wlan0 to a new radio phy0
  55. nl80211: Regulatory information - country=US (DFS-FCC)
  56. nl80211: 2402-2472 @ 40 MHz 30 mBm
  57. nl80211: 5170-5250 @ 80 MHz 23 mBm
  58. nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
  59. nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
  60. nl80211: 5735-5835 @ 80 MHz 30 mBm
  61. nl80211: 57240-63720 @ 2160 MHz 40 mBm
  62. nl80211: Added 802.11b mode based on 802.11g information
  63. nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  64. nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
  65. nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  66. wlan0: Own MAC address: d6:29:1b:62:bf:a0
  67. wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  68. wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
  69. wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
  70. wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
  71. wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
  72. wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
  73. wlan0: RSN: flushing PMKID list in the driver
  74. nl80211: Flush PMKIDs
  75. TDLS: TDLS operation supported by driver
  76. TDLS: Driver uses internal link setup
  77. TDLS: Driver does not support TDLS channel switching
  78. wlan0: WPS: UUID based on MAC address: e55180dd-1e52-504b-93fa-b5157eafd72b
  79. ENGINE: Loading dynamic engine
  80. ENGINE: Loading dynamic engine
  81. EAPOL: SUPP_PAE entering state DISCONNECTED
  82. EAPOL: Supplicant port status: Unauthorized
  83. nl80211: Skip set_supp_port(unauthorized) while not associated
  84. EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  85. EAPOL: SUPP_BE entering state INITIALIZE
  86. EAP: EAP entering state DISABLED
  87. ctrl_interface_group=109 (from group name 'netdev')
  88. wlan0: Added interface wlan0
  89. wlan0: State: DISCONNECTED -> DISCONNECTED
  90. nl80211: Set wlan0 operstate 0->0 (DORMANT)
  91. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  92. nl80211: Create interface iftype 10 (P2P_DEVICE)
  93. nl80211: New P2P Device interface p2p-dev-wlan0 (0x6) created
  94. Initializing interface 'p2p-dev-wlan0' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'nl80211' ctrl_interface 'DIR=/var/run/wpa_supplicant GROUP=netdev' bridge 'N/A'
  95. Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf'
  96. Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
  97. ctrl_interface='DIR=/var/run/wpa_supplicant GROUP=netdev'
  98. update_config=1
  99. ap_scan=1
  100. country='US'
  101. Priority group 0
  102. id=0 ssid='eduroam'
  103. nl80211: Using driver-based roaming
  104. nl80211: TDLS supported
  105. nl80211: Supported cipher 00-0f-ac:1
  106. nl80211: Supported cipher 00-0f-ac:5
  107. nl80211: Supported cipher 00-0f-ac:2
  108. nl80211: Supported cipher 00-0f-ac:4
  109. nl80211: Supported cipher 00-0f-ac:6
  110. nl80211: Using driver-based off-channel TX
  111. nl80211: Supported vendor command: vendor_id=0x1018 subcmd=1
  112. nl80211: Use separate P2P group interface (driver advertised support)
  113. nl80211: Enable multi-channel concurrent (driver advertised support)
  114. nl80211: use P2P_DEVICE support
  115. nl80211: interface p2p-dev-wlan0 in phy phy0
  116. nl80211: Set mode ifindex 0 iftype 10 (P2P_DEVICE)
  117. nl80211: Failed to set interface 0 to mode 10: -22 (Invalid argument)
  118. nl80211: Subscribe to mgmt frames with non-AP handle 0x1df7b20
  119. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=0104
  120. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=040a
  121. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=040b
  122. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=040c
  123. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=040d
  124. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=090a
  125. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=090b
  126. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=090c
  127. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=090d
  128. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=0409506f9a09
  129. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=7f506f9a09
  130. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=0409506f9a1a
  131. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=0801
  132. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=040e
  133. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=12
  134. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=06
  135. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=0a07
  136. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=0a11
  137. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=0a1a
  138. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=1101
  139. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=1102
  140. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=0505
  141. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=0500
  142. nl80211: Use (wlan0) to initialize P2P Device rfkill
  143. rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
  144. nl80211: Start P2P Device p2p-dev-wlan0 (0x6): Success
  145. Add interface p2p-dev-wlan0 to existing radio phy0
  146. nl80211: Regulatory information - country=US (DFS-FCC)
  147. nl80211: 2402-2472 @ 40 MHz 30 mBm
  148. nl80211: 5170-5250 @ 80 MHz 23 mBm
  149. nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
  150. nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
  151. nl80211: 5735-5835 @ 80 MHz 30 mBm
  152. nl80211: 57240-63720 @ 2160 MHz 40 mBm
  153. nl80211: Added 802.11b mode based on 802.11g information
  154. nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  155. nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
  156. nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  157. p2p-dev-wlan0: Own MAC address: 1a:e5:de:04:13:ab
  158. p2p-dev-wlan0: RSN: flushing PMKID list in the driver
  159. nl80211: Flush PMKIDs
  160. p2p-dev-wlan0: State: DISCONNECTED -> INACTIVE
  161. p2p-dev-wlan0: WPS: UUID from the first interface: e55180dd-1e52-504b-93fa-b5157eafd72b
  162. ENGINE: Loading dynamic engine
  163. ENGINE: Loading dynamic engine
  164. EAPOL: SUPP_PAE entering state DISCONNECTED
  165. EAPOL: Supplicant port status: Unauthorized
  166. nl80211: Skip set_supp_port(unauthorized) while not associated
  167. EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  168. EAPOL: SUPP_BE entering state INITIALIZE
  169. EAP: EAP entering state DISABLED
  170. Using existing control interface directory.
  171. ctrl_interface_group=109 (from group name 'netdev')
  172. P2P: Add operating class 81
  173. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  174. P2P: Add operating class 115
  175. P2P: Channels - hexdump(len=4): 24 28 2c 30
  176. P2P: Add operating class 116
  177. P2P: Channels - hexdump(len=2): 24 2c
  178. P2P: Add operating class 117
  179. P2P: Channels - hexdump(len=2): 28 30
  180. P2P: Add operating class 124
  181. P2P: Channels - hexdump(len=4): 95 99 9d a1
  182. P2P: Add operating class 125
  183. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  184. P2P: Add operating class 126
  185. P2P: Channels - hexdump(len=2): 95 9d
  186. P2P: Add operating class 127
  187. P2P: Channels - hexdump(len=2): 99 a1
  188. P2P: Add operating class 128
  189. P2P: Channels - hexdump(len=4): 24 28 2c 30
  190. P2P: Add operating class 130
  191. P2P: Channels - hexdump(len=4): 24 28 2c 30
  192. P2P: Own listen channel: 81:6
  193. P2P: Random operating channel: 81:6
  194. P2P: initialized
  195. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  196. P2P: cli_channels:
  197. p2p-dev-wlan0: Added interface p2p-dev-wlan0
  198. p2p-dev-wlan0: State: INACTIVE -> DISCONNECTED
  199. nl80211: Set p2p-dev-wlan0 operstate 0->0 (DORMANT)
  200. netlink: Operstate: ifindex=0 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  201. p2p-dev-wlan0: Determining shared radio frequencies (max len 2)
  202. p2p-dev-wlan0: Shared frequencies (len=0): completed iteration
  203. P2P: Add operating class 81
  204. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  205. P2P: Add operating class 115
  206. P2P: Channels - hexdump(len=4): 24 28 2c 30
  207. P2P: Add operating class 116
  208. P2P: Channels - hexdump(len=2): 24 2c
  209. P2P: Add operating class 117
  210. P2P: Channels - hexdump(len=2): 28 30
  211. P2P: Add operating class 124
  212. P2P: Channels - hexdump(len=4): 95 99 9d a1
  213. P2P: Add operating class 125
  214. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  215. P2P: Add operating class 126
  216. P2P: Channels - hexdump(len=2): 95 9d
  217. P2P: Add operating class 127
  218. P2P: Channels - hexdump(len=2): 99 a1
  219. P2P: Add operating class 128
  220. P2P: Channels - hexdump(len=4): 24 28 2c 30
  221. P2P: Add operating class 130
  222. P2P: Channels - hexdump(len=4): 24 28 2c 30
  223. P2P: Update channel list
  224. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  225. P2P: cli_channels:
  226. RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=5 linkmode=0 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  227. RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  228. wlan0: Starting delayed sched scan
  229. wlan0: Use normal scan instead of sched_scan for initial scans (normal_scans=0)
  230. wlan0: Setting scan request: 0.000000 sec
  231. wlan0: State: DISCONNECTED -> SCANNING
  232. wlan0: Determining shared radio frequencies (max len 2)
  233. wlan0: Shared frequencies (len=0): completed iteration
  234. P2P: Add operating class 81
  235. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  236. P2P: Add operating class 115
  237. P2P: Channels - hexdump(len=4): 24 28 2c 30
  238. P2P: Add operating class 116
  239. P2P: Channels - hexdump(len=2): 24 2c
  240. P2P: Add operating class 117
  241. P2P: Channels - hexdump(len=2): 28 30
  242. P2P: Add operating class 124
  243. P2P: Channels - hexdump(len=4): 95 99 9d a1
  244. P2P: Add operating class 125
  245. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  246. P2P: Add operating class 126
  247. P2P: Channels - hexdump(len=2): 95 9d
  248. P2P: Add operating class 127
  249. P2P: Channels - hexdump(len=2): 99 a1
  250. P2P: Add operating class 128
  251. P2P: Channels - hexdump(len=4): 24 28 2c 30
  252. P2P: Add operating class 130
  253. P2P: Channels - hexdump(len=4): 24 28 2c 30
  254. P2P: Update channel list
  255. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  256. P2P: cli_channels:
  257. Scan SSID - hexdump_ascii(len=7):
  258. 65 64 75 72 6f 61 6d eduroam
  259. wlan0: Starting AP scan for wildcard SSID
  260. WPS: Building WPS IE for Probe Request
  261. WPS: * Version (hardcoded 0x10)
  262. WPS: * Request Type
  263. WPS: * Config Methods (3148)
  264. WPS: * UUID-E
  265. WPS: * Primary Device Type
  266. WPS: * RF Bands (3)
  267. WPS: * Association State
  268. WPS: * Configuration Error (0)
  269. WPS: * Device Password ID (0)
  270. WPS: * Manufacturer
  271. WPS: * Model Name
  272. WPS: * Model Number
  273. WPS: * Device Name
  274. WPS: * Version2 (0x20)
  275. P2P: * P2P IE header
  276. P2P: * Capability dev=25 group=00
  277. P2P: * Listen Channel: Regulatory Class 81 Channel 6
  278. wlan0: Add radio work 'scan'@0x1dfd060
  279. wlan0: First radio work item in the queue - schedule start immediately
  280. wlan0: Starting radio work 'scan'@0x1dfd060 after 0.000057 second wait
  281. wlan0: nl80211: scan request
  282. Scan requested (ret=0) - scan timeout 10 seconds
  283. nl80211: Ignored event (cmd=33) for foreign interface (ifindex 3 wdev 0x0)
  284. nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
  285. wlan0: nl80211: Scan trigger
  286. wlan0: Event SCAN_STARTED (46) received
  287. wlan0: Own scan request started a scan in 0.000192 seconds
  288. EAPOL: disable timer tick
  289. EAPOL: disable timer tick
  290. RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  291. nl80211: Ignored event (cmd=34) for foreign interface (ifindex 3 wdev 0x0)
  292. nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
  293. wlan0: nl80211: New scan results available
  294. nl80211: Scan probed for SSID 'eduroam'
  295. nl80211: Scan probed for SSID ''
  296. nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5720 5745 5765 5785 5805 5825
  297. wlan0: Event SCAN_RESULTS (3) received
  298. wlan0: Scan completed in 2.814294 seconds
  299. nl80211: Received scan results (16 BSSes)
  300. wlan0: BSS: Start scan result update 1
  301. wlan0: BSS: Add new id 0 BSSID b0:b8:67:ef:d9:11 SSID 'eduroam' freq 5745
  302. wlan0: BSS: Add new id 1 BSSID b0:b8:67:ed:fc:51 SSID 'eduroam' freq 5200
  303. wlan0: BSS: Add new id 2 BSSID b0:b8:67:f1:57:91 SSID 'eduroam' freq 5240
  304. wlan0: BSS: Add new id 3 BSSID b0:b8:67:ef:d9:01 SSID 'eduroam' freq 2462
  305. wlan0: BSS: Add new id 4 BSSID b0:b8:67:ed:fc:41 SSID 'eduroam' freq 2412
  306. wlan0: BSS: Add new id 5 BSSID b0:b8:67:f1:57:81 SSID 'eduroam' freq 2462
  307. wlan0: BSS: Add new id 6 BSSID b0:b8:67:ef:47:d1 SSID 'eduroam' freq 5200
  308. wlan0: BSS: Add new id 7 BSSID 38:17:c3:af:96:e1 SSID 'eduroam' freq 2437
  309. wlan0: BSS: Add new id 8 BSSID b0:b8:67:ef:d9:10 SSID 'XXX-OPEN' freq 5745
  310. wlan0: BSS: Add new id 9 BSSID b0:b8:67:ed:fc:50 SSID 'XXX-OPEN' freq 5200
  311. wlan0: BSS: Add new id 10 BSSID b0:b8:67:f1:57:90 SSID 'XXX-OPEN' freq 5240
  312. wlan0: BSS: Add new id 11 BSSID b0:b8:67:ef:d9:00 SSID 'XXX-OPEN' freq 2462
  313. wlan0: BSS: Add new id 12 BSSID b0:b8:67:ed:fc:40 SSID 'XXX-OPEN' freq 2412
  314. wlan0: BSS: Add new id 13 BSSID b0:b8:67:f1:57:80 SSID 'XXX-OPEN' freq 2462
  315. wlan0: BSS: Add new id 14 BSSID b0:b8:67:ef:47:d0 SSID 'XXX-OPEN' freq 5200
  316. wlan0: BSS: Add new id 15 BSSID 38:17:c3:af:96:e0 SSID 'XXX-OPEN' freq 2437
  317. BSS: last_scan_res_used=16/32
  318. wlan0: New scan results available (own=1 ext=0)
  319. wlan0: Radio work 'scan'@0x1dfd060 done in 2.837155 seconds
  320. wlan0: radio_work_free('scan'@0x1dfd060): num_active_works --> 0
  321. wlan0: Selecting BSS from priority group 0
  322. wlan0: 0: b0:b8:67:ef:d9:11 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-48 freq=5745
  323. wlan0: selected based on RSN IE
  324. wlan0: selected BSS b0:b8:67:ef:d9:11 ssid='eduroam'
  325. wlan0: Considering connect request: reassociate: 0 selected: b0:b8:67:ef:d9:11 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x1dde570 current_ssid=(nil)
  326. wlan0: Request association with b0:b8:67:ef:d9:11
  327. TDLS: TDLS is allowed in the target BSS
  328. TDLS: TDLS channel switch allowed in the target BSS
  329. wlan0: No ongoing scan/p2p-scan found to abort
  330. wlan0: Add radio work 'connect'@0x1dff250
  331. wlan0: First radio work item in the queue - schedule start immediately
  332. RSN: Ignored PMKID candidate without preauth flag
  333. RSN: Ignored PMKID candidate without preauth flag
  334. RSN: Ignored PMKID candidate without preauth flag
  335. RSN: Ignored PMKID candidate without preauth flag
  336. RSN: Ignored PMKID candidate without preauth flag
  337. RSN: Ignored PMKID candidate without preauth flag
  338. RSN: Ignored PMKID candidate without preauth flag
  339. RSN: Ignored PMKID candidate without preauth flag
  340. p2p-dev-wlan0: Updating scan results from sibling
  341. nl80211: Received scan results (16 BSSes)
  342. p2p-dev-wlan0: BSS: Start scan result update 1
  343. p2p-dev-wlan0: BSS: Add new id 0 BSSID b0:b8:67:ef:d9:11 SSID 'eduroam' freq 5745
  344. p2p-dev-wlan0: BSS: Add new id 1 BSSID b0:b8:67:ed:fc:51 SSID 'eduroam' freq 5200
  345. p2p-dev-wlan0: BSS: Add new id 2 BSSID b0:b8:67:f1:57:91 SSID 'eduroam' freq 5240
  346. p2p-dev-wlan0: BSS: Add new id 3 BSSID b0:b8:67:ef:d9:01 SSID 'eduroam' freq 2462
  347. p2p-dev-wlan0: BSS: Add new id 4 BSSID b0:b8:67:ed:fc:41 SSID 'eduroam' freq 2412
  348. p2p-dev-wlan0: BSS: Add new id 5 BSSID b0:b8:67:f1:57:81 SSID 'eduroam' freq 2462
  349. p2p-dev-wlan0: BSS: Add new id 6 BSSID b0:b8:67:ef:47:d1 SSID 'eduroam' freq 5200
  350. p2p-dev-wlan0: BSS: Add new id 7 BSSID 38:17:c3:af:96:e1 SSID 'eduroam' freq 2437
  351. p2p-dev-wlan0: BSS: Add new id 8 BSSID b0:b8:67:ef:d9:10 SSID 'XXX-OPEN' freq 5745
  352. p2p-dev-wlan0: BSS: Add new id 9 BSSID b0:b8:67:ed:fc:50 SSID 'XXX-OPEN' freq 5200
  353. p2p-dev-wlan0: BSS: Add new id 10 BSSID b0:b8:67:f1:57:90 SSID 'XXX-OPEN' freq 5240
  354. p2p-dev-wlan0: BSS: Add new id 11 BSSID b0:b8:67:ef:d9:00 SSID 'XXX-OPEN' freq 2462
  355. p2p-dev-wlan0: BSS: Add new id 12 BSSID b0:b8:67:ed:fc:40 SSID 'XXX-OPEN' freq 2412
  356. p2p-dev-wlan0: BSS: Add new id 13 BSSID b0:b8:67:f1:57:80 SSID 'XXX-OPEN' freq 2462
  357. p2p-dev-wlan0: BSS: Add new id 14 BSSID b0:b8:67:ef:47:d0 SSID 'XXX-OPEN' freq 5200
  358. p2p-dev-wlan0: BSS: Add new id 15 BSSID 38:17:c3:af:96:e0 SSID 'XXX-OPEN' freq 2437
  359. BSS: last_scan_res_used=16/32
  360. wlan0: Starting radio work 'connect'@0x1dff250 after 0.001725 second wait
  361. wlan0: Trying to associate with SSID 'eduroam'
  362. wlan0: Cancelling scan request
  363. wlan0: WPA: clearing own WPA/RSN IE
  364. RSN: PMKSA cache search - network_ctx=0x1dde570 try_opportunistic=0 akmp=0x0
  365. RSN: Search for BSSID b0:b8:67:ef:d9:11
  366. RSN: No PMKSA cache entry found
  367. wlan0: RSN: using IEEE 802.11i/D9.0
  368. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  369. wlan0: WPA: Selected mgmt group cipher 32
  370. wlan0: WPA: clearing AP WPA IE
  371. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
  372. wlan0: WPA: using GTK CCMP
  373. wlan0: WPA: using PTK CCMP
  374. wlan0: WPA: using KEY_MGMT 802.1X
  375. wlan0: WPA: not using MGMT group cipher
  376. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  377. WPA: No current PMKSA - clear PMK
  378. wlan0: Automatic auth_alg selection: 0x1
  379. Added supported operating classes IE - hexdump(len=22): 3b 14 7c 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82
  380. wlan0: State: SCANNING -> ASSOCIATING
  381. nl80211: Set wlan0 operstate 0->0 (DORMANT)
  382. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  383. wlan0: Determining shared radio frequencies (max len 2)
  384. wlan0: Shared frequencies (len=0): completed iteration
  385. P2P: Add operating class 81
  386. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  387. P2P: Add operating class 115
  388. P2P: Channels - hexdump(len=4): 24 28 2c 30
  389. P2P: Add operating class 116
  390. P2P: Channels - hexdump(len=2): 24 2c
  391. P2P: Add operating class 117
  392. P2P: Channels - hexdump(len=2): 28 30
  393. P2P: Add operating class 124
  394. P2P: Channels - hexdump(len=4): 95 99 9d a1
  395. P2P: Add operating class 125
  396. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  397. P2P: Add operating class 126
  398. P2P: Channels - hexdump(len=2): 95 9d
  399. P2P: Add operating class 127
  400. P2P: Channels - hexdump(len=2): 99 a1
  401. P2P: Add operating class 128
  402. P2P: Channels - hexdump(len=4): 24 28 2c 30
  403. P2P: Add operating class 130
  404. P2P: Channels - hexdump(len=4): 24 28 2c 30
  405. P2P: Update channel list
  406. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  407. P2P: cli_channels:
  408. wlan0: set_disable_max_amsdu: -1
  409. wlan0: set_ampdu_factor: -1
  410. wlan0: set_ampdu_density: -1
  411. wlan0: set_disable_ht40: 0
  412. wlan0: set_disable_sgi: 0
  413. wlan0: set_disable_ldpc: 0
  414. wlan0: set_rx_stbc: -1
  415. wlan0: set_tx_stbc: -1
  416. nl80211: Set mode ifindex 3 iftype 2 (STATION)
  417. nl80211: Unsubscribe mgmt frames handle 0x89555629 (mode change)
  418. nl80211: Subscribe to mgmt frames with non-AP handle 0x1dddea0
  419. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0104
  420. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040a
  421. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040b
  422. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040c
  423. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040d
  424. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090a
  425. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090b
  426. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090c
  427. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090d
  428. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0409506f9a09
  429. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=7f506f9a09
  430. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0409506f9a1a
  431. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0801
  432. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040e
  433. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=12
  434. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=06
  435. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a07
  436. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a11
  437. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a1a
  438. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=1101
  439. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=1102
  440. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0505
  441. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0500
  442. nl80211: Connect (ifindex=3)
  443. * bssid_hint=b0:b8:67:ef:d9:11
  444. * freq_hint=5745
  445. * SSID - hexdump_ascii(len=7):
  446. 65 64 75 72 6f 61 6d eduroam
  447. * IEs - hexdump(len=44): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 3b 14 7c 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82
  448. * WPA Versions 0x2
  449. * pairwise=0xfac04
  450. * group=0xfac04
  451. * akm=0xfac01
  452. * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  453. * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  454. * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
  455. * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
  456. * Auth Type 0
  457. nl80211: Connect request send successfully
  458. wlan0: Setting authentication timeout: 10 sec 0 usec
  459. EAPOL: External notification - EAP success=0
  460. EAPOL: External notification - EAP fail=0
  461. EAPOL: External notification - portControl=Auto
  462. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=46
  463. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  464. wlan0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00)
  465. nl80211: Ignored event (cmd=46) for foreign interface (ifindex 3 wdev 0x0)
  466. nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlan0
  467. nl80211: Connect event (status=0 ignore_next_local_disconnect=0)
  468. nl80211: Associated on 5745 MHz
  469. nl80211: Associated with b0:b8:67:ef:d9:11
  470. nl80211: Operating frequency for the associated BSS from scan results: 5745 MHz
  471. nl80211: Associated on 5745 MHz
  472. nl80211: Associated with b0:b8:67:ef:d9:11
  473. nl80211: Set drv->ssid based on scan res info to 'eduroam'
  474. wlan0: Event ASSOC (0) received
  475. wlan0: Association info event
  476. req_ies - hexdump(len=130): 00 07 65 64 75 72 6f 61 6d 01 05 24 b0 c8 60 6c 21 02 03 e0 24 0a 24 04 34 04 64 0c 95 04 a5 01 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 2d 1a 63 00 17 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 08 00 00 00 00 40 bf 0c 32 50 80 0f fe ff 00 00 fe ff 00 00 dd 09 00 10 18 02 00 00 10 00 00 dd 07 00 50 f2 02 00 01 00 01 00 00 ff
  477. resp_ies - hexdump(len=122): 01 05 24 b0 c8 60 6c 2d 1a ef 09 1b ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 95 05 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 bf 0c 91 79 8b 33 aa ff 00 00 aa ff 00 00 c0 05 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 00 fe ff 00 00 dd
  478. IEEE 802.11 element parse failed (id=0 elen=254 left=4)
  479. wlan0: freq=5745 MHz
  480. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  481. Truncated IE in assoc_info - hexdump(len=6): 00 fe ff 00 00 dd
  482. FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
  483. wlan0: State: ASSOCIATING -> ASSOCIATED
  484. nl80211: Set wlan0 operstate 0->0 (DORMANT)
  485. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  486. wlan0: Determining shared radio frequencies (max len 2)
  487. wlan0: Shared frequencies (len=1): completed iteration
  488. wlan0: freq[0]: 5745, flags=0x1
  489. P2P: Add operating class 81
  490. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  491. P2P: Add operating class 115
  492. P2P: Channels - hexdump(len=4): 24 28 2c 30
  493. P2P: Add operating class 116
  494. P2P: Channels - hexdump(len=2): 24 2c
  495. P2P: Add operating class 117
  496. P2P: Channels - hexdump(len=2): 28 30
  497. P2P: Add operating class 124
  498. P2P: Channels - hexdump(len=4): 95 99 9d a1
  499. P2P: Add operating class 125
  500. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  501. P2P: Add operating class 126
  502. P2P: Channels - hexdump(len=2): 95 9d
  503. P2P: Add operating class 127
  504. P2P: Channels - hexdump(len=2): 99 a1
  505. P2P: Add operating class 128
  506. P2P: Channels - hexdump(len=4): 24 28 2c 30
  507. P2P: Add operating class 130
  508. P2P: Channels - hexdump(len=4): 24 28 2c 30
  509. P2P: Update channel list
  510. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  511. P2P: cli_channels:
  512. wlan0: Associated to a new BSS: BSSID=b0:b8:67:ef:d9:11
  513. wlan0: WPA: clearing AP WPA IE
  514. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
  515. wlan0: Associated with b0:b8:67:ef:d9:11
  516. wlan0: WPA: Association event - clear replay counter
  517. wlan0: WPA: Clear old PTK
  518. TDLS: Remove peers on association
  519. EAPOL: External notification - portEnabled=0
  520. EAPOL: External notification - portValid=0
  521. EAPOL: External notification - portEnabled=1
  522. EAPOL: SUPP_PAE entering state CONNECTING
  523. EAPOL: enable timer tick
  524. EAPOL: SUPP_BE entering state IDLE
  525. EAP: EAP entering state INITIALIZE
  526. EAP: EAP entering state IDLE
  527. wlan0: Setting authentication timeout: 10 sec 0 usec
  528. wlan0: Cancelling scan request
  529. EAPOL: External notification - portValid=1
  530. wlan0: Process pending EAPOL frame that was received just before association notification
  531. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  532. wlan0: Setting authentication timeout: 70 sec 0 usec
  533. EAPOL: Received EAP-Packet frame
  534. EAPOL: SUPP_PAE entering state RESTART
  535. EAP: EAP entering state INITIALIZE
  536. EAP: EAP entering state IDLE
  537. EAPOL: SUPP_PAE entering state AUTHENTICATING
  538. EAPOL: SUPP_BE entering state REQUEST
  539. EAPOL: getSuppRsp
  540. EAP: EAP entering state RECEIVED
  541. EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
  542. EAP: EAP entering state IDENTITY
  543. wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
  544. EAP: Status notification: started (param=)
  545. EAP: EAP-Request Identity data - hexdump_ascii(len=0):
  546. EAP: using real identity - hexdump_ascii(len=24):
  547. [OMITTED]
  548. EAP: EAP entering state SEND_RESPONSE
  549. EAP: EAP entering state IDLE
  550. EAPOL: SUPP_BE entering state RESPONSE
  551. EAPOL: txSuppRsp
  552. TX EAPOL: dst=b0:b8:67:ef:d9:11
  553. EAPOL: SUPP_BE entering state RECEIVE
  554. wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
  555. RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  556. RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  557. RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  558. nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for p2p-dev-wlan0
  559. nl80211: Regulatory domain change
  560. * initiator=3
  561. * type=0
  562. * alpha2=US
  563. p2p-dev-wlan0: Event CHANNEL_LIST_CHANGED (27) received
  564. wlan0: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=US
  565. p2p-dev-wlan0: Updating hw mode
  566. nl80211: Regulatory information - country=US (DFS-FCC)
  567. nl80211: 2402-2472 @ 40 MHz 30 mBm
  568. nl80211: 5170-5250 @ 80 MHz 23 mBm
  569. nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
  570. nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
  571. nl80211: 5735-5835 @ 80 MHz 30 mBm
  572. nl80211: 57240-63720 @ 2160 MHz 40 mBm
  573. nl80211: Added 802.11b mode based on 802.11g information
  574. nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  575. nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
  576. nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  577. wlan0: Updating hw mode
  578. nl80211: Regulatory information - country=US (DFS-FCC)
  579. nl80211: 2402-2472 @ 40 MHz 30 mBm
  580. nl80211: 5170-5250 @ 80 MHz 23 mBm
  581. nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
  582. nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
  583. nl80211: 5735-5835 @ 80 MHz 30 mBm
  584. nl80211: 57240-63720 @ 2160 MHz 40 mBm
  585. nl80211: Added 802.11b mode based on 802.11g information
  586. nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  587. nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
  588. nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  589. p2p-dev-wlan0: Determining shared radio frequencies (max len 2)
  590. p2p-dev-wlan0: Shared frequencies (len=1): completed iteration
  591. p2p-dev-wlan0: freq[0]: 5745, flags=0x1
  592. P2P: Add operating class 81
  593. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  594. P2P: Add operating class 115
  595. P2P: Channels - hexdump(len=4): 24 28 2c 30
  596. P2P: Add operating class 116
  597. P2P: Channels - hexdump(len=2): 24 2c
  598. P2P: Add operating class 117
  599. P2P: Channels - hexdump(len=2): 28 30
  600. P2P: Add operating class 124
  601. P2P: Channels - hexdump(len=4): 95 99 9d a1
  602. P2P: Add operating class 125
  603. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  604. P2P: Add operating class 126
  605. P2P: Channels - hexdump(len=2): 95 9d
  606. P2P: Add operating class 127
  607. P2P: Channels - hexdump(len=2): 99 a1
  608. P2P: Add operating class 128
  609. P2P: Channels - hexdump(len=4): 24 28 2c 30
  610. P2P: Add operating class 130
  611. P2P: Channels - hexdump(len=4): 24 28 2c 30
  612. P2P: Update channel list
  613. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  614. P2P: cli_channels:
  615. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=46
  616. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  617. EAPOL: Received EAP-Packet frame
  618. EAPOL: SUPP_BE entering state REQUEST
  619. EAPOL: getSuppRsp
  620. EAP: EAP entering state RECEIVED
  621. EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
  622. EAP: EAP entering state GET_METHOD
  623. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
  624. EAP: Status notification: accept proposed method (param=PEAP)
  625. EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
  626. TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
  627. TLS: using phase1 config options
  628. wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
  629. EAP: EAP entering state METHOD
  630. SSL: Received packet(len=6) - Flags 0x21
  631. EAP-PEAP: Start (server ver=1, own ver=1)
  632. EAP-PEAP: Using PEAP version 1
  633. SSL: (where=0x10 ret=0x1)
  634. SSL: (where=0x1001 ret=0x1)
  635. SSL: SSL_connect:before SSL initialization
  636. OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
  637. OpenSSL: TX ver=0x303 content_type=22 (handshake/client hello)
  638. SSL: (where=0x1001 ret=0x1)
  639. SSL: SSL_connect:SSLv3/TLS write client hello
  640. SSL: (where=0x1002 ret=0xffffffff)
  641. SSL: SSL_connect:error in SSLv3/TLS write client hello
  642. SSL: SSL_connect - want more data
  643. SSL: 190 bytes pending from ssl_out
  644. SSL: Using TLS version TLSv1.2
  645. SSL: 190 bytes left to be sent out (of total 190 bytes)
  646. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e0a7a0
  647. EAP: EAP entering state SEND_RESPONSE
  648. EAP: EAP entering state IDLE
  649. EAPOL: SUPP_BE entering state RESPONSE
  650. EAPOL: txSuppRsp
  651. TX EAPOL: dst=b0:b8:67:ef:d9:11
  652. EAPOL: SUPP_BE entering state RECEIVE
  653. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1038
  654. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  655. EAPOL: Received EAP-Packet frame
  656. EAPOL: SUPP_BE entering state REQUEST
  657. EAPOL: getSuppRsp
  658. EAP: EAP entering state RECEIVED
  659. EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
  660. EAP: EAP entering state METHOD
  661. SSL: Received packet(len=1034) - Flags 0xc1
  662. SSL: TLS Message Length: 6430
  663. SSL: Need 5406 bytes more input data
  664. SSL: Building ACK (type=25 id=3 ver=1)
  665. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e09100
  666. EAP: EAP entering state SEND_RESPONSE
  667. EAP: EAP entering state IDLE
  668. EAPOL: SUPP_BE entering state RESPONSE
  669. EAPOL: txSuppRsp
  670. TX EAPOL: dst=b0:b8:67:ef:d9:11
  671. EAPOL: SUPP_BE entering state RECEIVE
  672. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1034
  673. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  674. EAPOL: Received EAP-Packet frame
  675. EAPOL: SUPP_BE entering state REQUEST
  676. EAPOL: getSuppRsp
  677. EAP: EAP entering state RECEIVED
  678. EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
  679. EAP: EAP entering state METHOD
  680. SSL: Received packet(len=1030) - Flags 0x41
  681. SSL: Need 4382 bytes more input data
  682. SSL: Building ACK (type=25 id=4 ver=1)
  683. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e09100
  684. EAP: EAP entering state SEND_RESPONSE
  685. EAP: EAP entering state IDLE
  686. EAPOL: SUPP_BE entering state RESPONSE
  687. EAPOL: txSuppRsp
  688. TX EAPOL: dst=b0:b8:67:ef:d9:11
  689. EAPOL: SUPP_BE entering state RECEIVE
  690. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1034
  691. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  692. EAPOL: Received EAP-Packet frame
  693. EAPOL: SUPP_BE entering state REQUEST
  694. EAPOL: getSuppRsp
  695. EAP: EAP entering state RECEIVED
  696. EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0
  697. EAP: EAP entering state METHOD
  698. SSL: Received packet(len=1030) - Flags 0x41
  699. SSL: Need 3358 bytes more input data
  700. SSL: Building ACK (type=25 id=5 ver=1)
  701. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e09100
  702. EAP: EAP entering state SEND_RESPONSE
  703. EAP: EAP entering state IDLE
  704. EAPOL: SUPP_BE entering state RESPONSE
  705. EAPOL: txSuppRsp
  706. TX EAPOL: dst=b0:b8:67:ef:d9:11
  707. EAPOL: SUPP_BE entering state RECEIVE
  708. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1034
  709. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  710. EAPOL: Received EAP-Packet frame
  711. EAPOL: SUPP_BE entering state REQUEST
  712. EAPOL: getSuppRsp
  713. EAP: EAP entering state RECEIVED
  714. EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0
  715. EAP: EAP entering state METHOD
  716. SSL: Received packet(len=1030) - Flags 0x41
  717. SSL: Need 2334 bytes more input data
  718. SSL: Building ACK (type=25 id=6 ver=1)
  719. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e09100
  720. EAP: EAP entering state SEND_RESPONSE
  721. EAP: EAP entering state IDLE
  722. EAPOL: SUPP_BE entering state RESPONSE
  723. EAPOL: txSuppRsp
  724. TX EAPOL: dst=b0:b8:67:ef:d9:11
  725. EAPOL: SUPP_BE entering state RECEIVE
  726. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1034
  727. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  728. EAPOL: Received EAP-Packet frame
  729. EAPOL: SUPP_BE entering state REQUEST
  730. EAPOL: getSuppRsp
  731. EAP: EAP entering state RECEIVED
  732. EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0
  733. EAP: EAP entering state METHOD
  734. SSL: Received packet(len=1030) - Flags 0x41
  735. SSL: Need 1310 bytes more input data
  736. SSL: Building ACK (type=25 id=7 ver=1)
  737. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e09100
  738. EAP: EAP entering state SEND_RESPONSE
  739. EAP: EAP entering state IDLE
  740. EAPOL: SUPP_BE entering state RESPONSE
  741. EAPOL: txSuppRsp
  742. TX EAPOL: dst=b0:b8:67:ef:d9:11
  743. EAPOL: SUPP_BE entering state RECEIVE
  744. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1034
  745. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  746. EAPOL: Received EAP-Packet frame
  747. EAPOL: SUPP_BE entering state REQUEST
  748. EAPOL: getSuppRsp
  749. EAP: EAP entering state RECEIVED
  750. EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0
  751. EAP: EAP entering state METHOD
  752. SSL: Received packet(len=1030) - Flags 0x41
  753. SSL: Need 286 bytes more input data
  754. SSL: Building ACK (type=25 id=8 ver=1)
  755. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e09100
  756. EAP: EAP entering state SEND_RESPONSE
  757. EAP: EAP entering state IDLE
  758. EAPOL: SUPP_BE entering state RESPONSE
  759. EAPOL: txSuppRsp
  760. TX EAPOL: dst=b0:b8:67:ef:d9:11
  761. EAPOL: SUPP_BE entering state RECEIVE
  762. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=296
  763. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  764. EAPOL: Received EAP-Packet frame
  765. EAPOL: SUPP_BE entering state REQUEST
  766. EAPOL: getSuppRsp
  767. EAP: EAP entering state RECEIVED
  768. EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0
  769. EAP: EAP entering state METHOD
  770. SSL: Received packet(len=292) - Flags 0x01
  771. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  772. SSL: (where=0x1001 ret=0x1)
  773. SSL: SSL_connect:SSLv3/TLS write client hello
  774. OpenSSL: RX ver=0x303 content_type=22 (handshake/server hello)
  775. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  776. SSL: (where=0x1001 ret=0x1)
  777. SSL: SSL_connect:SSLv3/TLS read server hello
  778. OpenSSL: RX ver=0x303 content_type=22 (handshake/certificate)
  779. TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=3 buf='/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=AAA Certificate Services'
  780. wlan0: CTRL-EVENT-EAP-PEER-CERT depth=3 subject='/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=AAA Certificate Services' hash=d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef4
  781. TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=3 buf='/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=AAA Certificate Services'
  782. wlan0: CTRL-EVENT-EAP-PEER-CERT depth=3 subject='/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=AAA Certificate Services' hash=d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef4
  783. TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=2 buf='/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority'
  784. wlan0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority' hash=68b9c761219a5b1f0131784474665db61bbdb109e00f05ca9f74244ee5f5f52b
  785. TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=1 buf='/C=US/ST=MI/L=Ann Arbor/O=Internet2/OU=InCommon/CN=InCommon RSA Server CA'
  786. wlan0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=US/ST=MI/L=Ann Arbor/O=Internet2/OU=InCommon/CN=InCommon RSA Server CA' hash=0a05c462756390dd1f1d5dd82794c300f04be789dce76d7e312f790d68fd385a
  787. TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=0 buf='[OMITTED]
  788. wlan0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='[OMITTED]hash=74e40048dc2c07b1b5498b2792ceb62b976cc29d5c704d0426cedbccb49a8e31
  789. wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:clearpass.[OMITTED].edu
  790. wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:clearpass-cra.[OMITTED].edu
  791. wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:clearpass-hv.[OMITTED].edu
  792. wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:clearpass-tel-2.[OMITTED].edu
  793. wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:clearpass-tel.[OMITTED].edu
  794. EAP: Status notification: remote certificate verification (param=success)
  795. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  796. SSL: (where=0x1001 ret=0x1)
  797. SSL: SSL_connect:SSLv3/TLS read server certificate
  798. OpenSSL: RX ver=0x303 content_type=22 (handshake/server key exchange)
  799. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  800. SSL: (where=0x1001 ret=0x1)
  801. SSL: SSL_connect:SSLv3/TLS read server key exchange
  802. OpenSSL: RX ver=0x303 content_type=22 (handshake/server hello done)
  803. SSL: (where=0x1001 ret=0x1)
  804. SSL: SSL_connect:SSLv3/TLS read server done
  805. OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
  806. OpenSSL: TX ver=0x303 content_type=22 (handshake/client key exchange)
  807. SSL: (where=0x1001 ret=0x1)
  808. SSL: SSL_connect:SSLv3/TLS write client key exchange
  809. OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
  810. OpenSSL: TX ver=0x303 content_type=20 (change cipher spec/)
  811. SSL: (where=0x1001 ret=0x1)
  812. SSL: SSL_connect:SSLv3/TLS write change cipher spec
  813. OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
  814. OpenSSL: TX ver=0x303 content_type=22 (handshake/finished)
  815. SSL: (where=0x1001 ret=0x1)
  816. SSL: SSL_connect:SSLv3/TLS write finished
  817. SSL: (where=0x1002 ret=0xffffffff)
  818. SSL: SSL_connect:error in SSLv3/TLS write finished
  819. SSL: SSL_connect - want more data
  820. SSL: 126 bytes pending from ssl_out
  821. SSL: Using TLS version TLSv1.2
  822. SSL: 126 bytes left to be sent out (of total 126 bytes)
  823. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1df80a0
  824. EAP: EAP entering state SEND_RESPONSE
  825. EAP: EAP entering state IDLE
  826. EAPOL: SUPP_BE entering state RESPONSE
  827. EAPOL: txSuppRsp
  828. TX EAPOL: dst=b0:b8:67:ef:d9:11
  829. EAPOL: SUPP_BE entering state RECEIVE
  830. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=65
  831. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  832. EAPOL: Received EAP-Packet frame
  833. EAPOL: SUPP_BE entering state REQUEST
  834. EAPOL: getSuppRsp
  835. EAP: EAP entering state RECEIVED
  836. EAP: Received EAP-Request id=10 method=25 vendor=0 vendorMethod=0
  837. EAP: EAP entering state METHOD
  838. SSL: Received packet(len=61) - Flags 0x81
  839. SSL: TLS Message Length: 51
  840. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  841. SSL: (where=0x1001 ret=0x1)
  842. SSL: SSL_connect:SSLv3/TLS write finished
  843. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  844. SSL: (where=0x1001 ret=0x1)
  845. SSL: SSL_connect:SSLv3/TLS read change cipher spec
  846. OpenSSL: RX ver=0x303 content_type=22 (handshake/finished)
  847. SSL: (where=0x1001 ret=0x1)
  848. SSL: SSL_connect:SSLv3/TLS read finished
  849. SSL: (where=0x20 ret=0x1)
  850. SSL: (where=0x1002 ret=0x1)
  851. SSL: 0 bytes pending from ssl_out
  852. OpenSSL: Handshake finished - resumed=0
  853. SSL: No Application Data included
  854. SSL: Using TLS version TLSv1.2
  855. SSL: No data to be sent out
  856. EAP-PEAP: TLS done, proceed to Phase 2
  857. EAP-PEAP: using label 'client EAP encryption' in key derivation
  858. EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
  859. EAP-PEAP: Derived Session-Id - hexdump(len=65): 19 4b 88 f0 dc b7 2b ff ae 99 2c fc 40 34 22 84 79 f5 d4 1c a7 3e 67 78 5f eb e0 1e 58 23 26 ce 91 38 da 14 85 b3 bd 75 38 52 07 66 b3 1e 82 92 d4 c5 a0 e8 fb 0e 0c 89 2e b1 87 c6 48 b3 b5 ee 53
  860. SSL: Building ACK (type=25 id=10 ver=1)
  861. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e261c0
  862. EAP: EAP entering state SEND_RESPONSE
  863. EAP: EAP entering state IDLE
  864. EAPOL: SUPP_BE entering state RESPONSE
  865. EAPOL: txSuppRsp
  866. TX EAPOL: dst=b0:b8:67:ef:d9:11
  867. EAPOL: SUPP_BE entering state RECEIVE
  868. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=46
  869. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  870. EAPOL: Received EAP-Packet frame
  871. EAPOL: SUPP_BE entering state REQUEST
  872. EAPOL: getSuppRsp
  873. EAP: EAP entering state RECEIVED
  874. EAP: Received EAP-Request id=11 method=25 vendor=0 vendorMethod=0
  875. EAP: EAP entering state METHOD
  876. SSL: Received packet(len=40) - Flags 0x01
  877. EAP-PEAP: received 34 bytes encrypted data for Phase 2
  878. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  879. EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 0b 00 05 01
  880. EAP-PEAP: received Phase 2: code=1 identifier=11 length=5
  881. EAP-PEAP: Phase 2 Request: type=1
  882. EAP: using real identity - hexdump_ascii(len=24):
  883. [OMITTED]
  884. EAP-PEAP: Encrypting Phase 2 data - hexdump(len=29): [REMOVED]
  885. OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
  886. SSL: 58 bytes left to be sent out (of total 58 bytes)
  887. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e1b5a8
  888. EAP: EAP entering state SEND_RESPONSE
  889. EAP: EAP entering state IDLE
  890. EAPOL: SUPP_BE entering state RESPONSE
  891. EAPOL: txSuppRsp
  892. TX EAPOL: dst=b0:b8:67:ef:d9:11
  893. EAPOL: SUPP_BE entering state RECEIVE
  894. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=89
  895. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  896. EAPOL: Received EAP-Packet frame
  897. EAPOL: SUPP_BE entering state REQUEST
  898. EAPOL: getSuppRsp
  899. EAP: EAP entering state RECEIVED
  900. EAP: Received EAP-Request id=12 method=25 vendor=0 vendorMethod=0
  901. EAP: EAP entering state METHOD
  902. SSL: Received packet(len=85) - Flags 0x01
  903. EAP-PEAP: received 79 bytes encrypted data for Phase 2
  904. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  905. EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=50): 01 0c 00 32 1a 01 0c 00 2d 10 4c 00 ee 90 e5 f4 48 64 db 81 58 f6 77 f0 af 22 72 6f 68 72 65 72 67 6a 40 72 6f 73 65 2d 68 75 6c 6d 61 6e 2e 65 64 75
  906. EAP-PEAP: received Phase 2: code=1 identifier=12 length=50
  907. EAP-PEAP: Phase 2 Request: type=26
  908. EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26
  909. EAP-MSCHAPV2: RX identifier 12 mschapv2_id 12
  910. EAP-MSCHAPV2: Received challenge
  911. EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=24):
  912. [OMITTED]
  913. EAP-MSCHAPV2: Generating Challenge Response
  914. MSCHAPV2: Identity - hexdump_ascii(len=24):
  915. [OMITTED]
  916. MSCHAPV2: Username - hexdump_ascii(len=24):
  917. [OMITTED]
  918. MSCHAPV2: auth_challenge - hexdump(len=16): 4c 00 ee 90 e5 f4 48 64 db 81 58 f6 77 f0 af 22
  919. MSCHAPV2: peer_challenge - hexdump(len=16): 94 6a a6 6b b6 1a 1a d2 b7 56 b6 a5 e4 50 71 23
  920. MSCHAPV2: username - hexdump_ascii(len=24):
  921. [OMITTED]
  922. MSCHAPV2: password hash - hexdump(len=16): [REMOVED]
  923. MSCHAPV2: NT Response - hexdump(len=24): 9f 09 e2 70 e1 4c 68 77 02 f1 72 6e 48 c8 37 09 5e ca 3a 54 f1 ac 2b c3
  924. MSCHAPV2: Auth Response - hexdump(len=20): 3c dc ab 4a 9c 3c d5 50 3b 59 b8 58 76 97 a2 87 65 a3 ad fe
  925. MSCHAPV2: Master Key - hexdump(len=16): [REMOVED]
  926. EAP-MSCHAPV2: TX identifier 12 mschapv2_id 12 (response)
  927. EAP-PEAP: Encrypting Phase 2 data - hexdump(len=83): [REMOVED]
  928. OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
  929. SSL: 112 bytes left to be sent out (of total 112 bytes)
  930. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e1b5e0
  931. EAP: EAP entering state SEND_RESPONSE
  932. EAP: EAP entering state IDLE
  933. EAPOL: SUPP_BE entering state RESPONSE
  934. EAPOL: txSuppRsp
  935. TX EAPOL: dst=b0:b8:67:ef:d9:11
  936. EAPOL: SUPP_BE entering state RECEIVE
  937. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=90
  938. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  939. EAPOL: Received EAP-Packet frame
  940. EAPOL: SUPP_BE entering state REQUEST
  941. EAPOL: getSuppRsp
  942. EAP: EAP entering state RECEIVED
  943. EAP: Received EAP-Request id=13 method=25 vendor=0 vendorMethod=0
  944. EAP: EAP entering state METHOD
  945. SSL: Received packet(len=86) - Flags 0x01
  946. EAP-PEAP: received 80 bytes encrypted data for Phase 2
  947. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  948. EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=51): 01 0d 00 33 1a 03 0c 00 2e 53 3d 33 43 44 43 41 42 34 41 39 43 33 43 44 35 35 30 33 42 35 39 42 38 35 38 37 36 39 37 41 32 38 37 36 35 41 33 41 44 46 45
  949. EAP-PEAP: received Phase 2: code=1 identifier=13 length=51
  950. EAP-PEAP: Phase 2 Request: type=26
  951. EAP-MSCHAPV2: RX identifier 13 mschapv2_id 12
  952. EAP-MSCHAPV2: Received success
  953. EAP-MSCHAPV2: Success message - hexdump_ascii(len=0):
  954. EAP-MSCHAPV2: Authentication succeeded
  955. EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED]
  956. OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
  957. SSL: 35 bytes left to be sent out (of total 35 bytes)
  958. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e239e8
  959. EAP: Session-Id - hexdump(len=65): 19 4b 88 f0 dc b7 2b ff ae 99 2c fc 40 34 22 84 79 f5 d4 1c a7 3e 67 78 5f eb e0 1e 58 23 26 ce 91 38 da 14 85 b3 bd 75 38 52 07 66 b3 1e 82 92 d4 c5 a0 e8 fb 0e 0c 89 2e b1 87 c6 48 b3 b5 ee 53
  960. EAP: EAP entering state SEND_RESPONSE
  961. EAP: EAP entering state IDLE
  962. EAPOL: SUPP_BE entering state RESPONSE
  963. EAPOL: txSuppRsp
  964. TX EAPOL: dst=b0:b8:67:ef:d9:11
  965. EAPOL: SUPP_BE entering state RECEIVE
  966. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=50
  967. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  968. EAPOL: Received EAP-Packet frame
  969. EAPOL: SUPP_BE entering state REQUEST
  970. EAPOL: getSuppRsp
  971. EAP: EAP entering state RECEIVED
  972. EAP: Received EAP-Request id=14 method=25 vendor=0 vendorMethod=0
  973. EAP: EAP entering state METHOD
  974. SSL: Received packet(len=46) - Flags 0x01
  975. EAP-PEAP: received 40 bytes encrypted data for Phase 2
  976. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  977. EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 0e 00 0b 21 80 03 00 02 00 01
  978. EAP-PEAP: received Phase 2: code=1 identifier=14 length=11
  979. EAP-PEAP: Phase 2 Request: type=33
  980. EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01
  981. EAP-TLV: Result TLV - hexdump(len=2): 00 01
  982. EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed
  983. EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED]
  984. OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
  985. SSL: 40 bytes left to be sent out (of total 40 bytes)
  986. EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC eapRespData=0x1e1b670
  987. EAP: Session-Id - hexdump(len=65): 19 4b 88 f0 dc b7 2b ff ae 99 2c fc 40 34 22 84 79 f5 d4 1c a7 3e 67 78 5f eb e0 1e 58 23 26 ce 91 38 da 14 85 b3 bd 75 38 52 07 66 b3 1e 82 92 d4 c5 a0 e8 fb 0e 0c 89 2e b1 87 c6 48 b3 b5 ee 53
  988. EAP: EAP entering state SEND_RESPONSE
  989. EAP: EAP entering state IDLE
  990. EAPOL: SUPP_BE entering state RESPONSE
  991. EAPOL: txSuppRsp
  992. TX EAPOL: dst=b0:b8:67:ef:d9:11
  993. EAPOL: SUPP_BE entering state RECEIVE
  994. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=46
  995. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  996. EAPOL: Received EAP-Packet frame
  997. EAPOL: SUPP_BE entering state REQUEST
  998. EAPOL: getSuppRsp
  999. EAP: EAP entering state RECEIVED
  1000. EAP: Received EAP-Success
  1001. EAP: Status notification: completion (param=success)
  1002. EAP: EAP entering state SUCCESS
  1003. wlan0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
  1004. EAPOL: SUPP_PAE entering state AUTHENTICATED
  1005. EAPOL: Supplicant port status: Authorized
  1006. nl80211: Set supplicant port authorized for b0:b8:67:ef:d9:11
  1007. EAPOL: SUPP_BE entering state RECEIVE
  1008. EAPOL: SUPP_BE entering state SUCCESS
  1009. EAPOL: SUPP_BE entering state IDLE
  1010. EAPOL authentication completed - result=SUCCESS
  1011. Configure PMK for driver-based RSN 4-way handshake
  1012. EAPOL: Successfully fetched key (len=32)
  1013. RSN: Configure PMK for driver-based 4-way handshake - hexdump(len=32): [REMOVED]
  1014. wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=5 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=32
  1015. nl80211: Set PMK to the driver for b0:b8:67:ef:d9:11
  1016. nl80211: PMK - hexdump(len=32): [REMOVED]
  1017. nl80211: Set PMK failed: ret=-22 (Invalid argument)
  1018. Failed to set PMK to the driver
  1019. wlan0: Cancelling scan request
  1020. wlan0: Cancelling authentication timeout
  1021. wlan0: State: ASSOCIATED -> COMPLETED
  1022. wlan0: Radio work 'connect'@0x1dff250 done in 3.088286 seconds
  1023. wlan0: radio_work_free('connect'@0x1dff250): num_active_works --> 0
  1024. wlan0: CTRL-EVENT-CONNECTED - Connection to b0:b8:67:ef:d9:11 completed [id=0 id_str=]
  1025. nl80211: Set wlan0 operstate 0->1 (UP)
  1026. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
  1027. wlan0: Determining shared radio frequencies (max len 2)
  1028. wlan0: Shared frequencies (len=1): completed iteration
  1029. wlan0: freq[0]: 5745, flags=0x1
  1030. P2P: Add operating class 81
  1031. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  1032. P2P: Add operating class 115
  1033. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1034. P2P: Add operating class 116
  1035. P2P: Channels - hexdump(len=2): 24 2c
  1036. P2P: Add operating class 117
  1037. P2P: Channels - hexdump(len=2): 28 30
  1038. P2P: Add operating class 124
  1039. P2P: Channels - hexdump(len=4): 95 99 9d a1
  1040. P2P: Add operating class 125
  1041. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  1042. P2P: Add operating class 126
  1043. P2P: Channels - hexdump(len=2): 95 9d
  1044. P2P: Add operating class 127
  1045. P2P: Channels - hexdump(len=2): 99 a1
  1046. P2P: Add operating class 128
  1047. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1048. P2P: Add operating class 130
  1049. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1050. P2P: Update channel list
  1051. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  1052. P2P: cli_channels:
  1053. RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  1054. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=121
  1055. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  1056. EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
  1057. EAPOL: External notification - portValid=1
  1058. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=121
  1059. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  1060. EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
  1061. EAPOL: External notification - portValid=1
  1062. EAPOL: startWhen --> 0
  1063. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=121
  1064. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  1065. EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
  1066. EAPOL: External notification - portValid=1
  1067. RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
  1068. nl80211: Ignored event (cmd=48) for foreign interface (ifindex 3 wdev 0x0)
  1069. nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlan0
  1070. nl80211: Disconnect event
  1071. wlan0: Event DEAUTH (11) received
  1072. wlan0: Deauthentication notification
  1073. wlan0: * reason 3
  1074. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  1075. wlan0: CTRL-EVENT-DISCONNECTED bssid=b0:b8:67:ef:d9:11 reason=3
  1076. wlan0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9)
  1077. wlan0: Setting scan request: 0.100000 sec
  1078. Added BSSID b0:b8:67:ef:d9:11 into blacklist
  1079. wlan0: Another BSS in this ESS has been seen; try it next
  1080. BSSID b0:b8:67:ef:d9:11 blacklist count incremented to 2
  1081. wlan0: Blacklist count 1 --> request scan in 100 ms
  1082. wlan0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner
  1083. TDLS: Remove peers on disassociation
  1084. wlan0: WPA: Clear old PMK and PTK
  1085. wlan0: Disconnect event - remove keys
  1086. wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  1087. wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x1ddc304 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1088. addr=b0:b8:67:ef:d9:11
  1089. nl80211: Data frame filter flags=0x0
  1090. wlan0: State: COMPLETED -> DISCONNECTED
  1091. nl80211: Set wlan0 operstate 1->0 (DORMANT)
  1092. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  1093. wlan0: Determining shared radio frequencies (max len 2)
  1094. wlan0: Shared frequencies (len=0): completed iteration
  1095. P2P: Add operating class 81
  1096. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  1097. P2P: Add operating class 115
  1098. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1099. P2P: Add operating class 116
  1100. P2P: Channels - hexdump(len=2): 24 2c
  1101. P2P: Add operating class 117
  1102. P2P: Channels - hexdump(len=2): 28 30
  1103. P2P: Add operating class 124
  1104. P2P: Channels - hexdump(len=4): 95 99 9d a1
  1105. P2P: Add operating class 125
  1106. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  1107. P2P: Add operating class 126
  1108. P2P: Channels - hexdump(len=2): 95 9d
  1109. P2P: Add operating class 127
  1110. P2P: Channels - hexdump(len=2): 99 a1
  1111. P2P: Add operating class 128
  1112. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1113. P2P: Add operating class 130
  1114. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1115. P2P: Update channel list
  1116. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  1117. P2P: cli_channels:
  1118. EAPOL: External notification - portEnabled=0
  1119. EAPOL: SUPP_PAE entering state DISCONNECTED
  1120. EAPOL: Supplicant port status: Unauthorized
  1121. nl80211: Skip set_supp_port(unauthorized) while not associated
  1122. EAPOL: SUPP_BE entering state INITIALIZE
  1123. EAP: EAP entering state DISABLED
  1124. EAPOL: External notification - portValid=0
  1125. RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
  1126. nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for p2p-dev-wlan0
  1127. nl80211: Regulatory domain change
  1128. * initiator=0
  1129. * type=1
  1130. p2p-dev-wlan0: Event CHANNEL_LIST_CHANGED (27) received
  1131. wlan0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
  1132. p2p-dev-wlan0: Updating hw mode
  1133. nl80211: Regulatory information - country=US (DFS-FCC)
  1134. nl80211: 2402-2472 @ 40 MHz 30 mBm
  1135. nl80211: 5170-5250 @ 80 MHz 23 mBm
  1136. nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
  1137. nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
  1138. nl80211: 5735-5835 @ 80 MHz 30 mBm
  1139. nl80211: 57240-63720 @ 2160 MHz 40 mBm
  1140. nl80211: Added 802.11b mode based on 802.11g information
  1141. nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  1142. nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
  1143. nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  1144. wlan0: Updating hw mode
  1145. nl80211: Regulatory information - country=US (DFS-FCC)
  1146. nl80211: 2402-2472 @ 40 MHz 30 mBm
  1147. nl80211: 5170-5250 @ 80 MHz 23 mBm
  1148. nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
  1149. nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
  1150. nl80211: 5735-5835 @ 80 MHz 30 mBm
  1151. nl80211: 57240-63720 @ 2160 MHz 40 mBm
  1152. nl80211: Added 802.11b mode based on 802.11g information
  1153. nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  1154. nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
  1155. nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  1156. p2p-dev-wlan0: Determining shared radio frequencies (max len 2)
  1157. p2p-dev-wlan0: Shared frequencies (len=0): completed iteration
  1158. P2P: Add operating class 81
  1159. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  1160. P2P: Add operating class 115
  1161. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1162. P2P: Add operating class 116
  1163. P2P: Channels - hexdump(len=2): 24 2c
  1164. P2P: Add operating class 117
  1165. P2P: Channels - hexdump(len=2): 28 30
  1166. P2P: Add operating class 124
  1167. P2P: Channels - hexdump(len=4): 95 99 9d a1
  1168. P2P: Add operating class 125
  1169. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  1170. P2P: Add operating class 126
  1171. P2P: Channels - hexdump(len=2): 95 9d
  1172. P2P: Add operating class 127
  1173. P2P: Channels - hexdump(len=2): 99 a1
  1174. P2P: Add operating class 128
  1175. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1176. P2P: Add operating class 130
  1177. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1178. P2P: Update channel list
  1179. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  1180. P2P: cli_channels:
  1181. nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for p2p-dev-wlan0
  1182. nl80211: Regulatory domain change
  1183. * initiator=1
  1184. * type=0
  1185. * alpha2=US
  1186. p2p-dev-wlan0: Event CHANNEL_LIST_CHANGED (27) received
  1187. wlan0: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=US
  1188. p2p-dev-wlan0: Updating hw mode
  1189. nl80211: Regulatory information - country=US (DFS-FCC)
  1190. nl80211: 2402-2472 @ 40 MHz 30 mBm
  1191. nl80211: 5170-5250 @ 80 MHz 23 mBm
  1192. nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
  1193. nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
  1194. nl80211: 5735-5835 @ 80 MHz 30 mBm
  1195. nl80211: 57240-63720 @ 2160 MHz 40 mBm
  1196. nl80211: Added 802.11b mode based on 802.11g information
  1197. nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  1198. nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
  1199. nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  1200. wlan0: Updating hw mode
  1201. nl80211: Regulatory information - country=US (DFS-FCC)
  1202. nl80211: 2402-2472 @ 40 MHz 30 mBm
  1203. nl80211: 5170-5250 @ 80 MHz 23 mBm
  1204. nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
  1205. nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
  1206. nl80211: 5735-5835 @ 80 MHz 30 mBm
  1207. nl80211: 57240-63720 @ 2160 MHz 40 mBm
  1208. nl80211: Added 802.11b mode based on 802.11g information
  1209. nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  1210. nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
  1211. nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  1212. p2p-dev-wlan0: Determining shared radio frequencies (max len 2)
  1213. p2p-dev-wlan0: Shared frequencies (len=0): completed iteration
  1214. P2P: Add operating class 81
  1215. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  1216. P2P: Add operating class 115
  1217. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1218. P2P: Add operating class 116
  1219. P2P: Channels - hexdump(len=2): 24 2c
  1220. P2P: Add operating class 117
  1221. P2P: Channels - hexdump(len=2): 28 30
  1222. P2P: Add operating class 124
  1223. P2P: Channels - hexdump(len=4): 95 99 9d a1
  1224. P2P: Add operating class 125
  1225. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  1226. P2P: Add operating class 126
  1227. P2P: Channels - hexdump(len=2): 95 9d
  1228. P2P: Add operating class 127
  1229. P2P: Channels - hexdump(len=2): 99 a1
  1230. P2P: Add operating class 128
  1231. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1232. P2P: Add operating class 130
  1233. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1234. P2P: Update channel list
  1235. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  1236. P2P: cli_channels:
  1237. wlan0: State: DISCONNECTED -> SCANNING
  1238. wlan0: Determining shared radio frequencies (max len 2)
  1239. wlan0: Shared frequencies (len=0): completed iteration
  1240. P2P: Add operating class 81
  1241. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  1242. P2P: Add operating class 115
  1243. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1244. P2P: Add operating class 116
  1245. P2P: Channels - hexdump(len=2): 24 2c
  1246. P2P: Add operating class 117
  1247. P2P: Channels - hexdump(len=2): 28 30
  1248. P2P: Add operating class 124
  1249. P2P: Channels - hexdump(len=4): 95 99 9d a1
  1250. P2P: Add operating class 125
  1251. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  1252. P2P: Add operating class 126
  1253. P2P: Channels - hexdump(len=2): 95 9d
  1254. P2P: Add operating class 127
  1255. P2P: Channels - hexdump(len=2): 99 a1
  1256. P2P: Add operating class 128
  1257. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1258. P2P: Add operating class 130
  1259. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1260. P2P: Update channel list
  1261. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  1262. P2P: cli_channels:
  1263. Scan SSID - hexdump_ascii(len=7):
  1264. 65 64 75 72 6f 61 6d eduroam
  1265. wlan0: Starting AP scan for wildcard SSID
  1266. WPS: Building WPS IE for Probe Request
  1267. WPS: * Version (hardcoded 0x10)
  1268. WPS: * Request Type
  1269. WPS: * Config Methods (3148)
  1270. WPS: * UUID-E
  1271. WPS: * Primary Device Type
  1272. WPS: * RF Bands (3)
  1273. WPS: * Association State
  1274. WPS: * Configuration Error (0)
  1275. WPS: * Device Password ID (0)
  1276. WPS: * Manufacturer
  1277. WPS: * Model Name
  1278. WPS: * Model Number
  1279. WPS: * Device Name
  1280. WPS: * Version2 (0x20)
  1281. P2P: * P2P IE header
  1282. P2P: * Capability dev=25 group=00
  1283. P2P: * Listen Channel: Regulatory Class 81 Channel 6
  1284. wlan0: Optimize scan based on previously generated frequency list
  1285. wlan0: Add radio work 'scan'@0x1e238b8
  1286. wlan0: First radio work item in the queue - schedule start immediately
  1287. wlan0: Starting radio work 'scan'@0x1e238b8 after 0.000057 second wait
  1288. wlan0: nl80211: scan request
  1289. Scan requested (ret=0) - scan timeout 30 seconds
  1290. nl80211: Ignored event (cmd=33) for foreign interface (ifindex 3 wdev 0x0)
  1291. nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
  1292. wlan0: nl80211: Scan trigger
  1293. wlan0: Event SCAN_STARTED (46) received
  1294. wlan0: Own scan request started a scan in 0.000186 seconds
  1295. RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
  1296. nl80211: Ignored event (cmd=34) for foreign interface (ifindex 3 wdev 0x0)
  1297. nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
  1298. wlan0: nl80211: New scan results available
  1299. nl80211: Scan probed for SSID 'eduroam'
  1300. nl80211: Scan probed for SSID ''
  1301. nl80211: Scan included frequencies: 5200 5240 2462 2412 2437
  1302. wlan0: Event SCAN_RESULTS (3) received
  1303. wlan0: Scan completed in 0.219446 seconds
  1304. nl80211: Received scan results (18 BSSes)
  1305. wlan0: BSS: Start scan result update 2
  1306. wlan0: BSS: Add new id 16 BSSID f2:a3:b2:31:45:e3 SSID '' freq 2437
  1307. wlan0: BSS: Add new id 17 BSSID b0:b8:67:ef:47:c0 SSID 'XXX-OPEN' freq 2412
  1308. BSS: last_scan_res_used=18/32
  1309. wlan0: New scan results available (own=1 ext=0)
  1310. WPS: AP f2:a3:b2:31:45:e3 type 0 added
  1311. WPS: AP[0] f2:a3:b2:31:45:e3 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  1312. wlan0: Radio work 'scan'@0x1e238b8 done in 0.222102 seconds
  1313. wlan0: radio_work_free('scan'@0x1e238b8): num_active_works --> 0
  1314. wlan0: Selecting BSS from priority group 0
  1315. wlan0: 0: b0:b8:67:ef:d9:11 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-49 freq=5745
  1316. wlan0: skip - blacklisted (count=2 limit=0)
  1317. wlan0: 1: b0:b8:67:ed:fc:51 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-54 freq=5200
  1318. wlan0: selected based on RSN IE
  1319. wlan0: selected BSS b0:b8:67:ed:fc:51 ssid='eduroam'
  1320. wlan0: Considering connect request: reassociate: 0 selected: b0:b8:67:ed:fc:51 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x1dde570 current_ssid=(nil)
  1321. wlan0: Request association with b0:b8:67:ed:fc:51
  1322. wlan0: Re-association to the same ESS
  1323. TDLS: TDLS is allowed in the target BSS
  1324. TDLS: TDLS channel switch allowed in the target BSS
  1325. wlan0: No ongoing scan/p2p-scan found to abort
  1326. wlan0: Add radio work 'connect'@0x1e261c0
  1327. wlan0: First radio work item in the queue - schedule start immediately
  1328. RSN: Ignored PMKID candidate without preauth flag
  1329. RSN: Ignored PMKID candidate without preauth flag
  1330. RSN: Ignored PMKID candidate without preauth flag
  1331. RSN: Ignored PMKID candidate without preauth flag
  1332. RSN: Ignored PMKID candidate without preauth flag
  1333. RSN: Ignored PMKID candidate without preauth flag
  1334. RSN: Ignored PMKID candidate without preauth flag
  1335. RSN: Ignored PMKID candidate without preauth flag
  1336. p2p-dev-wlan0: Updating scan results from sibling
  1337. nl80211: Received scan results (18 BSSes)
  1338. p2p-dev-wlan0: BSS: Start scan result update 2
  1339. p2p-dev-wlan0: BSS: Add new id 16 BSSID f2:a3:b2:31:45:e3 SSID '' freq 2437
  1340. p2p-dev-wlan0: BSS: Add new id 17 BSSID b0:b8:67:ef:47:c0 SSID 'XXX-OPEN' freq 2412
  1341. BSS: last_scan_res_used=18/32
  1342. wlan0: Starting radio work 'connect'@0x1e261c0 after 0.001140 second wait
  1343. wlan0: Trying to associate with SSID 'eduroam'
  1344. wlan0: Cancelling scan request
  1345. wlan0: WPA: clearing own WPA/RSN IE
  1346. RSN: PMKSA cache search - network_ctx=0x1dde570 try_opportunistic=0 akmp=0x0
  1347. RSN: Search for BSSID b0:b8:67:ed:fc:51
  1348. RSN: No PMKSA cache entry found
  1349. wlan0: RSN: using IEEE 802.11i/D9.0
  1350. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  1351. wlan0: WPA: Selected mgmt group cipher 32
  1352. wlan0: WPA: clearing AP WPA IE
  1353. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
  1354. wlan0: WPA: using GTK CCMP
  1355. wlan0: WPA: using PTK CCMP
  1356. wlan0: WPA: using KEY_MGMT 802.1X
  1357. wlan0: WPA: not using MGMT group cipher
  1358. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  1359. WPA: No current PMKSA - clear PMK
  1360. wlan0: Automatic auth_alg selection: 0x1
  1361. Added supported operating classes IE - hexdump(len=22): 3b 14 73 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82
  1362. wlan0: State: SCANNING -> ASSOCIATING
  1363. nl80211: Set wlan0 operstate 0->0 (DORMANT)
  1364. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  1365. wlan0: Determining shared radio frequencies (max len 2)
  1366. wlan0: Shared frequencies (len=0): completed iteration
  1367. P2P: Add operating class 81
  1368. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  1369. P2P: Add operating class 115
  1370. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1371. P2P: Add operating class 116
  1372. P2P: Channels - hexdump(len=2): 24 2c
  1373. P2P: Add operating class 117
  1374. P2P: Channels - hexdump(len=2): 28 30
  1375. P2P: Add operating class 124
  1376. P2P: Channels - hexdump(len=4): 95 99 9d a1
  1377. P2P: Add operating class 125
  1378. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  1379. P2P: Add operating class 126
  1380. P2P: Channels - hexdump(len=2): 95 9d
  1381. P2P: Add operating class 127
  1382. P2P: Channels - hexdump(len=2): 99 a1
  1383. P2P: Add operating class 128
  1384. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1385. P2P: Add operating class 130
  1386. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1387. P2P: Update channel list
  1388. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  1389. P2P: cli_channels:
  1390. wlan0: set_disable_max_amsdu: -1
  1391. wlan0: set_ampdu_factor: -1
  1392. wlan0: set_ampdu_density: -1
  1393. wlan0: set_disable_ht40: 0
  1394. wlan0: set_disable_sgi: 0
  1395. wlan0: set_disable_ldpc: 0
  1396. wlan0: set_rx_stbc: -1
  1397. wlan0: set_tx_stbc: -1
  1398. nl80211: Set mode ifindex 3 iftype 2 (STATION)
  1399. nl80211: Unsubscribe mgmt frames handle 0x89555629 (mode change)
  1400. nl80211: Subscribe to mgmt frames with non-AP handle 0x1dddea0
  1401. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0104
  1402. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040a
  1403. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040b
  1404. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040c
  1405. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040d
  1406. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090a
  1407. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090b
  1408. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090c
  1409. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090d
  1410. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0409506f9a09
  1411. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=7f506f9a09
  1412. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0409506f9a1a
  1413. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0801
  1414. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040e
  1415. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=12
  1416. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=06
  1417. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a07
  1418. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a11
  1419. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a1a
  1420. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=1101
  1421. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=1102
  1422. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0505
  1423. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0500
  1424. nl80211: Connect (ifindex=3)
  1425. * bssid_hint=b0:b8:67:ed:fc:51
  1426. * freq_hint=5200
  1427. * SSID - hexdump_ascii(len=7):
  1428. 65 64 75 72 6f 61 6d eduroam
  1429. * IEs - hexdump(len=44): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 3b 14 73 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82
  1430. * WPA Versions 0x2
  1431. * pairwise=0xfac04
  1432. * group=0xfac04
  1433. * akm=0xfac01
  1434. * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1435. * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1436. * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
  1437. * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
  1438. * Auth Type 0
  1439. nl80211: Connect request send successfully
  1440. wlan0: Setting authentication timeout: 10 sec 0 usec
  1441. EAPOL: External notification - EAP success=0
  1442. EAPOL: External notification - EAP fail=0
  1443. EAPOL: External notification - portControl=Auto
  1444. EAPOL: disable timer tick
  1445. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=46
  1446. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  1447. wlan0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00)
  1448. RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  1449. RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  1450. RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  1451. nl80211: Ignored event (cmd=46) for foreign interface (ifindex 3 wdev 0x0)
  1452. nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlan0
  1453. nl80211: Connect event (status=0 ignore_next_local_disconnect=0)
  1454. nl80211: Associated on 5745 MHz
  1455. nl80211: Associated with b0:b8:67:ef:d9:11
  1456. nl80211: Operating frequency for the associated BSS from scan results: 5745 MHz
  1457. nl80211: Associated on 5745 MHz
  1458. nl80211: Associated with b0:b8:67:ef:d9:11
  1459. nl80211: Set drv->ssid based on scan res info to 'eduroam'
  1460. wlan0: Event ASSOC (0) received
  1461. wlan0: Association info event
  1462. req_ies - hexdump(len=130): 00 07 65 64 75 72 6f 61 6d 01 05 24 b0 c8 60 6c 21 02 03 e0 24 0a 24 04 34 04 64 0c 95 04 a5 01 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 2d 1a 63 00 17 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 08 00 00 00 00 40 bf 0c 32 50 80 0f fe ff 00 00 fe ff 00 00 dd 09 00 10 18 02 00 00 10 00 00 dd 07 00 50 f2 02 00 01 00 01 00 00 ff
  1463. resp_ies - hexdump(len=122): 01 05 24 b0 c8 60 6c 2d 1a ef 09 1b ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 95 05 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 bf 0c 91 79 8b 33 aa ff 00 00 aa ff 00 00 c0 05 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 00 fe ff 00 00 dd
  1464. IEEE 802.11 element parse failed (id=0 elen=254 left=4)
  1465. wlan0: freq=5745 MHz
  1466. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  1467. Truncated IE in assoc_info - hexdump(len=6): 00 fe ff 00 00 dd
  1468. FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
  1469. wlan0: State: ASSOCIATING -> ASSOCIATED
  1470. nl80211: Set wlan0 operstate 0->0 (DORMANT)
  1471. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  1472. wlan0: Determining shared radio frequencies (max len 2)
  1473. wlan0: Shared frequencies (len=1): completed iteration
  1474. wlan0: freq[0]: 5745, flags=0x1
  1475. P2P: Add operating class 81
  1476. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  1477. P2P: Add operating class 115
  1478. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1479. P2P: Add operating class 116
  1480. P2P: Channels - hexdump(len=2): 24 2c
  1481. P2P: Add operating class 117
  1482. P2P: Channels - hexdump(len=2): 28 30
  1483. P2P: Add operating class 124
  1484. P2P: Channels - hexdump(len=4): 95 99 9d a1
  1485. P2P: Add operating class 125
  1486. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  1487. P2P: Add operating class 126
  1488. P2P: Channels - hexdump(len=2): 95 9d
  1489. P2P: Add operating class 127
  1490. P2P: Channels - hexdump(len=2): 99 a1
  1491. P2P: Add operating class 128
  1492. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1493. P2P: Add operating class 130
  1494. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1495. P2P: Update channel list
  1496. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  1497. P2P: cli_channels:
  1498. wlan0: Associated to a new BSS: BSSID=b0:b8:67:ef:d9:11
  1499. wlan0: WPA: clearing AP WPA IE
  1500. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
  1501. wlan0: Associated with b0:b8:67:ef:d9:11
  1502. wlan0: WPA: Association event - clear replay counter
  1503. wlan0: WPA: Clear old PTK
  1504. TDLS: Remove peers on association
  1505. EAPOL: External notification - portEnabled=0
  1506. EAPOL: External notification - portValid=0
  1507. EAPOL: External notification - portEnabled=1
  1508. EAPOL: SUPP_PAE entering state CONNECTING
  1509. EAPOL: enable timer tick
  1510. EAPOL: SUPP_BE entering state IDLE
  1511. EAP: EAP entering state INITIALIZE
  1512. EAP: maintaining EAP method data for fast reauthentication
  1513. EAP: EAP entering state IDLE
  1514. wlan0: Setting authentication timeout: 10 sec 0 usec
  1515. wlan0: Cancelling scan request
  1516. EAPOL: External notification - portValid=1
  1517. wlan0: Process pending EAPOL frame that was received just before association notification
  1518. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  1519. wlan0: Setting authentication timeout: 70 sec 0 usec
  1520. EAPOL: Received EAP-Packet frame
  1521. EAPOL: SUPP_PAE entering state RESTART
  1522. EAP: EAP entering state INITIALIZE
  1523. EAP: maintaining EAP method data for fast reauthentication
  1524. EAP: EAP entering state IDLE
  1525. EAPOL: SUPP_PAE entering state AUTHENTICATING
  1526. EAPOL: SUPP_BE entering state REQUEST
  1527. EAPOL: getSuppRsp
  1528. EAP: EAP entering state RECEIVED
  1529. EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
  1530. EAP: EAP entering state IDENTITY
  1531. wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
  1532. EAP: Status notification: started (param=)
  1533. EAP: EAP-Request Identity data - hexdump_ascii(len=0):
  1534. EAP: using real identity - hexdump_ascii(len=24):
  1535. [OMITTED]
  1536. EAP: EAP entering state SEND_RESPONSE
  1537. EAP: EAP entering state IDLE
  1538. EAPOL: SUPP_BE entering state RESPONSE
  1539. EAPOL: txSuppRsp
  1540. TX EAPOL: dst=b0:b8:67:ef:d9:11
  1541. EAPOL: SUPP_BE entering state RECEIVE
  1542. wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
  1543. RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  1544. nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for p2p-dev-wlan0
  1545. nl80211: Regulatory domain change
  1546. * initiator=3
  1547. * type=0
  1548. * alpha2=US
  1549. p2p-dev-wlan0: Event CHANNEL_LIST_CHANGED (27) received
  1550. wlan0: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=US
  1551. p2p-dev-wlan0: Updating hw mode
  1552. nl80211: Regulatory information - country=US (DFS-FCC)
  1553. nl80211: 2402-2472 @ 40 MHz 30 mBm
  1554. nl80211: 5170-5250 @ 80 MHz 23 mBm
  1555. nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
  1556. nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
  1557. nl80211: 5735-5835 @ 80 MHz 30 mBm
  1558. nl80211: 57240-63720 @ 2160 MHz 40 mBm
  1559. nl80211: Added 802.11b mode based on 802.11g information
  1560. nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  1561. nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
  1562. nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  1563. wlan0: Updating hw mode
  1564. nl80211: Regulatory information - country=US (DFS-FCC)
  1565. nl80211: 2402-2472 @ 40 MHz 30 mBm
  1566. nl80211: 5170-5250 @ 80 MHz 23 mBm
  1567. nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
  1568. nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
  1569. nl80211: 5735-5835 @ 80 MHz 30 mBm
  1570. nl80211: 57240-63720 @ 2160 MHz 40 mBm
  1571. nl80211: Added 802.11b mode based on 802.11g information
  1572. nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  1573. nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
  1574. nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  1575. p2p-dev-wlan0: Determining shared radio frequencies (max len 2)
  1576. p2p-dev-wlan0: Shared frequencies (len=1): completed iteration
  1577. p2p-dev-wlan0: freq[0]: 5745, flags=0x1
  1578. P2P: Add operating class 81
  1579. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  1580. P2P: Add operating class 115
  1581. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1582. P2P: Add operating class 116
  1583. P2P: Channels - hexdump(len=2): 24 2c
  1584. P2P: Add operating class 117
  1585. P2P: Channels - hexdump(len=2): 28 30
  1586. P2P: Add operating class 124
  1587. P2P: Channels - hexdump(len=4): 95 99 9d a1
  1588. P2P: Add operating class 125
  1589. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  1590. P2P: Add operating class 126
  1591. P2P: Channels - hexdump(len=2): 95 9d
  1592. P2P: Add operating class 127
  1593. P2P: Channels - hexdump(len=2): 99 a1
  1594. P2P: Add operating class 128
  1595. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1596. P2P: Add operating class 130
  1597. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1598. P2P: Update channel list
  1599. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  1600. P2P: cli_channels:
  1601. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=46
  1602. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  1603. EAPOL: Received EAP-Packet frame
  1604. EAPOL: SUPP_BE entering state REQUEST
  1605. EAPOL: getSuppRsp
  1606. EAP: EAP entering state RECEIVED
  1607. EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
  1608. EAP: EAP entering state GET_METHOD
  1609. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
  1610. EAP: Status notification: accept proposed method (param=PEAP)
  1611. EAP: Using previous method data for fast re-authentication
  1612. EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
  1613. wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
  1614. EAP: EAP entering state METHOD
  1615. SSL: Received packet(len=6) - Flags 0x21
  1616. EAP-PEAP: Start (server ver=1, own ver=1)
  1617. EAP-PEAP: Using PEAP version 1
  1618. SSL: (where=0x10 ret=0x1)
  1619. SSL: (where=0x1001 ret=0x1)
  1620. SSL: SSL_connect:before SSL initialization
  1621. OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
  1622. OpenSSL: TX ver=0x303 content_type=22 (handshake/client hello)
  1623. SSL: (where=0x1001 ret=0x1)
  1624. SSL: SSL_connect:SSLv3/TLS write client hello
  1625. SSL: (where=0x1002 ret=0xffffffff)
  1626. SSL: SSL_connect:error in SSLv3/TLS write client hello
  1627. SSL: SSL_connect - want more data
  1628. SSL: 222 bytes pending from ssl_out
  1629. SSL: Using TLS version TLSv1.2
  1630. SSL: 222 bytes left to be sent out (of total 222 bytes)
  1631. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e12a38
  1632. EAP: EAP entering state SEND_RESPONSE
  1633. EAP: EAP entering state IDLE
  1634. EAPOL: SUPP_BE entering state RESPONSE
  1635. EAPOL: txSuppRsp
  1636. TX EAPOL: dst=b0:b8:67:ef:d9:11
  1637. EAPOL: SUPP_BE entering state RECEIVE
  1638. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=154
  1639. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  1640. EAPOL: Received EAP-Packet frame
  1641. EAPOL: SUPP_BE entering state REQUEST
  1642. EAPOL: getSuppRsp
  1643. EAP: EAP entering state RECEIVED
  1644. EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
  1645. EAP: EAP entering state METHOD
  1646. SSL: Received packet(len=150) - Flags 0x81
  1647. SSL: TLS Message Length: 140
  1648. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  1649. SSL: (where=0x1001 ret=0x1)
  1650. SSL: SSL_connect:SSLv3/TLS write client hello
  1651. OpenSSL: RX ver=0x303 content_type=22 (handshake/server hello)
  1652. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  1653. SSL: (where=0x1001 ret=0x1)
  1654. SSL: SSL_connect:SSLv3/TLS read server hello
  1655. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  1656. SSL: (where=0x1001 ret=0x1)
  1657. SSL: SSL_connect:SSLv3/TLS read change cipher spec
  1658. OpenSSL: RX ver=0x303 content_type=22 (handshake/finished)
  1659. SSL: (where=0x1001 ret=0x1)
  1660. SSL: SSL_connect:SSLv3/TLS read finished
  1661. OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
  1662. OpenSSL: TX ver=0x303 content_type=20 (change cipher spec/)
  1663. SSL: (where=0x1001 ret=0x1)
  1664. SSL: SSL_connect:SSLv3/TLS write change cipher spec
  1665. OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
  1666. OpenSSL: TX ver=0x303 content_type=22 (handshake/finished)
  1667. SSL: (where=0x1001 ret=0x1)
  1668. SSL: SSL_connect:SSLv3/TLS write finished
  1669. SSL: (where=0x20 ret=0x1)
  1670. SSL: (where=0x1002 ret=0x1)
  1671. SSL: 51 bytes pending from ssl_out
  1672. OpenSSL: Handshake finished - resumed=1
  1673. SSL: No Application Data included
  1674. SSL: Using TLS version TLSv1.2
  1675. SSL: 51 bytes left to be sent out (of total 51 bytes)
  1676. EAP-PEAP: TLS done, proceed to Phase 2
  1677. EAP-PEAP: using label 'client EAP encryption' in key derivation
  1678. EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
  1679. EAP-PEAP: Derived Session-Id - hexdump(len=65): 19 7d 3a 0c f8 e1 cb 91 1a 98 a1 5c 5a 7d b1 da 88 64 86 03 05 66 f3 bf 1c 21 29 8b ac 9a aa c1 fc d5 10 9a 37 ce de 02 37 77 37 39 51 b2 8a 0e 1c 92 8d 9b 13 ce ea fc eb 6e a3 2d ec 9c 13 c6 11
  1680. EAP-PEAP: Workaround - allow outer EAP-Success to terminate PEAP resumption
  1681. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=COND_SUCC eapRespData=0x1ddf490
  1682. EAP: Session-Id - hexdump(len=65): 19 7d 3a 0c f8 e1 cb 91 1a 98 a1 5c 5a 7d b1 da 88 64 86 03 05 66 f3 bf 1c 21 29 8b ac 9a aa c1 fc d5 10 9a 37 ce de 02 37 77 37 39 51 b2 8a 0e 1c 92 8d 9b 13 ce ea fc eb 6e a3 2d ec 9c 13 c6 11
  1683. EAP: EAP entering state SEND_RESPONSE
  1684. EAP: EAP entering state IDLE
  1685. EAPOL: SUPP_BE entering state RESPONSE
  1686. EAPOL: txSuppRsp
  1687. TX EAPOL: dst=b0:b8:67:ef:d9:11
  1688. EAPOL: SUPP_BE entering state RECEIVE
  1689. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=50
  1690. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  1691. EAPOL: Received EAP-Packet frame
  1692. EAPOL: SUPP_BE entering state REQUEST
  1693. EAPOL: getSuppRsp
  1694. EAP: EAP entering state RECEIVED
  1695. EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
  1696. EAP: EAP entering state METHOD
  1697. SSL: Received packet(len=46) - Flags 0x01
  1698. EAP-PEAP: received 40 bytes encrypted data for Phase 2
  1699. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  1700. EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 04 00 0b 21 80 03 00 02 00 01
  1701. EAP-PEAP: received Phase 2: code=1 identifier=4 length=11
  1702. EAP-PEAP: Phase 2 Request: type=33
  1703. EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01
  1704. EAP-TLV: Result TLV - hexdump(len=2): 00 01
  1705. EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed
  1706. EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED]
  1707. OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
  1708. SSL: 40 bytes left to be sent out (of total 40 bytes)
  1709. EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC eapRespData=0x1e26518
  1710. EAP: Session-Id - hexdump(len=65): 19 7d 3a 0c f8 e1 cb 91 1a 98 a1 5c 5a 7d b1 da 88 64 86 03 05 66 f3 bf 1c 21 29 8b ac 9a aa c1 fc d5 10 9a 37 ce de 02 37 77 37 39 51 b2 8a 0e 1c 92 8d 9b 13 ce ea fc eb 6e a3 2d ec 9c 13 c6 11
  1711. EAP: EAP entering state SEND_RESPONSE
  1712. EAP: EAP entering state IDLE
  1713. EAPOL: SUPP_BE entering state RESPONSE
  1714. EAPOL: txSuppRsp
  1715. TX EAPOL: dst=b0:b8:67:ef:d9:11
  1716. EAPOL: SUPP_BE entering state RECEIVE
  1717. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=46
  1718. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  1719. EAPOL: Received EAP-Packet frame
  1720. EAPOL: SUPP_BE entering state REQUEST
  1721. EAPOL: getSuppRsp
  1722. EAP: EAP entering state RECEIVED
  1723. EAP: Received EAP-Success
  1724. EAP: Status notification: completion (param=success)
  1725. EAP: EAP entering state SUCCESS
  1726. wlan0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
  1727. EAPOL: SUPP_PAE entering state AUTHENTICATED
  1728. EAPOL: Supplicant port status: Authorized
  1729. nl80211: Set supplicant port authorized for b0:b8:67:ef:d9:11
  1730. EAPOL: SUPP_BE entering state RECEIVE
  1731. EAPOL: SUPP_BE entering state SUCCESS
  1732. EAPOL: SUPP_BE entering state IDLE
  1733. EAPOL authentication completed - result=SUCCESS
  1734. Configure PMK for driver-based RSN 4-way handshake
  1735. EAPOL: Successfully fetched key (len=32)
  1736. RSN: Configure PMK for driver-based 4-way handshake - hexdump(len=32): [REMOVED]
  1737. wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=5 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=32
  1738. nl80211: Set PMK to the driver for b0:b8:67:ef:d9:11
  1739. nl80211: PMK - hexdump(len=32): [REMOVED]
  1740. nl80211: Set PMK failed: ret=-22 (Invalid argument)
  1741. Failed to set PMK to the driver
  1742. wlan0: Cancelling scan request
  1743. wlan0: Cancelling authentication timeout
  1744. Removed BSSID b0:b8:67:ef:d9:11 from blacklist
  1745. wlan0: State: ASSOCIATED -> COMPLETED
  1746. wlan0: Radio work 'connect'@0x1e261c0 done in 2.992865 seconds
  1747. wlan0: radio_work_free('connect'@0x1e261c0): num_active_works --> 0
  1748. wlan0: CTRL-EVENT-CONNECTED - Connection to b0:b8:67:ef:d9:11 completed [id=0 id_str=]
  1749. nl80211: Set wlan0 operstate 0->1 (UP)
  1750. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
  1751. wlan0: Determining shared radio frequencies (max len 2)
  1752. wlan0: Shared frequencies (len=1): completed iteration
  1753. wlan0: freq[0]: 5745, flags=0x1
  1754. P2P: Add operating class 81
  1755. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  1756. P2P: Add operating class 115
  1757. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1758. P2P: Add operating class 116
  1759. P2P: Channels - hexdump(len=2): 24 2c
  1760. P2P: Add operating class 117
  1761. P2P: Channels - hexdump(len=2): 28 30
  1762. P2P: Add operating class 124
  1763. P2P: Channels - hexdump(len=4): 95 99 9d a1
  1764. P2P: Add operating class 125
  1765. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  1766. P2P: Add operating class 126
  1767. P2P: Channels - hexdump(len=2): 95 9d
  1768. P2P: Add operating class 127
  1769. P2P: Channels - hexdump(len=2): 99 a1
  1770. P2P: Add operating class 128
  1771. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1772. P2P: Add operating class 130
  1773. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1774. P2P: Update channel list
  1775. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  1776. P2P: cli_channels:
  1777. RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  1778. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=121
  1779. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  1780. EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
  1781. EAPOL: External notification - portValid=1
  1782. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=121
  1783. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  1784. EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
  1785. EAPOL: External notification - portValid=1
  1786. EAPOL: startWhen --> 0
  1787. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=121
  1788. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  1789. EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
  1790. EAPOL: External notification - portValid=1
  1791. RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
  1792. RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
  1793. nl80211: Ignored event (cmd=48) for foreign interface (ifindex 3 wdev 0x0)
  1794. nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlan0
  1795. nl80211: Disconnect event
  1796. wlan0: Event DEAUTH (11) received
  1797. wlan0: Deauthentication notification
  1798. wlan0: * reason 3
  1799. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  1800. wlan0: CTRL-EVENT-DISCONNECTED bssid=b0:b8:67:ef:d9:11 reason=3
  1801. wlan0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9)
  1802. wlan0: Setting scan request: 0.100000 sec
  1803. Added BSSID b0:b8:67:ef:d9:11 into blacklist
  1804. wlan0: Another BSS in this ESS has been seen; try it next
  1805. BSSID b0:b8:67:ef:d9:11 blacklist count incremented to 2
  1806. wlan0: Blacklist count 1 --> request scan in 100 ms
  1807. wlan0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner
  1808. TDLS: Remove peers on disassociation
  1809. wlan0: WPA: Clear old PMK and PTK
  1810. wlan0: Disconnect event - remove keys
  1811. wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  1812. wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x1ddc304 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1813. addr=b0:b8:67:ef:d9:11
  1814. nl80211: Data frame filter flags=0x0
  1815. wlan0: State: COMPLETED -> DISCONNECTED
  1816. nl80211: Set wlan0 operstate 1->0 (DORMANT)
  1817. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  1818. wlan0: Determining shared radio frequencies (max len 2)
  1819. wlan0: Shared frequencies (len=0): completed iteration
  1820. P2P: Add operating class 81
  1821. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  1822. P2P: Add operating class 115
  1823. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1824. P2P: Add operating class 116
  1825. P2P: Channels - hexdump(len=2): 24 2c
  1826. P2P: Add operating class 117
  1827. P2P: Channels - hexdump(len=2): 28 30
  1828. P2P: Add operating class 124
  1829. P2P: Channels - hexdump(len=4): 95 99 9d a1
  1830. P2P: Add operating class 125
  1831. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  1832. P2P: Add operating class 126
  1833. P2P: Channels - hexdump(len=2): 95 9d
  1834. P2P: Add operating class 127
  1835. P2P: Channels - hexdump(len=2): 99 a1
  1836. P2P: Add operating class 128
  1837. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1838. P2P: Add operating class 130
  1839. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1840. P2P: Update channel list
  1841. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  1842. P2P: cli_channels:
  1843. EAPOL: External notification - portEnabled=0
  1844. EAPOL: SUPP_PAE entering state DISCONNECTED
  1845. EAPOL: Supplicant port status: Unauthorized
  1846. nl80211: Skip set_supp_port(unauthorized) while not associated
  1847. EAPOL: SUPP_BE entering state INITIALIZE
  1848. EAP: EAP entering state DISABLED
  1849. EAPOL: External notification - portValid=0
  1850. nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for p2p-dev-wlan0
  1851. nl80211: Regulatory domain change
  1852. * initiator=0
  1853. * type=1
  1854. p2p-dev-wlan0: Event CHANNEL_LIST_CHANGED (27) received
  1855. wlan0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
  1856. p2p-dev-wlan0: Updating hw mode
  1857. nl80211: Regulatory information - country=US (DFS-FCC)
  1858. nl80211: 2402-2472 @ 40 MHz 30 mBm
  1859. nl80211: 5170-5250 @ 80 MHz 23 mBm
  1860. nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
  1861. nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
  1862. nl80211: 5735-5835 @ 80 MHz 30 mBm
  1863. nl80211: 57240-63720 @ 2160 MHz 40 mBm
  1864. nl80211: Added 802.11b mode based on 802.11g information
  1865. nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  1866. nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
  1867. nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  1868. wlan0: Updating hw mode
  1869. nl80211: Regulatory information - country=US (DFS-FCC)
  1870. nl80211: 2402-2472 @ 40 MHz 30 mBm
  1871. nl80211: 5170-5250 @ 80 MHz 23 mBm
  1872. nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
  1873. nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
  1874. nl80211: 5735-5835 @ 80 MHz 30 mBm
  1875. nl80211: 57240-63720 @ 2160 MHz 40 mBm
  1876. nl80211: Added 802.11b mode based on 802.11g information
  1877. nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  1878. nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
  1879. nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  1880. p2p-dev-wlan0: Determining shared radio frequencies (max len 2)
  1881. p2p-dev-wlan0: Shared frequencies (len=0): completed iteration
  1882. P2P: Add operating class 81
  1883. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  1884. P2P: Add operating class 115
  1885. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1886. P2P: Add operating class 116
  1887. P2P: Channels - hexdump(len=2): 24 2c
  1888. P2P: Add operating class 117
  1889. P2P: Channels - hexdump(len=2): 28 30
  1890. P2P: Add operating class 124
  1891. P2P: Channels - hexdump(len=4): 95 99 9d a1
  1892. P2P: Add operating class 125
  1893. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  1894. P2P: Add operating class 126
  1895. P2P: Channels - hexdump(len=2): 95 9d
  1896. P2P: Add operating class 127
  1897. P2P: Channels - hexdump(len=2): 99 a1
  1898. P2P: Add operating class 128
  1899. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1900. P2P: Add operating class 130
  1901. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1902. P2P: Update channel list
  1903. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  1904. P2P: cli_channels:
  1905. nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for p2p-dev-wlan0
  1906. nl80211: Regulatory domain change
  1907. * initiator=1
  1908. * type=0
  1909. * alpha2=US
  1910. p2p-dev-wlan0: Event CHANNEL_LIST_CHANGED (27) received
  1911. wlan0: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=US
  1912. p2p-dev-wlan0: Updating hw mode
  1913. nl80211: Regulatory information - country=US (DFS-FCC)
  1914. nl80211: 2402-2472 @ 40 MHz 30 mBm
  1915. nl80211: 5170-5250 @ 80 MHz 23 mBm
  1916. nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
  1917. nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
  1918. nl80211: 5735-5835 @ 80 MHz 30 mBm
  1919. nl80211: 57240-63720 @ 2160 MHz 40 mBm
  1920. nl80211: Added 802.11b mode based on 802.11g information
  1921. nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  1922. nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
  1923. nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  1924. wlan0: Updating hw mode
  1925. nl80211: Regulatory information - country=US (DFS-FCC)
  1926. nl80211: 2402-2472 @ 40 MHz 30 mBm
  1927. nl80211: 5170-5250 @ 80 MHz 23 mBm
  1928. nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
  1929. nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
  1930. nl80211: 5735-5835 @ 80 MHz 30 mBm
  1931. nl80211: 57240-63720 @ 2160 MHz 40 mBm
  1932. nl80211: Added 802.11b mode based on 802.11g information
  1933. nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  1934. nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
  1935. nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  1936. p2p-dev-wlan0: Determining shared radio frequencies (max len 2)
  1937. p2p-dev-wlan0: Shared frequencies (len=0): completed iteration
  1938. P2P: Add operating class 81
  1939. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  1940. P2P: Add operating class 115
  1941. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1942. P2P: Add operating class 116
  1943. P2P: Channels - hexdump(len=2): 24 2c
  1944. P2P: Add operating class 117
  1945. P2P: Channels - hexdump(len=2): 28 30
  1946. P2P: Add operating class 124
  1947. P2P: Channels - hexdump(len=4): 95 99 9d a1
  1948. P2P: Add operating class 125
  1949. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  1950. P2P: Add operating class 126
  1951. P2P: Channels - hexdump(len=2): 95 9d
  1952. P2P: Add operating class 127
  1953. P2P: Channels - hexdump(len=2): 99 a1
  1954. P2P: Add operating class 128
  1955. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1956. P2P: Add operating class 130
  1957. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1958. P2P: Update channel list
  1959. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  1960. P2P: cli_channels:
  1961. wlan0: State: DISCONNECTED -> SCANNING
  1962. wlan0: Determining shared radio frequencies (max len 2)
  1963. wlan0: Shared frequencies (len=0): completed iteration
  1964. P2P: Add operating class 81
  1965. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  1966. P2P: Add operating class 115
  1967. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1968. P2P: Add operating class 116
  1969. P2P: Channels - hexdump(len=2): 24 2c
  1970. P2P: Add operating class 117
  1971. P2P: Channels - hexdump(len=2): 28 30
  1972. P2P: Add operating class 124
  1973. P2P: Channels - hexdump(len=4): 95 99 9d a1
  1974. P2P: Add operating class 125
  1975. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  1976. P2P: Add operating class 126
  1977. P2P: Channels - hexdump(len=2): 95 9d
  1978. P2P: Add operating class 127
  1979. P2P: Channels - hexdump(len=2): 99 a1
  1980. P2P: Add operating class 128
  1981. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1982. P2P: Add operating class 130
  1983. P2P: Channels - hexdump(len=4): 24 28 2c 30
  1984. P2P: Update channel list
  1985. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  1986. P2P: cli_channels:
  1987. Scan SSID - hexdump_ascii(len=7):
  1988. 65 64 75 72 6f 61 6d eduroam
  1989. wlan0: Starting AP scan for wildcard SSID
  1990. WPS: Building WPS IE for Probe Request
  1991. WPS: * Version (hardcoded 0x10)
  1992. WPS: * Request Type
  1993. WPS: * Config Methods (3148)
  1994. WPS: * UUID-E
  1995. WPS: * Primary Device Type
  1996. WPS: * RF Bands (3)
  1997. WPS: * Association State
  1998. WPS: * Configuration Error (0)
  1999. WPS: * Device Password ID (0)
  2000. WPS: * Manufacturer
  2001. WPS: * Model Name
  2002. WPS: * Model Number
  2003. WPS: * Device Name
  2004. WPS: * Version2 (0x20)
  2005. P2P: * P2P IE header
  2006. P2P: * Capability dev=25 group=00
  2007. P2P: * Listen Channel: Regulatory Class 81 Channel 6
  2008. wlan0: Optimize scan based on previously generated frequency list
  2009. wlan0: Add radio work 'scan'@0x1e26560
  2010. wlan0: First radio work item in the queue - schedule start immediately
  2011. wlan0: Starting radio work 'scan'@0x1e26560 after 0.000051 second wait
  2012. wlan0: nl80211: scan request
  2013. Scan requested (ret=0) - scan timeout 30 seconds
  2014. nl80211: Ignored event (cmd=33) for foreign interface (ifindex 3 wdev 0x0)
  2015. nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
  2016. wlan0: nl80211: Scan trigger
  2017. wlan0: Event SCAN_STARTED (46) received
  2018. wlan0: Own scan request started a scan in 0.000165 seconds
  2019. RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
  2020. nl80211: Ignored event (cmd=34) for foreign interface (ifindex 3 wdev 0x0)
  2021. nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
  2022. wlan0: nl80211: New scan results available
  2023. nl80211: Scan probed for SSID 'eduroam'
  2024. nl80211: Scan probed for SSID ''
  2025. nl80211: Scan included frequencies: 5200 5240 2462 2412 2437
  2026. wlan0: Event SCAN_RESULTS (3) received
  2027. wlan0: Scan completed in 0.218749 seconds
  2028. nl80211: Received scan results (18 BSSes)
  2029. wlan0: BSS: Start scan result update 3
  2030. BSS: last_scan_res_used=18/32
  2031. wlan0: New scan results available (own=1 ext=0)
  2032. WPS: AP f2:a3:b2:31:45:e3 type 0 added
  2033. WPS: AP[0] f2:a3:b2:31:45:e3 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  2034. wlan0: Radio work 'scan'@0x1e26560 done in 0.221190 seconds
  2035. wlan0: radio_work_free('scan'@0x1e26560): num_active_works --> 0
  2036. wlan0: Selecting BSS from priority group 0
  2037. wlan0: 0: b0:b8:67:ef:d9:11 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-48 freq=5745
  2038. wlan0: skip - blacklisted (count=2 limit=0)
  2039. wlan0: 1: b0:b8:67:ed:fc:51 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-53 freq=5200
  2040. wlan0: selected based on RSN IE
  2041. wlan0: selected BSS b0:b8:67:ed:fc:51 ssid='eduroam'
  2042. wlan0: Considering connect request: reassociate: 0 selected: b0:b8:67:ed:fc:51 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x1dde570 current_ssid=(nil)
  2043. wlan0: Request association with b0:b8:67:ed:fc:51
  2044. wlan0: Re-association to the same ESS
  2045. TDLS: TDLS is allowed in the target BSS
  2046. TDLS: TDLS channel switch allowed in the target BSS
  2047. wlan0: No ongoing scan/p2p-scan found to abort
  2048. wlan0: Add radio work 'connect'@0x1dff250
  2049. wlan0: First radio work item in the queue - schedule start immediately
  2050. RSN: Ignored PMKID candidate without preauth flag
  2051. RSN: Ignored PMKID candidate without preauth flag
  2052. RSN: Ignored PMKID candidate without preauth flag
  2053. RSN: Ignored PMKID candidate without preauth flag
  2054. RSN: Ignored PMKID candidate without preauth flag
  2055. RSN: Ignored PMKID candidate without preauth flag
  2056. RSN: Ignored PMKID candidate without preauth flag
  2057. RSN: Ignored PMKID candidate without preauth flag
  2058. p2p-dev-wlan0: Updating scan results from sibling
  2059. nl80211: Received scan results (18 BSSes)
  2060. p2p-dev-wlan0: BSS: Start scan result update 3
  2061. BSS: last_scan_res_used=18/32
  2062. wlan0: Starting radio work 'connect'@0x1dff250 after 0.000987 second wait
  2063. wlan0: Trying to associate with SSID 'eduroam'
  2064. wlan0: Cancelling scan request
  2065. wlan0: WPA: clearing own WPA/RSN IE
  2066. RSN: PMKSA cache search - network_ctx=0x1dde570 try_opportunistic=0 akmp=0x0
  2067. RSN: Search for BSSID b0:b8:67:ed:fc:51
  2068. RSN: No PMKSA cache entry found
  2069. wlan0: RSN: using IEEE 802.11i/D9.0
  2070. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  2071. wlan0: WPA: Selected mgmt group cipher 32
  2072. wlan0: WPA: clearing AP WPA IE
  2073. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
  2074. wlan0: WPA: using GTK CCMP
  2075. wlan0: WPA: using PTK CCMP
  2076. wlan0: WPA: using KEY_MGMT 802.1X
  2077. wlan0: WPA: not using MGMT group cipher
  2078. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  2079. WPA: No current PMKSA - clear PMK
  2080. wlan0: Automatic auth_alg selection: 0x1
  2081. Added supported operating classes IE - hexdump(len=22): 3b 14 73 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82
  2082. wlan0: State: SCANNING -> ASSOCIATING
  2083. nl80211: Set wlan0 operstate 0->0 (DORMANT)
  2084. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  2085. wlan0: Determining shared radio frequencies (max len 2)
  2086. wlan0: Shared frequencies (len=0): completed iteration
  2087. P2P: Add operating class 81
  2088. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  2089. P2P: Add operating class 115
  2090. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2091. P2P: Add operating class 116
  2092. P2P: Channels - hexdump(len=2): 24 2c
  2093. P2P: Add operating class 117
  2094. P2P: Channels - hexdump(len=2): 28 30
  2095. P2P: Add operating class 124
  2096. P2P: Channels - hexdump(len=4): 95 99 9d a1
  2097. P2P: Add operating class 125
  2098. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  2099. P2P: Add operating class 126
  2100. P2P: Channels - hexdump(len=2): 95 9d
  2101. P2P: Add operating class 127
  2102. P2P: Channels - hexdump(len=2): 99 a1
  2103. P2P: Add operating class 128
  2104. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2105. P2P: Add operating class 130
  2106. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2107. P2P: Update channel list
  2108. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  2109. P2P: cli_channels:
  2110. wlan0: set_disable_max_amsdu: -1
  2111. wlan0: set_ampdu_factor: -1
  2112. wlan0: set_ampdu_density: -1
  2113. wlan0: set_disable_ht40: 0
  2114. wlan0: set_disable_sgi: 0
  2115. wlan0: set_disable_ldpc: 0
  2116. wlan0: set_rx_stbc: -1
  2117. wlan0: set_tx_stbc: -1
  2118. nl80211: Set mode ifindex 3 iftype 2 (STATION)
  2119. nl80211: Unsubscribe mgmt frames handle 0x89555629 (mode change)
  2120. nl80211: Subscribe to mgmt frames with non-AP handle 0x1dddea0
  2121. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0104
  2122. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040a
  2123. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040b
  2124. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040c
  2125. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040d
  2126. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090a
  2127. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090b
  2128. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090c
  2129. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090d
  2130. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0409506f9a09
  2131. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=7f506f9a09
  2132. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0409506f9a1a
  2133. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0801
  2134. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040e
  2135. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=12
  2136. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=06
  2137. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a07
  2138. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a11
  2139. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a1a
  2140. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=1101
  2141. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=1102
  2142. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0505
  2143. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0500
  2144. nl80211: Connect (ifindex=3)
  2145. * bssid_hint=b0:b8:67:ed:fc:51
  2146. * freq_hint=5200
  2147. * SSID - hexdump_ascii(len=7):
  2148. 65 64 75 72 6f 61 6d eduroam
  2149. * IEs - hexdump(len=44): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 3b 14 73 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82
  2150. * WPA Versions 0x2
  2151. * pairwise=0xfac04
  2152. * group=0xfac04
  2153. * akm=0xfac01
  2154. * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  2155. * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  2156. * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
  2157. * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
  2158. * Auth Type 0
  2159. nl80211: Connect request send successfully
  2160. wlan0: Setting authentication timeout: 10 sec 0 usec
  2161. EAPOL: External notification - EAP success=0
  2162. EAPOL: External notification - EAP fail=0
  2163. EAPOL: External notification - portControl=Auto
  2164. EAPOL: disable timer tick
  2165. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=46
  2166. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  2167. wlan0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00)
  2168. nl80211: Ignored event (cmd=46) for foreign interface (ifindex 3 wdev 0x0)
  2169. nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlan0
  2170. nl80211: Connect event (status=0 ignore_next_local_disconnect=0)
  2171. nl80211: Associated on 5745 MHz
  2172. nl80211: Associated with b0:b8:67:ef:d9:11
  2173. nl80211: Operating frequency for the associated BSS from scan results: 5745 MHz
  2174. nl80211: Associated on 5745 MHz
  2175. nl80211: Associated with b0:b8:67:ef:d9:11
  2176. nl80211: Set drv->ssid based on scan res info to 'eduroam'
  2177. wlan0: Event ASSOC (0) received
  2178. wlan0: Association info event
  2179. req_ies - hexdump(len=130): 00 07 65 64 75 72 6f 61 6d 01 05 24 b0 c8 60 6c 21 02 03 e0 24 0a 24 04 34 04 64 0c 95 04 a5 01 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 2d 1a 63 00 17 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 08 00 00 00 00 40 bf 0c 32 50 80 0f fe ff 00 00 fe ff 00 00 dd 09 00 10 18 02 00 00 10 00 00 dd 07 00 50 f2 02 00 01 00 01 00 00 ff
  2180. resp_ies - hexdump(len=122): 01 05 24 b0 c8 60 6c 2d 1a ef 09 1b ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 95 05 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 bf 0c 91 79 8b 33 aa ff 00 00 aa ff 00 00 c0 05 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 00 fe ff 00 00 dd
  2181. IEEE 802.11 element parse failed (id=0 elen=254 left=4)
  2182. wlan0: freq=5745 MHz
  2183. WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  2184. Truncated IE in assoc_info - hexdump(len=6): 00 fe ff 00 00 dd
  2185. FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
  2186. wlan0: State: ASSOCIATING -> ASSOCIATED
  2187. nl80211: Set wlan0 operstate 0->0 (DORMANT)
  2188. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  2189. wlan0: Determining shared radio frequencies (max len 2)
  2190. wlan0: Shared frequencies (len=1): completed iteration
  2191. wlan0: freq[0]: 5745, flags=0x1
  2192. P2P: Add operating class 81
  2193. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  2194. P2P: Add operating class 115
  2195. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2196. P2P: Add operating class 116
  2197. P2P: Channels - hexdump(len=2): 24 2c
  2198. P2P: Add operating class 117
  2199. P2P: Channels - hexdump(len=2): 28 30
  2200. P2P: Add operating class 124
  2201. P2P: Channels - hexdump(len=4): 95 99 9d a1
  2202. P2P: Add operating class 125
  2203. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  2204. P2P: Add operating class 126
  2205. P2P: Channels - hexdump(len=2): 95 9d
  2206. P2P: Add operating class 127
  2207. P2P: Channels - hexdump(len=2): 99 a1
  2208. P2P: Add operating class 128
  2209. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2210. P2P: Add operating class 130
  2211. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2212. P2P: Update channel list
  2213. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  2214. P2P: cli_channels:
  2215. wlan0: Associated to a new BSS: BSSID=b0:b8:67:ef:d9:11
  2216. wlan0: WPA: clearing AP WPA IE
  2217. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
  2218. wlan0: Associated with b0:b8:67:ef:d9:11
  2219. wlan0: WPA: Association event - clear replay counter
  2220. wlan0: WPA: Clear old PTK
  2221. TDLS: Remove peers on association
  2222. EAPOL: External notification - portEnabled=0
  2223. EAPOL: External notification - portValid=0
  2224. EAPOL: External notification - portEnabled=1
  2225. EAPOL: SUPP_PAE entering state CONNECTING
  2226. EAPOL: enable timer tick
  2227. EAPOL: SUPP_BE entering state IDLE
  2228. EAP: EAP entering state INITIALIZE
  2229. EAP: maintaining EAP method data for fast reauthentication
  2230. EAP: EAP entering state IDLE
  2231. wlan0: Setting authentication timeout: 10 sec 0 usec
  2232. wlan0: Cancelling scan request
  2233. EAPOL: External notification - portValid=1
  2234. wlan0: Process pending EAPOL frame that was received just before association notification
  2235. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  2236. wlan0: Setting authentication timeout: 70 sec 0 usec
  2237. EAPOL: Received EAP-Packet frame
  2238. EAPOL: SUPP_PAE entering state RESTART
  2239. EAP: EAP entering state INITIALIZE
  2240. EAP: maintaining EAP method data for fast reauthentication
  2241. EAP: EAP entering state IDLE
  2242. EAPOL: SUPP_PAE entering state AUTHENTICATING
  2243. EAPOL: SUPP_BE entering state REQUEST
  2244. EAPOL: getSuppRsp
  2245. EAP: EAP entering state RECEIVED
  2246. EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
  2247. EAP: EAP entering state IDENTITY
  2248. wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
  2249. EAP: Status notification: started (param=)
  2250. EAP: EAP-Request Identity data - hexdump_ascii(len=0):
  2251. EAP: using real identity - hexdump_ascii(len=24):
  2252. [OMITTED]
  2253. EAP: EAP entering state SEND_RESPONSE
  2254. EAP: EAP entering state IDLE
  2255. EAPOL: SUPP_BE entering state RESPONSE
  2256. EAPOL: txSuppRsp
  2257. TX EAPOL: dst=b0:b8:67:ef:d9:11
  2258. EAPOL: SUPP_BE entering state RECEIVE
  2259. wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
  2260. RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  2261. RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  2262. RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  2263. RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  2264. nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for p2p-dev-wlan0
  2265. nl80211: Regulatory domain change
  2266. * initiator=3
  2267. * type=0
  2268. * alpha2=US
  2269. p2p-dev-wlan0: Event CHANNEL_LIST_CHANGED (27) received
  2270. wlan0: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=US
  2271. p2p-dev-wlan0: Updating hw mode
  2272. nl80211: Regulatory information - country=US (DFS-FCC)
  2273. nl80211: 2402-2472 @ 40 MHz 30 mBm
  2274. nl80211: 5170-5250 @ 80 MHz 23 mBm
  2275. nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
  2276. nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
  2277. nl80211: 5735-5835 @ 80 MHz 30 mBm
  2278. nl80211: 57240-63720 @ 2160 MHz 40 mBm
  2279. nl80211: Added 802.11b mode based on 802.11g information
  2280. nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  2281. nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
  2282. nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  2283. wlan0: Updating hw mode
  2284. nl80211: Regulatory information - country=US (DFS-FCC)
  2285. nl80211: 2402-2472 @ 40 MHz 30 mBm
  2286. nl80211: 5170-5250 @ 80 MHz 23 mBm
  2287. nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
  2288. nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
  2289. nl80211: 5735-5835 @ 80 MHz 30 mBm
  2290. nl80211: 57240-63720 @ 2160 MHz 40 mBm
  2291. nl80211: Added 802.11b mode based on 802.11g information
  2292. nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  2293. nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
  2294. nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  2295. p2p-dev-wlan0: Determining shared radio frequencies (max len 2)
  2296. p2p-dev-wlan0: Shared frequencies (len=1): completed iteration
  2297. p2p-dev-wlan0: freq[0]: 5745, flags=0x1
  2298. P2P: Add operating class 81
  2299. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  2300. P2P: Add operating class 115
  2301. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2302. P2P: Add operating class 116
  2303. P2P: Channels - hexdump(len=2): 24 2c
  2304. P2P: Add operating class 117
  2305. P2P: Channels - hexdump(len=2): 28 30
  2306. P2P: Add operating class 124
  2307. P2P: Channels - hexdump(len=4): 95 99 9d a1
  2308. P2P: Add operating class 125
  2309. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  2310. P2P: Add operating class 126
  2311. P2P: Channels - hexdump(len=2): 95 9d
  2312. P2P: Add operating class 127
  2313. P2P: Channels - hexdump(len=2): 99 a1
  2314. P2P: Add operating class 128
  2315. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2316. P2P: Add operating class 130
  2317. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2318. P2P: Update channel list
  2319. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  2320. P2P: cli_channels:
  2321. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=46
  2322. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  2323. EAPOL: Received EAP-Packet frame
  2324. EAPOL: SUPP_BE entering state REQUEST
  2325. EAPOL: getSuppRsp
  2326. EAP: EAP entering state RECEIVED
  2327. EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
  2328. EAP: EAP entering state GET_METHOD
  2329. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
  2330. EAP: Status notification: accept proposed method (param=PEAP)
  2331. EAP: Using previous method data for fast re-authentication
  2332. EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
  2333. wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
  2334. EAP: EAP entering state METHOD
  2335. SSL: Received packet(len=6) - Flags 0x21
  2336. EAP-PEAP: Start (server ver=1, own ver=1)
  2337. EAP-PEAP: Using PEAP version 1
  2338. SSL: (where=0x10 ret=0x1)
  2339. SSL: (where=0x1001 ret=0x1)
  2340. SSL: SSL_connect:before SSL initialization
  2341. OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
  2342. OpenSSL: TX ver=0x303 content_type=22 (handshake/client hello)
  2343. SSL: (where=0x1001 ret=0x1)
  2344. SSL: SSL_connect:SSLv3/TLS write client hello
  2345. SSL: (where=0x1002 ret=0xffffffff)
  2346. SSL: SSL_connect:error in SSLv3/TLS write client hello
  2347. SSL: SSL_connect - want more data
  2348. SSL: 222 bytes pending from ssl_out
  2349. SSL: Using TLS version TLSv1.2
  2350. SSL: 222 bytes left to be sent out (of total 222 bytes)
  2351. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1dfabb8
  2352. EAP: EAP entering state SEND_RESPONSE
  2353. EAP: EAP entering state IDLE
  2354. EAPOL: SUPP_BE entering state RESPONSE
  2355. EAPOL: txSuppRsp
  2356. TX EAPOL: dst=b0:b8:67:ef:d9:11
  2357. EAPOL: SUPP_BE entering state RECEIVE
  2358. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1038
  2359. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  2360. EAPOL: Received EAP-Packet frame
  2361. EAPOL: SUPP_BE entering state REQUEST
  2362. EAPOL: getSuppRsp
  2363. EAP: EAP entering state RECEIVED
  2364. EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
  2365. EAP: EAP entering state METHOD
  2366. SSL: Received packet(len=1034) - Flags 0xc1
  2367. SSL: TLS Message Length: 6430
  2368. SSL: Need 5406 bytes more input data
  2369. SSL: Building ACK (type=25 id=3 ver=1)
  2370. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e233e0
  2371. EAP: EAP entering state SEND_RESPONSE
  2372. EAP: EAP entering state IDLE
  2373. EAPOL: SUPP_BE entering state RESPONSE
  2374. EAPOL: txSuppRsp
  2375. TX EAPOL: dst=b0:b8:67:ef:d9:11
  2376. EAPOL: SUPP_BE entering state RECEIVE
  2377. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1034
  2378. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  2379. EAPOL: Received EAP-Packet frame
  2380. EAPOL: SUPP_BE entering state REQUEST
  2381. EAPOL: getSuppRsp
  2382. EAP: EAP entering state RECEIVED
  2383. EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
  2384. EAP: EAP entering state METHOD
  2385. SSL: Received packet(len=1030) - Flags 0x41
  2386. SSL: Need 4382 bytes more input data
  2387. SSL: Building ACK (type=25 id=4 ver=1)
  2388. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1dff448
  2389. EAP: EAP entering state SEND_RESPONSE
  2390. EAP: EAP entering state IDLE
  2391. EAPOL: SUPP_BE entering state RESPONSE
  2392. EAPOL: txSuppRsp
  2393. TX EAPOL: dst=b0:b8:67:ef:d9:11
  2394. EAPOL: SUPP_BE entering state RECEIVE
  2395. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1034
  2396. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  2397. EAPOL: Received EAP-Packet frame
  2398. EAPOL: SUPP_BE entering state REQUEST
  2399. EAPOL: getSuppRsp
  2400. EAP: EAP entering state RECEIVED
  2401. EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0
  2402. EAP: EAP entering state METHOD
  2403. SSL: Received packet(len=1030) - Flags 0x41
  2404. SSL: Need 3358 bytes more input data
  2405. SSL: Building ACK (type=25 id=5 ver=1)
  2406. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e23440
  2407. EAP: EAP entering state SEND_RESPONSE
  2408. EAP: EAP entering state IDLE
  2409. EAPOL: SUPP_BE entering state RESPONSE
  2410. EAPOL: txSuppRsp
  2411. TX EAPOL: dst=b0:b8:67:ef:d9:11
  2412. EAPOL: SUPP_BE entering state RECEIVE
  2413. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1034
  2414. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  2415. EAPOL: Received EAP-Packet frame
  2416. EAPOL: SUPP_BE entering state REQUEST
  2417. EAPOL: getSuppRsp
  2418. EAP: EAP entering state RECEIVED
  2419. EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0
  2420. EAP: EAP entering state METHOD
  2421. SSL: Received packet(len=1030) - Flags 0x41
  2422. SSL: Need 2334 bytes more input data
  2423. SSL: Building ACK (type=25 id=6 ver=1)
  2424. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e05c30
  2425. EAP: EAP entering state SEND_RESPONSE
  2426. EAP: EAP entering state IDLE
  2427. EAPOL: SUPP_BE entering state RESPONSE
  2428. EAPOL: txSuppRsp
  2429. TX EAPOL: dst=b0:b8:67:ef:d9:11
  2430. EAPOL: SUPP_BE entering state RECEIVE
  2431. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1034
  2432. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  2433. EAPOL: Received EAP-Packet frame
  2434. EAPOL: SUPP_BE entering state REQUEST
  2435. EAPOL: getSuppRsp
  2436. EAP: EAP entering state RECEIVED
  2437. EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0
  2438. EAP: EAP entering state METHOD
  2439. SSL: Received packet(len=1030) - Flags 0x41
  2440. SSL: Need 1310 bytes more input data
  2441. SSL: Building ACK (type=25 id=7 ver=1)
  2442. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e233e0
  2443. EAP: EAP entering state SEND_RESPONSE
  2444. EAP: EAP entering state IDLE
  2445. EAPOL: SUPP_BE entering state RESPONSE
  2446. EAPOL: txSuppRsp
  2447. TX EAPOL: dst=b0:b8:67:ef:d9:11
  2448. EAPOL: SUPP_BE entering state RECEIVE
  2449. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1034
  2450. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  2451. EAPOL: Received EAP-Packet frame
  2452. EAPOL: SUPP_BE entering state REQUEST
  2453. EAPOL: getSuppRsp
  2454. EAP: EAP entering state RECEIVED
  2455. EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0
  2456. EAP: EAP entering state METHOD
  2457. SSL: Received packet(len=1030) - Flags 0x41
  2458. SSL: Need 286 bytes more input data
  2459. SSL: Building ACK (type=25 id=8 ver=1)
  2460. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1dff448
  2461. EAP: EAP entering state SEND_RESPONSE
  2462. EAP: EAP entering state IDLE
  2463. EAPOL: SUPP_BE entering state RESPONSE
  2464. EAPOL: txSuppRsp
  2465. TX EAPOL: dst=b0:b8:67:ef:d9:11
  2466. EAPOL: SUPP_BE entering state RECEIVE
  2467. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=296
  2468. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  2469. EAPOL: Received EAP-Packet frame
  2470. EAPOL: SUPP_BE entering state REQUEST
  2471. EAPOL: getSuppRsp
  2472. EAP: EAP entering state RECEIVED
  2473. EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0
  2474. EAP: EAP entering state METHOD
  2475. SSL: Received packet(len=292) - Flags 0x01
  2476. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  2477. SSL: (where=0x1001 ret=0x1)
  2478. SSL: SSL_connect:SSLv3/TLS write client hello
  2479. OpenSSL: RX ver=0x303 content_type=22 (handshake/server hello)
  2480. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  2481. SSL: (where=0x1001 ret=0x1)
  2482. SSL: SSL_connect:SSLv3/TLS read server hello
  2483. OpenSSL: RX ver=0x303 content_type=22 (handshake/certificate)
  2484. TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=3 buf='/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=AAA Certificate Services'
  2485. wlan0: CTRL-EVENT-EAP-PEER-CERT depth=3 subject='/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=AAA Certificate Services' hash=d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef4
  2486. TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=3 buf='/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=AAA Certificate Services'
  2487. wlan0: CTRL-EVENT-EAP-PEER-CERT depth=3 subject='/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=AAA Certificate Services' hash=d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef4
  2488. TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=2 buf='/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority'
  2489. wlan0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority' hash=68b9c761219a5b1f0131784474665db61bbdb109e00f05ca9f74244ee5f5f52b
  2490. TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=1 buf='/C=US/ST=MI/L=Ann Arbor/O=Internet2/OU=InCommon/CN=InCommon RSA Server CA'
  2491. wlan0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=US/ST=MI/L=Ann Arbor/O=Internet2/OU=InCommon/CN=InCommon RSA Server CA' hash=0a05c462756390dd1f1d5dd82794c300f04be789dce76d7e312f790d68fd385a
  2492. TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=0 buf='[OMITTED]'
  2493. wlan0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='[OMITTED]' hash=74e40048dc2c07b1b5498b2792ceb62b976cc29d5c704d0426cedbccb49a8e31
  2494. wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:clearpass.[OMITTED].edu
  2495. wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:clearpass-cra.[OMITTED].edu
  2496. wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:clearpass-hv.[OMITTED].edu
  2497. wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:clearpass-tel-2.[OMITTED].edu
  2498. wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:clearpass-tel.[OMITTED].edu
  2499. EAP: Status notification: remote certificate verification (param=success)
  2500. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  2501. SSL: (where=0x1001 ret=0x1)
  2502. SSL: SSL_connect:SSLv3/TLS read server certificate
  2503. OpenSSL: RX ver=0x303 content_type=22 (handshake/server key exchange)
  2504. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  2505. SSL: (where=0x1001 ret=0x1)
  2506. SSL: SSL_connect:SSLv3/TLS read server key exchange
  2507. OpenSSL: RX ver=0x303 content_type=22 (handshake/server hello done)
  2508. SSL: (where=0x1001 ret=0x1)
  2509. SSL: SSL_connect:SSLv3/TLS read server done
  2510. OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
  2511. OpenSSL: TX ver=0x303 content_type=22 (handshake/client key exchange)
  2512. SSL: (where=0x1001 ret=0x1)
  2513. SSL: SSL_connect:SSLv3/TLS write client key exchange
  2514. OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
  2515. OpenSSL: TX ver=0x303 content_type=20 (change cipher spec/)
  2516. SSL: (where=0x1001 ret=0x1)
  2517. SSL: SSL_connect:SSLv3/TLS write change cipher spec
  2518. OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
  2519. OpenSSL: TX ver=0x303 content_type=22 (handshake/finished)
  2520. SSL: (where=0x1001 ret=0x1)
  2521. SSL: SSL_connect:SSLv3/TLS write finished
  2522. SSL: (where=0x1002 ret=0xffffffff)
  2523. SSL: SSL_connect:error in SSLv3/TLS write finished
  2524. SSL: SSL_connect - want more data
  2525. SSL: 126 bytes pending from ssl_out
  2526. SSL: Using TLS version TLSv1.2
  2527. SSL: 126 bytes left to be sent out (of total 126 bytes)
  2528. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e22660
  2529. EAP: EAP entering state SEND_RESPONSE
  2530. EAP: EAP entering state IDLE
  2531. EAPOL: SUPP_BE entering state RESPONSE
  2532. EAPOL: txSuppRsp
  2533. TX EAPOL: dst=b0:b8:67:ef:d9:11
  2534. EAPOL: SUPP_BE entering state RECEIVE
  2535. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=65
  2536. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  2537. EAPOL: Received EAP-Packet frame
  2538. EAPOL: SUPP_BE entering state REQUEST
  2539. EAPOL: getSuppRsp
  2540. EAP: EAP entering state RECEIVED
  2541. EAP: Received EAP-Request id=10 method=25 vendor=0 vendorMethod=0
  2542. EAP: EAP entering state METHOD
  2543. SSL: Received packet(len=61) - Flags 0x81
  2544. SSL: TLS Message Length: 51
  2545. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  2546. SSL: (where=0x1001 ret=0x1)
  2547. SSL: SSL_connect:SSLv3/TLS write finished
  2548. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  2549. SSL: (where=0x1001 ret=0x1)
  2550. SSL: SSL_connect:SSLv3/TLS read change cipher spec
  2551. OpenSSL: RX ver=0x303 content_type=22 (handshake/finished)
  2552. SSL: (where=0x1001 ret=0x1)
  2553. SSL: SSL_connect:SSLv3/TLS read finished
  2554. SSL: (where=0x20 ret=0x1)
  2555. SSL: (where=0x1002 ret=0x1)
  2556. SSL: 0 bytes pending from ssl_out
  2557. OpenSSL: Handshake finished - resumed=0
  2558. SSL: No Application Data included
  2559. SSL: Using TLS version TLSv1.2
  2560. SSL: No data to be sent out
  2561. EAP-PEAP: TLS done, proceed to Phase 2
  2562. EAP-PEAP: using label 'client EAP encryption' in key derivation
  2563. EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
  2564. EAP-PEAP: Derived Session-Id - hexdump(len=65): 19 ba 2a ef 81 d2 71 b3 e8 d0 0d 3e e5 82 1d 2b 26 a6 af e9 20 b4 03 49 b0 fb ea 6e 64 71 80 16 ae 0f 03 f5 90 93 cd 28 24 0b f9 67 70 bd ff 04 03 c6 25 73 fd 6a 68 36 d0 ee 46 77 c8 51 74 14 42
  2565. EAP-PEAP: Workaround - allow outer EAP-Success to terminate PEAP resumption
  2566. SSL: Building ACK (type=25 id=10 ver=1)
  2567. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=COND_SUCC eapRespData=0x1e23300
  2568. EAP: Session-Id - hexdump(len=65): 19 ba 2a ef 81 d2 71 b3 e8 d0 0d 3e e5 82 1d 2b 26 a6 af e9 20 b4 03 49 b0 fb ea 6e 64 71 80 16 ae 0f 03 f5 90 93 cd 28 24 0b f9 67 70 bd ff 04 03 c6 25 73 fd 6a 68 36 d0 ee 46 77 c8 51 74 14 42
  2569. EAP: EAP entering state SEND_RESPONSE
  2570. EAP: EAP entering state IDLE
  2571. EAPOL: SUPP_BE entering state RESPONSE
  2572. EAPOL: txSuppRsp
  2573. TX EAPOL: dst=b0:b8:67:ef:d9:11
  2574. EAPOL: SUPP_BE entering state RECEIVE
  2575. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=46
  2576. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  2577. EAPOL: Received EAP-Packet frame
  2578. EAPOL: SUPP_BE entering state REQUEST
  2579. EAPOL: getSuppRsp
  2580. EAP: EAP entering state RECEIVED
  2581. EAP: Received EAP-Request id=11 method=25 vendor=0 vendorMethod=0
  2582. EAP: EAP entering state METHOD
  2583. SSL: Received packet(len=40) - Flags 0x01
  2584. EAP-PEAP: received 34 bytes encrypted data for Phase 2
  2585. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  2586. EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 0b 00 05 01
  2587. EAP-PEAP: received Phase 2: code=1 identifier=11 length=5
  2588. EAP-PEAP: Phase 2 Request: type=1
  2589. EAP: using real identity - hexdump_ascii(len=24):
  2590. [OMITTED]
  2591. EAP-PEAP: Encrypting Phase 2 data - hexdump(len=29): [REMOVED]
  2592. OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
  2593. SSL: 58 bytes left to be sent out (of total 58 bytes)
  2594. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e02d68
  2595. EAP: Session-Id - hexdump(len=65): 19 ba 2a ef 81 d2 71 b3 e8 d0 0d 3e e5 82 1d 2b 26 a6 af e9 20 b4 03 49 b0 fb ea 6e 64 71 80 16 ae 0f 03 f5 90 93 cd 28 24 0b f9 67 70 bd ff 04 03 c6 25 73 fd 6a 68 36 d0 ee 46 77 c8 51 74 14 42
  2596. EAP: EAP entering state SEND_RESPONSE
  2597. EAP: EAP entering state IDLE
  2598. EAPOL: SUPP_BE entering state RESPONSE
  2599. EAPOL: txSuppRsp
  2600. TX EAPOL: dst=b0:b8:67:ef:d9:11
  2601. EAPOL: SUPP_BE entering state RECEIVE
  2602. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=89
  2603. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  2604. EAPOL: Received EAP-Packet frame
  2605. EAPOL: SUPP_BE entering state REQUEST
  2606. EAPOL: getSuppRsp
  2607. EAP: EAP entering state RECEIVED
  2608. EAP: Received EAP-Request id=12 method=25 vendor=0 vendorMethod=0
  2609. EAP: EAP entering state METHOD
  2610. SSL: Received packet(len=85) - Flags 0x01
  2611. EAP-PEAP: received 79 bytes encrypted data for Phase 2
  2612. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  2613. EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=50): 01 0c 00 32 1a 01 0c 00 2d 10 c0 57 02 3e e6 f0 52 f1 4a 08 b9 3b 5b 6f 08 12 72 6f 68 72 65 72 67 6a 40 72 6f 73 65 2d 68 75 6c 6d 61 6e 2e 65 64 75
  2614. EAP-PEAP: received Phase 2: code=1 identifier=12 length=50
  2615. EAP-PEAP: Phase 2 Request: type=26
  2616. EAP-MSCHAPV2: RX identifier 12 mschapv2_id 12
  2617. EAP-MSCHAPV2: Received challenge
  2618. EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=24):
  2619. [OMITTED]
  2620. EAP-MSCHAPV2: Generating Challenge Response
  2621. MSCHAPV2: Identity - hexdump_ascii(len=24):
  2622. [OMITTED]
  2623. MSCHAPV2: Username - hexdump_ascii(len=24):
  2624. [OMITTED]
  2625. MSCHAPV2: auth_challenge - hexdump(len=16): c0 57 02 3e e6 f0 52 f1 4a 08 b9 3b 5b 6f 08 12
  2626. MSCHAPV2: peer_challenge - hexdump(len=16): 2d dc b4 7a 7b 58 0c 62 c2 4d 5f ea d3 19 cc 21
  2627. MSCHAPV2: username - hexdump_ascii(len=24):
  2628. [OMITTED]
  2629. MSCHAPV2: password hash - hexdump(len=16): [REMOVED]
  2630. MSCHAPV2: NT Response - hexdump(len=24): f9 08 46 93 e4 89 5d df 31 aa c8 68 eb 95 a3 ff 31 50 f3 0e 7f ef 4e 11
  2631. MSCHAPV2: Auth Response - hexdump(len=20): 46 fb c1 4a 57 ad cb 5e 52 3e 0f 79 c8 83 ed 68 69 a9 8e f5
  2632. MSCHAPV2: Master Key - hexdump(len=16): [REMOVED]
  2633. EAP-MSCHAPV2: TX identifier 12 mschapv2_id 12 (response)
  2634. EAP-PEAP: Encrypting Phase 2 data - hexdump(len=83): [REMOVED]
  2635. OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
  2636. SSL: 112 bytes left to be sent out (of total 112 bytes)
  2637. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e02de8
  2638. EAP: Session-Id - hexdump(len=65): 19 ba 2a ef 81 d2 71 b3 e8 d0 0d 3e e5 82 1d 2b 26 a6 af e9 20 b4 03 49 b0 fb ea 6e 64 71 80 16 ae 0f 03 f5 90 93 cd 28 24 0b f9 67 70 bd ff 04 03 c6 25 73 fd 6a 68 36 d0 ee 46 77 c8 51 74 14 42
  2639. EAP: EAP entering state SEND_RESPONSE
  2640. EAP: EAP entering state IDLE
  2641. EAPOL: SUPP_BE entering state RESPONSE
  2642. EAPOL: txSuppRsp
  2643. TX EAPOL: dst=b0:b8:67:ef:d9:11
  2644. EAPOL: SUPP_BE entering state RECEIVE
  2645. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=90
  2646. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  2647. EAPOL: Received EAP-Packet frame
  2648. EAPOL: SUPP_BE entering state REQUEST
  2649. EAPOL: getSuppRsp
  2650. EAP: EAP entering state RECEIVED
  2651. EAP: Received EAP-Request id=13 method=25 vendor=0 vendorMethod=0
  2652. EAP: EAP entering state METHOD
  2653. SSL: Received packet(len=86) - Flags 0x01
  2654. EAP-PEAP: received 80 bytes encrypted data for Phase 2
  2655. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  2656. EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=51): 01 0d 00 33 1a 03 0c 00 2e 53 3d 34 36 46 42 43 31 34 41 35 37 41 44 43 42 35 45 35 32 33 45 30 46 37 39 43 38 38 33 45 44 36 38 36 39 41 39 38 45 46 35
  2657. EAP-PEAP: received Phase 2: code=1 identifier=13 length=51
  2658. EAP-PEAP: Phase 2 Request: type=26
  2659. EAP-MSCHAPV2: RX identifier 13 mschapv2_id 12
  2660. EAP-MSCHAPV2: Received success
  2661. EAP-MSCHAPV2: Success message - hexdump_ascii(len=0):
  2662. EAP-MSCHAPV2: Authentication succeeded
  2663. EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED]
  2664. OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
  2665. SSL: 35 bytes left to be sent out (of total 35 bytes)
  2666. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e22430
  2667. EAP: Session-Id - hexdump(len=65): 19 ba 2a ef 81 d2 71 b3 e8 d0 0d 3e e5 82 1d 2b 26 a6 af e9 20 b4 03 49 b0 fb ea 6e 64 71 80 16 ae 0f 03 f5 90 93 cd 28 24 0b f9 67 70 bd ff 04 03 c6 25 73 fd 6a 68 36 d0 ee 46 77 c8 51 74 14 42
  2668. EAP: EAP entering state SEND_RESPONSE
  2669. EAP: EAP entering state IDLE
  2670. EAPOL: SUPP_BE entering state RESPONSE
  2671. EAPOL: txSuppRsp
  2672. TX EAPOL: dst=b0:b8:67:ef:d9:11
  2673. EAPOL: SUPP_BE entering state RECEIVE
  2674. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=50
  2675. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  2676. EAPOL: Received EAP-Packet frame
  2677. EAPOL: SUPP_BE entering state REQUEST
  2678. EAPOL: getSuppRsp
  2679. EAP: EAP entering state RECEIVED
  2680. EAP: Received EAP-Request id=14 method=25 vendor=0 vendorMethod=0
  2681. EAP: EAP entering state METHOD
  2682. SSL: Received packet(len=46) - Flags 0x01
  2683. EAP-PEAP: received 40 bytes encrypted data for Phase 2
  2684. OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
  2685. EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 0e 00 0b 21 80 03 00 02 00 01
  2686. EAP-PEAP: received Phase 2: code=1 identifier=14 length=11
  2687. EAP-PEAP: Phase 2 Request: type=33
  2688. EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01
  2689. EAP-TLV: Result TLV - hexdump(len=2): 00 01
  2690. EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed
  2691. EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED]
  2692. OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
  2693. SSL: 40 bytes left to be sent out (of total 40 bytes)
  2694. EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC eapRespData=0x1dfbdd0
  2695. EAP: Session-Id - hexdump(len=65): 19 ba 2a ef 81 d2 71 b3 e8 d0 0d 3e e5 82 1d 2b 26 a6 af e9 20 b4 03 49 b0 fb ea 6e 64 71 80 16 ae 0f 03 f5 90 93 cd 28 24 0b f9 67 70 bd ff 04 03 c6 25 73 fd 6a 68 36 d0 ee 46 77 c8 51 74 14 42
  2696. EAP: EAP entering state SEND_RESPONSE
  2697. EAP: EAP entering state IDLE
  2698. EAPOL: SUPP_BE entering state RESPONSE
  2699. EAPOL: txSuppRsp
  2700. TX EAPOL: dst=b0:b8:67:ef:d9:11
  2701. EAPOL: SUPP_BE entering state RECEIVE
  2702. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=46
  2703. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  2704. EAPOL: Received EAP-Packet frame
  2705. EAPOL: SUPP_BE entering state REQUEST
  2706. EAPOL: getSuppRsp
  2707. EAP: EAP entering state RECEIVED
  2708. EAP: Received EAP-Success
  2709. EAP: Status notification: completion (param=success)
  2710. EAP: EAP entering state SUCCESS
  2711. wlan0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
  2712. EAPOL: SUPP_PAE entering state AUTHENTICATED
  2713. EAPOL: Supplicant port status: Authorized
  2714. nl80211: Set supplicant port authorized for b0:b8:67:ef:d9:11
  2715. EAPOL: SUPP_BE entering state RECEIVE
  2716. EAPOL: SUPP_BE entering state SUCCESS
  2717. EAPOL: SUPP_BE entering state IDLE
  2718. EAPOL authentication completed - result=SUCCESS
  2719. Configure PMK for driver-based RSN 4-way handshake
  2720. EAPOL: Successfully fetched key (len=32)
  2721. RSN: Configure PMK for driver-based 4-way handshake - hexdump(len=32): [REMOVED]
  2722. wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=5 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=32
  2723. nl80211: Set PMK to the driver for b0:b8:67:ef:d9:11
  2724. nl80211: PMK - hexdump(len=32): [REMOVED]
  2725. nl80211: Set PMK failed: ret=-22 (Invalid argument)
  2726. Failed to set PMK to the driver
  2727. wlan0: Cancelling scan request
  2728. wlan0: Cancelling authentication timeout
  2729. Removed BSSID b0:b8:67:ef:d9:11 from blacklist
  2730. wlan0: State: ASSOCIATED -> COMPLETED
  2731. wlan0: Radio work 'connect'@0x1dff250 done in 3.092585 seconds
  2732. wlan0: radio_work_free('connect'@0x1dff250): num_active_works --> 0
  2733. wlan0: CTRL-EVENT-CONNECTED - Connection to b0:b8:67:ef:d9:11 completed [id=0 id_str=]
  2734. nl80211: Set wlan0 operstate 0->1 (UP)
  2735. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
  2736. wlan0: Determining shared radio frequencies (max len 2)
  2737. wlan0: Shared frequencies (len=1): completed iteration
  2738. wlan0: freq[0]: 5745, flags=0x1
  2739. P2P: Add operating class 81
  2740. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  2741. P2P: Add operating class 115
  2742. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2743. P2P: Add operating class 116
  2744. P2P: Channels - hexdump(len=2): 24 2c
  2745. P2P: Add operating class 117
  2746. P2P: Channels - hexdump(len=2): 28 30
  2747. P2P: Add operating class 124
  2748. P2P: Channels - hexdump(len=4): 95 99 9d a1
  2749. P2P: Add operating class 125
  2750. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  2751. P2P: Add operating class 126
  2752. P2P: Channels - hexdump(len=2): 95 9d
  2753. P2P: Add operating class 127
  2754. P2P: Channels - hexdump(len=2): 99 a1
  2755. P2P: Add operating class 128
  2756. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2757. P2P: Add operating class 130
  2758. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2759. P2P: Update channel list
  2760. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  2761. P2P: cli_channels:
  2762. RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  2763. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=121
  2764. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  2765. EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
  2766. EAPOL: External notification - portValid=1
  2767. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=121
  2768. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  2769. EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
  2770. EAPOL: External notification - portValid=1
  2771. EAPOL: startWhen --> 0
  2772. l2_packet_receive: src=b0:b8:67:ef:d9:11 len=121
  2773. wlan0: RX EAPOL from b0:b8:67:ef:d9:11
  2774. EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
  2775. EAPOL: External notification - portValid=1
  2776. RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
  2777. nl80211: Ignored event (cmd=48) for foreign interface (ifindex 3 wdev 0x0)
  2778. nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlan0
  2779. nl80211: Disconnect event
  2780. wlan0: Event DEAUTH (11) received
  2781. wlan0: Deauthentication notification
  2782. wlan0: * reason 3
  2783. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  2784. wlan0: CTRL-EVENT-DISCONNECTED bssid=b0:b8:67:ef:d9:11 reason=3
  2785. wlan0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9)
  2786. wlan0: Setting scan request: 0.100000 sec
  2787. Added BSSID b0:b8:67:ef:d9:11 into blacklist
  2788. wlan0: Another BSS in this ESS has been seen; try it next
  2789. BSSID b0:b8:67:ef:d9:11 blacklist count incremented to 2
  2790. wlan0: Blacklist count 1 --> request scan in 100 ms
  2791. wlan0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner
  2792. TDLS: Remove peers on disassociation
  2793. wlan0: WPA: Clear old PMK and PTK
  2794. wlan0: Disconnect event - remove keys
  2795. wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
  2796. wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x1ddc304 key_idx=0 set_tx=0 seq_len=0 key_len=0
  2797. addr=b0:b8:67:ef:d9:11
  2798. nl80211: Data frame filter flags=0x0
  2799. wlan0: State: COMPLETED -> DISCONNECTED
  2800. nl80211: Set wlan0 operstate 1->0 (DORMANT)
  2801. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  2802. wlan0: Determining shared radio frequencies (max len 2)
  2803. wlan0: Shared frequencies (len=0): completed iteration
  2804. P2P: Add operating class 81
  2805. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  2806. P2P: Add operating class 115
  2807. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2808. P2P: Add operating class 116
  2809. P2P: Channels - hexdump(len=2): 24 2c
  2810. P2P: Add operating class 117
  2811. P2P: Channels - hexdump(len=2): 28 30
  2812. P2P: Add operating class 124
  2813. P2P: Channels - hexdump(len=4): 95 99 9d a1
  2814. P2P: Add operating class 125
  2815. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  2816. P2P: Add operating class 126
  2817. P2P: Channels - hexdump(len=2): 95 9d
  2818. P2P: Add operating class 127
  2819. P2P: Channels - hexdump(len=2): 99 a1
  2820. P2P: Add operating class 128
  2821. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2822. P2P: Add operating class 130
  2823. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2824. P2P: Update channel list
  2825. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  2826. P2P: cli_channels:
  2827. EAPOL: External notification - portEnabled=0
  2828. EAPOL: SUPP_PAE entering state DISCONNECTED
  2829. EAPOL: Supplicant port status: Unauthorized
  2830. nl80211: Skip set_supp_port(unauthorized) while not associated
  2831. EAPOL: SUPP_BE entering state INITIALIZE
  2832. EAP: EAP entering state DISABLED
  2833. EAPOL: External notification - portValid=0
  2834. RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
  2835. nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for p2p-dev-wlan0
  2836. nl80211: Regulatory domain change
  2837. * initiator=0
  2838. * type=1
  2839. p2p-dev-wlan0: Event CHANNEL_LIST_CHANGED (27) received
  2840. wlan0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
  2841. p2p-dev-wlan0: Updating hw mode
  2842. nl80211: Regulatory information - country=US (DFS-FCC)
  2843. nl80211: 2402-2472 @ 40 MHz 30 mBm
  2844. nl80211: 5170-5250 @ 80 MHz 23 mBm
  2845. nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
  2846. nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
  2847. nl80211: 5735-5835 @ 80 MHz 30 mBm
  2848. nl80211: 57240-63720 @ 2160 MHz 40 mBm
  2849. nl80211: Added 802.11b mode based on 802.11g information
  2850. nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  2851. nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
  2852. nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  2853. wlan0: Updating hw mode
  2854. nl80211: Regulatory information - country=US (DFS-FCC)
  2855. nl80211: 2402-2472 @ 40 MHz 30 mBm
  2856. nl80211: 5170-5250 @ 80 MHz 23 mBm
  2857. nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
  2858. nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
  2859. nl80211: 5735-5835 @ 80 MHz 30 mBm
  2860. nl80211: 57240-63720 @ 2160 MHz 40 mBm
  2861. nl80211: Added 802.11b mode based on 802.11g information
  2862. nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  2863. nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
  2864. nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  2865. p2p-dev-wlan0: Determining shared radio frequencies (max len 2)
  2866. p2p-dev-wlan0: Shared frequencies (len=0): completed iteration
  2867. P2P: Add operating class 81
  2868. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  2869. P2P: Add operating class 115
  2870. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2871. P2P: Add operating class 116
  2872. P2P: Channels - hexdump(len=2): 24 2c
  2873. P2P: Add operating class 117
  2874. P2P: Channels - hexdump(len=2): 28 30
  2875. P2P: Add operating class 124
  2876. P2P: Channels - hexdump(len=4): 95 99 9d a1
  2877. P2P: Add operating class 125
  2878. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  2879. P2P: Add operating class 126
  2880. P2P: Channels - hexdump(len=2): 95 9d
  2881. P2P: Add operating class 127
  2882. P2P: Channels - hexdump(len=2): 99 a1
  2883. P2P: Add operating class 128
  2884. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2885. P2P: Add operating class 130
  2886. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2887. P2P: Update channel list
  2888. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  2889. P2P: cli_channels:
  2890. nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for p2p-dev-wlan0
  2891. nl80211: Regulatory domain change
  2892. * initiator=1
  2893. * type=0
  2894. * alpha2=US
  2895. p2p-dev-wlan0: Event CHANNEL_LIST_CHANGED (27) received
  2896. wlan0: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=US
  2897. p2p-dev-wlan0: Updating hw mode
  2898. nl80211: Regulatory information - country=US (DFS-FCC)
  2899. nl80211: 2402-2472 @ 40 MHz 30 mBm
  2900. nl80211: 5170-5250 @ 80 MHz 23 mBm
  2901. nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
  2902. nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
  2903. nl80211: 5735-5835 @ 80 MHz 30 mBm
  2904. nl80211: 57240-63720 @ 2160 MHz 40 mBm
  2905. nl80211: Added 802.11b mode based on 802.11g information
  2906. nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  2907. nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
  2908. nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  2909. wlan0: Updating hw mode
  2910. nl80211: Regulatory information - country=US (DFS-FCC)
  2911. nl80211: 2402-2472 @ 40 MHz 30 mBm
  2912. nl80211: 5170-5250 @ 80 MHz 23 mBm
  2913. nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
  2914. nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
  2915. nl80211: 5735-5835 @ 80 MHz 30 mBm
  2916. nl80211: 57240-63720 @ 2160 MHz 40 mBm
  2917. nl80211: Added 802.11b mode based on 802.11g information
  2918. nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  2919. nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
  2920. nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
  2921. p2p-dev-wlan0: Determining shared radio frequencies (max len 2)
  2922. p2p-dev-wlan0: Shared frequencies (len=0): completed iteration
  2923. P2P: Add operating class 81
  2924. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  2925. P2P: Add operating class 115
  2926. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2927. P2P: Add operating class 116
  2928. P2P: Channels - hexdump(len=2): 24 2c
  2929. P2P: Add operating class 117
  2930. P2P: Channels - hexdump(len=2): 28 30
  2931. P2P: Add operating class 124
  2932. P2P: Channels - hexdump(len=4): 95 99 9d a1
  2933. P2P: Add operating class 125
  2934. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  2935. P2P: Add operating class 126
  2936. P2P: Channels - hexdump(len=2): 95 9d
  2937. P2P: Add operating class 127
  2938. P2P: Channels - hexdump(len=2): 99 a1
  2939. P2P: Add operating class 128
  2940. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2941. P2P: Add operating class 130
  2942. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2943. P2P: Update channel list
  2944. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  2945. P2P: cli_channels:
  2946. wlan0: State: DISCONNECTED -> SCANNING
  2947. wlan0: Determining shared radio frequencies (max len 2)
  2948. wlan0: Shared frequencies (len=0): completed iteration
  2949. P2P: Add operating class 81
  2950. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  2951. P2P: Add operating class 115
  2952. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2953. P2P: Add operating class 116
  2954. P2P: Channels - hexdump(len=2): 24 2c
  2955. P2P: Add operating class 117
  2956. P2P: Channels - hexdump(len=2): 28 30
  2957. P2P: Add operating class 124
  2958. P2P: Channels - hexdump(len=4): 95 99 9d a1
  2959. P2P: Add operating class 125
  2960. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  2961. P2P: Add operating class 126
  2962. P2P: Channels - hexdump(len=2): 95 9d
  2963. P2P: Add operating class 127
  2964. P2P: Channels - hexdump(len=2): 99 a1
  2965. P2P: Add operating class 128
  2966. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2967. P2P: Add operating class 130
  2968. P2P: Channels - hexdump(len=4): 24 28 2c 30
  2969. P2P: Update channel list
  2970. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  2971. P2P: cli_channels:
  2972. Scan SSID - hexdump_ascii(len=7):
  2973. 65 64 75 72 6f 61 6d eduroam
  2974. wlan0: Starting AP scan for wildcard SSID
  2975. WPS: Building WPS IE for Probe Request
  2976. WPS: * Version (hardcoded 0x10)
  2977. WPS: * Request Type
  2978. WPS: * Config Methods (3148)
  2979. WPS: * UUID-E
  2980. WPS: * Primary Device Type
  2981. WPS: * RF Bands (3)
  2982. WPS: * Association State
  2983. WPS: * Configuration Error (0)
  2984. WPS: * Device Password ID (0)
  2985. WPS: * Manufacturer
  2986. WPS: * Model Name
  2987. WPS: * Model Number
  2988. WPS: * Device Name
  2989. WPS: * Version2 (0x20)
  2990. P2P: * P2P IE header
  2991. P2P: * Capability dev=25 group=00
  2992. P2P: * Listen Channel: Regulatory Class 81 Channel 6
  2993. wlan0: Optimize scan based on previously generated frequency list
  2994. wlan0: Add radio work 'scan'@0x1e31280
  2995. wlan0: First radio work item in the queue - schedule start immediately
  2996. wlan0: Starting radio work 'scan'@0x1e31280 after 0.000053 second wait
  2997. wlan0: nl80211: scan request
  2998. Scan requested (ret=0) - scan timeout 30 seconds
  2999. nl80211: Ignored event (cmd=33) for foreign interface (ifindex 3 wdev 0x0)
  3000. nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
  3001. wlan0: nl80211: Scan trigger
  3002. wlan0: Event SCAN_STARTED (46) received
  3003. wlan0: Own scan request started a scan in 0.000749 seconds
  3004. RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
  3005. nl80211: Ignored event (cmd=34) for foreign interface (ifindex 3 wdev 0x0)
  3006. nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
  3007. wlan0: nl80211: New scan results available
  3008. nl80211: Scan probed for SSID 'eduroam'
  3009. nl80211: Scan probed for SSID ''
  3010. nl80211: Scan included frequencies: 5200 5240 2462 2412 2437
  3011. wlan0: Event SCAN_RESULTS (3) received
  3012. wlan0: Scan completed in 0.217013 seconds
  3013. nl80211: Received scan results (19 BSSes)
  3014. wlan0: BSS: Start scan result update 4
  3015. wlan0: BSS: Add new id 18 BSSID b0:b8:67:ef:47:c1 SSID 'eduroam' freq 2412
  3016. BSS: last_scan_res_used=19/32
  3017. wlan0: New scan results available (own=1 ext=0)
  3018. WPS: AP f2:a3:b2:31:45:e3 type 0 added
  3019. WPS: AP[0] f2:a3:b2:31:45:e3 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  3020. wlan0: Radio work 'scan'@0x1e31280 done in 0.220367 seconds
  3021. wlan0: radio_work_free('scan'@0x1e31280): num_active_works --> 0
  3022. wlan0: Selecting BSS from priority group 0
  3023. wlan0: 0: b0:b8:67:ef:d9:11 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-49 freq=5745
  3024. wlan0: skip - blacklisted (count=2 limit=0)
  3025. wlan0: 1: b0:b8:67:ed:fc:51 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-54 freq=5200
  3026. wlan0: selected based on RSN IE
  3027. wlan0: selected BSS b0:b8:67:ed:fc:51 ssid='eduroam'
  3028. wlan0: Considering connect request: reassociate: 0 selected: b0:b8:67:ed:fc:51 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x1dde570 current_ssid=(nil)
  3029. wlan0: Request association with b0:b8:67:ed:fc:51
  3030. wlan0: Re-association to the same ESS
  3031. TDLS: TDLS is allowed in the target BSS
  3032. TDLS: TDLS channel switch allowed in the target BSS
  3033. wlan0: No ongoing scan/p2p-scan found to abort
  3034. wlan0: Add radio work 'connect'@0x1e238b8
  3035. wlan0: First radio work item in the queue - schedule start immediately
  3036. RSN: Ignored PMKID candidate without preauth flag
  3037. RSN: Ignored PMKID candidate without preauth flag
  3038. RSN: Ignored PMKID candidate without preauth flag
  3039. RSN: Ignored PMKID candidate without preauth flag
  3040. RSN: Ignored PMKID candidate without preauth flag
  3041. RSN: Ignored PMKID candidate without preauth flag
  3042. RSN: Ignored PMKID candidate without preauth flag
  3043. RSN: Ignored PMKID candidate without preauth flag
  3044. RSN: Ignored PMKID candidate without preauth flag
  3045. p2p-dev-wlan0: Updating scan results from sibling
  3046. nl80211: Received scan results (19 BSSes)
  3047. p2p-dev-wlan0: BSS: Start scan result update 4
  3048. p2p-dev-wlan0: BSS: Add new id 18 BSSID b0:b8:67:ef:47:c1 SSID 'eduroam' freq 2412
  3049. BSS: last_scan_res_used=19/32
  3050. wlan0: Starting radio work 'connect'@0x1e238b8 after 0.001952 second wait
  3051. wlan0: Trying to associate with SSID 'eduroam'
  3052. wlan0: Cancelling scan request
  3053. wlan0: WPA: clearing own WPA/RSN IE
  3054. RSN: PMKSA cache search - network_ctx=0x1dde570 try_opportunistic=0 akmp=0x0
  3055. RSN: Search for BSSID b0:b8:67:ed:fc:51
  3056. RSN: No PMKSA cache entry found
  3057. wlan0: RSN: using IEEE 802.11i/D9.0
  3058. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  3059. wlan0: WPA: Selected mgmt group cipher 32
  3060. wlan0: WPA: clearing AP WPA IE
  3061. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
  3062. wlan0: WPA: using GTK CCMP
  3063. wlan0: WPA: using PTK CCMP
  3064. wlan0: WPA: using KEY_MGMT 802.1X
  3065. wlan0: WPA: not using MGMT group cipher
  3066. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  3067. WPA: No current PMKSA - clear PMK
  3068. wlan0: Automatic auth_alg selection: 0x1
  3069. Added supported operating classes IE - hexdump(len=22): 3b 14 73 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82
  3070. wlan0: State: SCANNING -> ASSOCIATING
  3071. nl80211: Set wlan0 operstate 0->0 (DORMANT)
  3072. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  3073. wlan0: Determining shared radio frequencies (max len 2)
  3074. wlan0: Shared frequencies (len=0): completed iteration
  3075. P2P: Add operating class 81
  3076. P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
  3077. P2P: Add operating class 115
  3078. P2P: Channels - hexdump(len=4): 24 28 2c 30
  3079. P2P: Add operating class 116
  3080. P2P: Channels - hexdump(len=2): 24 2c
  3081. P2P: Add operating class 117
  3082. P2P: Channels - hexdump(len=2): 28 30
  3083. P2P: Add operating class 124
  3084. P2P: Channels - hexdump(len=4): 95 99 9d a1
  3085. P2P: Add operating class 125
  3086. P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
  3087. P2P: Add operating class 126
  3088. P2P: Channels - hexdump(len=2): 95 9d
  3089. P2P: Add operating class 127
  3090. P2P: Channels - hexdump(len=2): 99 a1
  3091. P2P: Add operating class 128
  3092. P2P: Channels - hexdump(len=4): 24 28 2c 30
  3093. P2P: Add operating class 130
  3094. P2P: Channels - hexdump(len=4): 24 28 2c 30
  3095. P2P: Update channel list
  3096. P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
  3097. P2P: cli_channels:
  3098. wlan0: set_disable_max_amsdu: -1
  3099. wlan0: set_ampdu_factor: -1
  3100. wlan0: set_ampdu_density: -1
  3101. wlan0: set_disable_ht40: 0
  3102. wlan0: set_disable_sgi: 0
  3103. wlan0: set_disable_ldpc: 0
  3104. wlan0: set_rx_stbc: -1
  3105. wlan0: set_tx_stbc: -1
  3106. nl80211: Set mode ifindex 3 iftype 2 (STATION)
  3107. nl80211: Unsubscribe mgmt frames handle 0x89555629 (mode change)
  3108. nl80211: Subscribe to mgmt frames with non-AP handle 0x1dddea0
  3109. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0104
  3110. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040a
  3111. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040b
  3112. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040c
  3113. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040d
  3114. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090a
  3115. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090b
  3116. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090c
  3117. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090d
  3118. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0409506f9a09
  3119. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=7f506f9a09
  3120. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0409506f9a1a
  3121. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0801
  3122. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040e
  3123. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=12
  3124. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=06
  3125. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a07
  3126. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a11
  3127. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a1a
  3128. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=1101
  3129. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=1102
  3130. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0505
  3131. nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0500
  3132. nl80211: Connect (ifindex=3)
  3133. * bssid_hint=b0:b8:67:ed:fc:51
  3134. * freq_hint=5200
  3135. * SSID - hexdump_ascii(len=7):
  3136. 65 64 75 72 6f 61 6d eduroam
  3137. * IEs - hexdump(len=44): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 3b 14 73 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82
  3138. * WPA Versions 0x2
  3139. * pairwise=0xfac04
  3140. * group=0xfac04
  3141. * akm=0xfac01
  3142. * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  3143. * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  3144. * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
  3145. * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
  3146. * Auth Type 0
  3147. nl80211: Connect request send successfully
  3148. wlan0: Setting authentication timeout: 10 sec 0 usec
  3149. EAPOL: External notification - EAP success=0
  3150. EAPOL: External notification - EAP fail=0
  3151. EAPOL: External notification - portControl=Auto
  3152. EAPOL: disable timer tick
  3153. ^Cp2p-dev-wlan0: Removing interface p2p-dev-wlan0
  3154. p2p-dev-wlan0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=DISCONNECTED
  3155. TDLS: Tear down peers
  3156. nl80211: Data frame filter flags=0x0
  3157. nl80211: Failed to open /proc/sys/net/ipv4/conf/p2p-dev-wlan0/drop_unicast_in_l2_multicast: No such file or directory
  3158. nl80211: Failed to set IPv4 unicast in multicast filter
  3159. p2p-dev-wlan0: State: DISCONNECTED -> DISCONNECTED
  3160. nl80211: Set p2p-dev-wlan0 operstate 0->0 (DORMANT)
  3161. netlink: Operstate: ifindex=0 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  3162. EAPOL: External notification - portEnabled=0
  3163. EAPOL: External notification - portValid=0
  3164. p2p-dev-wlan0: WPA: Clear old PMK and PTK
  3165. p2p-dev-wlan0: BSS: Remove id 0 BSSID b0:b8:67:ef:d9:11 SSID 'eduroam' due to wpa_bss_flush
  3166. p2p-dev-wlan0: BSS: Remove id 1 BSSID b0:b8:67:ed:fc:51 SSID 'eduroam' due to wpa_bss_flush
  3167. p2p-dev-wlan0: BSS: Remove id 2 BSSID b0:b8:67:f1:57:91 SSID 'eduroam' due to wpa_bss_flush
  3168. p2p-dev-wlan0: BSS: Remove id 3 BSSID b0:b8:67:ef:d9:01 SSID 'eduroam' due to wpa_bss_flush
  3169. p2p-dev-wlan0: BSS: Remove id 4 BSSID b0:b8:67:ed:fc:41 SSID 'eduroam' due to wpa_bss_flush
  3170. p2p-dev-wlan0: BSS: Remove id 5 BSSID b0:b8:67:f1:57:81 SSID 'eduroam' due to wpa_bss_flush
  3171. p2p-dev-wlan0: BSS: Remove id 6 BSSID b0:b8:67:ef:47:d1 SSID 'eduroam' due to wpa_bss_flush
  3172. p2p-dev-wlan0: BSS: Remove id 7 BSSID 38:17:c3:af:96:e1 SSID 'eduroam' due to wpa_bss_flush
  3173. p2p-dev-wlan0: BSS: Remove id 18 BSSID b0:b8:67:ef:47:c1 SSID 'eduroam' due to wpa_bss_flush
  3174. p2p-dev-wlan0: BSS: Remove id 16 BSSID f2:a3:b2:31:45:e3 SSID '' due to wpa_bss_flush
  3175. p2p-dev-wlan0: BSS: Remove id 8 BSSID b0:b8:67:ef:d9:10 SSID 'XXX-OPEN' due to wpa_bss_flush
  3176. p2p-dev-wlan0: BSS: Remove id 9 BSSID b0:b8:67:ed:fc:50 SSID 'XXX-OPEN' due to wpa_bss_flush
  3177. p2p-dev-wlan0: BSS: Remove id 10 BSSID b0:b8:67:f1:57:90 SSID 'XXX-OPEN' due to wpa_bss_flush
  3178. p2p-dev-wlan0: BSS: Remove id 11 BSSID b0:b8:67:ef:d9:00 SSID 'XXX-OPEN' due to wpa_bss_flush
  3179. p2p-dev-wlan0: BSS: Remove id 12 BSSID b0:b8:67:ed:fc:40 SSID 'XXX-OPEN' due to wpa_bss_flush
  3180. p2p-dev-wlan0: BSS: Remove id 13 BSSID b0:b8:67:f1:57:80 SSID 'XXX-OPEN' due to wpa_bss_flush
  3181. p2p-dev-wlan0: BSS: Remove id 15 BSSID 38:17:c3:af:96:e0 SSID 'XXX-OPEN' due to wpa_bss_flush
  3182. p2p-dev-wlan0: BSS: Remove id 14 BSSID b0:b8:67:ef:47:d0 SSID 'XXX-OPEN' due to wpa_bss_flush
  3183. p2p-dev-wlan0: BSS: Remove id 17 BSSID b0:b8:67:ef:47:c0 SSID 'XXX-OPEN' due to wpa_bss_flush
  3184. p2p-dev-wlan0: Cancelling delayed sched scan
  3185. p2p-dev-wlan0: Cancelling scan request
  3186. p2p-dev-wlan0: Cancelling authentication timeout
  3187. Off-channel: Clear pending Action frame TX (pending_action_tx=(nil)
  3188. nl80211: Data frame filter flags=0x0
  3189. nl80211: Failed to open /proc/sys/net/ipv4/conf/p2p-dev-wlan0/drop_unicast_in_l2_multicast: No such file or directory
  3190. nl80211: Failed to set IPv4 unicast in multicast filter
  3191. HS20: Delete all stored icons
  3192. Off-channel: Action frame sequence done notification: pending_action_tx=(nil) drv_offchan_tx=1 action_tx_wait_time=0 off_channel_freq=0 roc_waiting_drv_freq=0
  3193. p2p-dev-wlan0: P2P: Disable P2P since removing the management interface is being removed
  3194. P2P: All ASP advertisements flushed
  3195. P2P: Disabling Extended Listen Timing
  3196. P2P: Stopping find
  3197. P2P: Clear timeout (state=IDLE)
  3198. P2P: State IDLE -> IDLE
  3199. P2P: All ASP advertisements flushed
  3200. Remove interface p2p-dev-wlan0 from radio phy0
  3201. nl80211: deinit ifname=p2p-dev-wlan0 disabled_11b_rates=0
  3202. nl80211: Remove monitor interface: refcount=0
  3203. netlink: Operstate: ifindex=0 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
  3204. nl80211: Stop P2P Device p2p-dev-wlan0 (0x6): Success
  3205. nl80211: Unsubscribe mgmt frames handle 0x8957f3a9 (deinit)
  3206. nl80211: Delete P2P Device p2p-dev-wlan0 (0x6): Success
  3207. p2p-dev-wlan0: CTRL-EVENT-TERMINATING
  3208. Control interface directory not empty - leaving it behind
  3209. wlan0: Removing interface wlan0
  3210. wlan0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=b0:b8:67:ed:fc:51 reason=3 state=ASSOCIATING
  3211. TDLS: Tear down peers
  3212. wpa_driver_nl80211_disconnect(reason_code=3)
  3213. wlan0: Event DEAUTH (11) received
  3214. wlan0: Deauthentication notification
  3215. wlan0: * reason 3 (locally generated)
  3216. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  3217. wlan0: CTRL-EVENT-DISCONNECTED bssid=b0:b8:67:ed:fc:51 reason=3 locally_generated=1
  3218. wlan0: Auto connect disabled: do not try to re-connect
  3219. wlan0: Radio work 'connect'@0x1e238b8 done in 0.980123 seconds
  3220. wlan0: radio_work_free('connect'@0x1e238b8): num_active_works --> 0
  3221. wlan0: Ignore connection failure indication since interface has been put into disconnected state
  3222. TDLS: Remove peers on disassociation
  3223. wlan0: WPA: Clear old PMK and PTK
  3224. wlan0: Disconnect event - remove keys
  3225. nl80211: Data frame filter flags=0x0
  3226. wlan0: State: ASSOCIATING -> DISCONNECTED
  3227. nl80211: Set wlan0 operstate 0->0 (DORMANT)
  3228. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  3229. EAPOL: External notification - portEnabled=0
  3230. EAPOL: External notification - portValid=0
  3231. nl80211: Data frame filter flags=0x0
  3232. wlan0: State: DISCONNECTED -> DISCONNECTED
  3233. nl80211: Set wlan0 operstate 0->0 (DORMANT)
  3234. netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  3235. EAPOL: External notification - portEnabled=0
  3236. EAPOL: External notification - portValid=0
  3237. EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit
  3238. ENGINE: engine deinit
  3239. wlan0: WPA: Clear old PMK and PTK
  3240. Removed BSSID b0:b8:67:ef:d9:11 from blacklist (clear)
  3241. wlan0: BSS: Remove id 0 BSSID b0:b8:67:ef:d9:11 SSID 'eduroam' due to wpa_bss_flush
  3242. wlan0: BSS: Remove id 1 BSSID b0:b8:67:ed:fc:51 SSID 'eduroam' due to wpa_bss_flush
  3243. wlan0: BSS: Remove id 2 BSSID b0:b8:67:f1:57:91 SSID 'eduroam' due to wpa_bss_flush
  3244. wlan0: BSS: Remove id 3 BSSID b0:b8:67:ef:d9:01 SSID 'eduroam' due to wpa_bss_flush
  3245. wlan0: BSS: Remove id 4 BSSID b0:b8:67:ed:fc:41 SSID 'eduroam' due to wpa_bss_flush
  3246. wlan0: BSS: Remove id 5 BSSID b0:b8:67:f1:57:81 SSID 'eduroam' due to wpa_bss_flush
  3247. wlan0: BSS: Remove id 6 BSSID b0:b8:67:ef:47:d1 SSID 'eduroam' due to wpa_bss_flush
  3248. wlan0: BSS: Remove id 7 BSSID 38:17:c3:af:96:e1 SSID 'eduroam' due to wpa_bss_flush
  3249. wlan0: BSS: Remove id 18 BSSID b0:b8:67:ef:47:c1 SSID 'eduroam' due to wpa_bss_flush
  3250. wlan0: BSS: Remove id 16 BSSID f2:a3:b2:31:45:e3 SSID '' due to wpa_bss_flush
  3251. wlan0: BSS: Remove id 8 BSSID b0:b8:67:ef:d9:10 SSID 'XXX-OPEN' due to wpa_bss_flush
  3252. wlan0: BSS: Remove id 9 BSSID b0:b8:67:ed:fc:50 SSID 'XXX-OPEN' due to wpa_bss_flush
  3253. wlan0: BSS: Remove id 10 BSSID b0:b8:67:f1:57:90 SSID 'XXX-OPEN' due to wpa_bss_flush
  3254. wlan0: BSS: Remove id 11 BSSID b0:b8:67:ef:d9:00 SSID 'XXX-OPEN' due to wpa_bss_flush
  3255. wlan0: BSS: Remove id 12 BSSID b0:b8:67:ed:fc:40 SSID 'XXX-OPEN' due to wpa_bss_flush
  3256. wlan0: BSS: Remove id 13 BSSID b0:b8:67:f1:57:80 SSID 'XXX-OPEN' due to wpa_bss_flush
  3257. wlan0: BSS: Remove id 15 BSSID 38:17:c3:af:96:e0 SSID 'XXX-OPEN' due to wpa_bss_flush
  3258. wlan0: BSS: Remove id 14 BSSID b0:b8:67:ef:47:d0 SSID 'XXX-OPEN' due to wpa_bss_flush
  3259. wlan0: BSS: Remove id 17 BSSID b0:b8:67:ef:47:c0 SSID 'XXX-OPEN' due to wpa_bss_flush
  3260. wlan0: Cancelling delayed sched scan
  3261. wlan0: Cancelling scan request
  3262. wlan0: Cancelling authentication timeout
  3263. Off-channel: Clear pending Action frame TX (pending_action_tx=(nil)
  3264. nl80211: Data frame filter flags=0x0
  3265. HS20: Delete all stored icons
  3266. Off-channel: Action frame sequence done notification: pending_action_tx=(nil) drv_offchan_tx=1 action_tx_wait_time=0 off_channel_freq=0 roc_waiting_drv_freq=0
  3267. Remove interface wlan0 from radio phy0
  3268. Remove radio phy0
  3269. nl80211: deinit ifname=wlan0 disabled_11b_rates=0
  3270. nl80211: Remove monitor interface: refcount=0
  3271. netlink: Operstate: ifindex=3 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
  3272. nl80211: Set mode ifindex 3 iftype 2 (STATION)
  3273. nl80211: Unsubscribe mgmt frames handle 0x89555629 (mode change)
  3274. wlan0: CTRL-EVENT-TERMINATING
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement