Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- pi@raspberrypi:~ $ sudo wpa_supplicant -c/etc/wpa_supplicant/wpa_supplicant.conf -iwlan0 -Dnl80211,wext -d
- wpa_supplicant v2.8-devel
- random: getrandom() support available
- Successfully initialized wpa_supplicant
- Initializing interface 'wlan0' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'nl80211,wext' ctrl_interface 'N/A' bridge 'N/A'
- Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf'
- Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
- ctrl_interface='DIR=/var/run/wpa_supplicant GROUP=netdev'
- update_config=1
- ap_scan=1
- country='US'
- Priority group 0
- id=0 ssid='eduroam'
- nl80211: Using driver-based roaming
- nl80211: TDLS supported
- nl80211: Supported cipher 00-0f-ac:1
- nl80211: Supported cipher 00-0f-ac:5
- nl80211: Supported cipher 00-0f-ac:2
- nl80211: Supported cipher 00-0f-ac:4
- nl80211: Supported cipher 00-0f-ac:6
- nl80211: Using driver-based off-channel TX
- nl80211: Supported vendor command: vendor_id=0x1018 subcmd=1
- nl80211: Use separate P2P group interface (driver advertised support)
- nl80211: Enable multi-channel concurrent (driver advertised support)
- nl80211: use P2P_DEVICE support
- nl80211: interface wlan0 in phy phy0
- nl80211: Set mode ifindex 3 iftype 2 (STATION)
- nl80211: Subscribe to mgmt frames with non-AP handle 0x1dddea0
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0104
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040b
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040c
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040d
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090b
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090c
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090d
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0409506f9a09
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=7f506f9a09
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0409506f9a1a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0801
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040e
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=12
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=06
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a07
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a11
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a1a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=1101
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=1102
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0505
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0500
- rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
- netlink: Operstate: ifindex=3 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
- Add interface wlan0 to a new radio phy0
- nl80211: Regulatory information - country=US (DFS-FCC)
- nl80211: 2402-2472 @ 40 MHz 30 mBm
- nl80211: 5170-5250 @ 80 MHz 23 mBm
- nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
- nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
- nl80211: 5735-5835 @ 80 MHz 30 mBm
- nl80211: 57240-63720 @ 2160 MHz 40 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
- nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- wlan0: Own MAC address: d6:29:1b:62:bf:a0
- wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
- wlan0: RSN: flushing PMKID list in the driver
- nl80211: Flush PMKIDs
- TDLS: TDLS operation supported by driver
- TDLS: Driver uses internal link setup
- TDLS: Driver does not support TDLS channel switching
- wlan0: WPS: UUID based on MAC address: e55180dd-1e52-504b-93fa-b5157eafd72b
- ENGINE: Loading dynamic engine
- ENGINE: Loading dynamic engine
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Skip set_supp_port(unauthorized) while not associated
- EAPOL: KEY_RX entering state NO_KEY_RECEIVE
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- ctrl_interface_group=109 (from group name 'netdev')
- wlan0: Added interface wlan0
- wlan0: State: DISCONNECTED -> DISCONNECTED
- nl80211: Set wlan0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- nl80211: Create interface iftype 10 (P2P_DEVICE)
- nl80211: New P2P Device interface p2p-dev-wlan0 (0x6) created
- Initializing interface 'p2p-dev-wlan0' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'nl80211' ctrl_interface 'DIR=/var/run/wpa_supplicant GROUP=netdev' bridge 'N/A'
- Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf'
- Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
- ctrl_interface='DIR=/var/run/wpa_supplicant GROUP=netdev'
- update_config=1
- ap_scan=1
- country='US'
- Priority group 0
- id=0 ssid='eduroam'
- nl80211: Using driver-based roaming
- nl80211: TDLS supported
- nl80211: Supported cipher 00-0f-ac:1
- nl80211: Supported cipher 00-0f-ac:5
- nl80211: Supported cipher 00-0f-ac:2
- nl80211: Supported cipher 00-0f-ac:4
- nl80211: Supported cipher 00-0f-ac:6
- nl80211: Using driver-based off-channel TX
- nl80211: Supported vendor command: vendor_id=0x1018 subcmd=1
- nl80211: Use separate P2P group interface (driver advertised support)
- nl80211: Enable multi-channel concurrent (driver advertised support)
- nl80211: use P2P_DEVICE support
- nl80211: interface p2p-dev-wlan0 in phy phy0
- nl80211: Set mode ifindex 0 iftype 10 (P2P_DEVICE)
- nl80211: Failed to set interface 0 to mode 10: -22 (Invalid argument)
- nl80211: Subscribe to mgmt frames with non-AP handle 0x1df7b20
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=0104
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=040a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=040b
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=040c
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=040d
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=090a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=090b
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=090c
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=090d
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=0409506f9a09
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=7f506f9a09
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=0409506f9a1a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=0801
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=040e
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=12
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=06
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=0a07
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=0a11
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=0a1a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=1101
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=1102
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=0505
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1df7b20 match=0500
- nl80211: Use (wlan0) to initialize P2P Device rfkill
- rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
- nl80211: Start P2P Device p2p-dev-wlan0 (0x6): Success
- Add interface p2p-dev-wlan0 to existing radio phy0
- nl80211: Regulatory information - country=US (DFS-FCC)
- nl80211: 2402-2472 @ 40 MHz 30 mBm
- nl80211: 5170-5250 @ 80 MHz 23 mBm
- nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
- nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
- nl80211: 5735-5835 @ 80 MHz 30 mBm
- nl80211: 57240-63720 @ 2160 MHz 40 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
- nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- p2p-dev-wlan0: Own MAC address: 1a:e5:de:04:13:ab
- p2p-dev-wlan0: RSN: flushing PMKID list in the driver
- nl80211: Flush PMKIDs
- p2p-dev-wlan0: State: DISCONNECTED -> INACTIVE
- p2p-dev-wlan0: WPS: UUID from the first interface: e55180dd-1e52-504b-93fa-b5157eafd72b
- ENGINE: Loading dynamic engine
- ENGINE: Loading dynamic engine
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Skip set_supp_port(unauthorized) while not associated
- EAPOL: KEY_RX entering state NO_KEY_RECEIVE
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- Using existing control interface directory.
- ctrl_interface_group=109 (from group name 'netdev')
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Own listen channel: 81:6
- P2P: Random operating channel: 81:6
- P2P: initialized
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- p2p-dev-wlan0: Added interface p2p-dev-wlan0
- p2p-dev-wlan0: State: INACTIVE -> DISCONNECTED
- nl80211: Set p2p-dev-wlan0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=0 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- p2p-dev-wlan0: Determining shared radio frequencies (max len 2)
- p2p-dev-wlan0: Shared frequencies (len=0): completed iteration
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=5 linkmode=0 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- wlan0: Starting delayed sched scan
- wlan0: Use normal scan instead of sched_scan for initial scans (normal_scans=0)
- wlan0: Setting scan request: 0.000000 sec
- wlan0: State: DISCONNECTED -> SCANNING
- wlan0: Determining shared radio frequencies (max len 2)
- wlan0: Shared frequencies (len=0): completed iteration
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- Scan SSID - hexdump_ascii(len=7):
- 65 64 75 72 6f 61 6d eduroam
- wlan0: Starting AP scan for wildcard SSID
- WPS: Building WPS IE for Probe Request
- WPS: * Version (hardcoded 0x10)
- WPS: * Request Type
- WPS: * Config Methods (3148)
- WPS: * UUID-E
- WPS: * Primary Device Type
- WPS: * RF Bands (3)
- WPS: * Association State
- WPS: * Configuration Error (0)
- WPS: * Device Password ID (0)
- WPS: * Manufacturer
- WPS: * Model Name
- WPS: * Model Number
- WPS: * Device Name
- WPS: * Version2 (0x20)
- P2P: * P2P IE header
- P2P: * Capability dev=25 group=00
- P2P: * Listen Channel: Regulatory Class 81 Channel 6
- wlan0: Add radio work 'scan'@0x1dfd060
- wlan0: First radio work item in the queue - schedule start immediately
- wlan0: Starting radio work 'scan'@0x1dfd060 after 0.000057 second wait
- wlan0: nl80211: scan request
- Scan requested (ret=0) - scan timeout 10 seconds
- nl80211: Ignored event (cmd=33) for foreign interface (ifindex 3 wdev 0x0)
- nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
- wlan0: nl80211: Scan trigger
- wlan0: Event SCAN_STARTED (46) received
- wlan0: Own scan request started a scan in 0.000192 seconds
- EAPOL: disable timer tick
- EAPOL: disable timer tick
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- nl80211: Ignored event (cmd=34) for foreign interface (ifindex 3 wdev 0x0)
- nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
- wlan0: nl80211: New scan results available
- nl80211: Scan probed for SSID 'eduroam'
- nl80211: Scan probed for SSID ''
- nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5720 5745 5765 5785 5805 5825
- wlan0: Event SCAN_RESULTS (3) received
- wlan0: Scan completed in 2.814294 seconds
- nl80211: Received scan results (16 BSSes)
- wlan0: BSS: Start scan result update 1
- wlan0: BSS: Add new id 0 BSSID b0:b8:67:ef:d9:11 SSID 'eduroam' freq 5745
- wlan0: BSS: Add new id 1 BSSID b0:b8:67:ed:fc:51 SSID 'eduroam' freq 5200
- wlan0: BSS: Add new id 2 BSSID b0:b8:67:f1:57:91 SSID 'eduroam' freq 5240
- wlan0: BSS: Add new id 3 BSSID b0:b8:67:ef:d9:01 SSID 'eduroam' freq 2462
- wlan0: BSS: Add new id 4 BSSID b0:b8:67:ed:fc:41 SSID 'eduroam' freq 2412
- wlan0: BSS: Add new id 5 BSSID b0:b8:67:f1:57:81 SSID 'eduroam' freq 2462
- wlan0: BSS: Add new id 6 BSSID b0:b8:67:ef:47:d1 SSID 'eduroam' freq 5200
- wlan0: BSS: Add new id 7 BSSID 38:17:c3:af:96:e1 SSID 'eduroam' freq 2437
- wlan0: BSS: Add new id 8 BSSID b0:b8:67:ef:d9:10 SSID 'XXX-OPEN' freq 5745
- wlan0: BSS: Add new id 9 BSSID b0:b8:67:ed:fc:50 SSID 'XXX-OPEN' freq 5200
- wlan0: BSS: Add new id 10 BSSID b0:b8:67:f1:57:90 SSID 'XXX-OPEN' freq 5240
- wlan0: BSS: Add new id 11 BSSID b0:b8:67:ef:d9:00 SSID 'XXX-OPEN' freq 2462
- wlan0: BSS: Add new id 12 BSSID b0:b8:67:ed:fc:40 SSID 'XXX-OPEN' freq 2412
- wlan0: BSS: Add new id 13 BSSID b0:b8:67:f1:57:80 SSID 'XXX-OPEN' freq 2462
- wlan0: BSS: Add new id 14 BSSID b0:b8:67:ef:47:d0 SSID 'XXX-OPEN' freq 5200
- wlan0: BSS: Add new id 15 BSSID 38:17:c3:af:96:e0 SSID 'XXX-OPEN' freq 2437
- BSS: last_scan_res_used=16/32
- wlan0: New scan results available (own=1 ext=0)
- wlan0: Radio work 'scan'@0x1dfd060 done in 2.837155 seconds
- wlan0: radio_work_free('scan'@0x1dfd060): num_active_works --> 0
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: b0:b8:67:ef:d9:11 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-48 freq=5745
- wlan0: selected based on RSN IE
- wlan0: selected BSS b0:b8:67:ef:d9:11 ssid='eduroam'
- wlan0: Considering connect request: reassociate: 0 selected: b0:b8:67:ef:d9:11 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x1dde570 current_ssid=(nil)
- wlan0: Request association with b0:b8:67:ef:d9:11
- TDLS: TDLS is allowed in the target BSS
- TDLS: TDLS channel switch allowed in the target BSS
- wlan0: No ongoing scan/p2p-scan found to abort
- wlan0: Add radio work 'connect'@0x1dff250
- wlan0: First radio work item in the queue - schedule start immediately
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- p2p-dev-wlan0: Updating scan results from sibling
- nl80211: Received scan results (16 BSSes)
- p2p-dev-wlan0: BSS: Start scan result update 1
- p2p-dev-wlan0: BSS: Add new id 0 BSSID b0:b8:67:ef:d9:11 SSID 'eduroam' freq 5745
- p2p-dev-wlan0: BSS: Add new id 1 BSSID b0:b8:67:ed:fc:51 SSID 'eduroam' freq 5200
- p2p-dev-wlan0: BSS: Add new id 2 BSSID b0:b8:67:f1:57:91 SSID 'eduroam' freq 5240
- p2p-dev-wlan0: BSS: Add new id 3 BSSID b0:b8:67:ef:d9:01 SSID 'eduroam' freq 2462
- p2p-dev-wlan0: BSS: Add new id 4 BSSID b0:b8:67:ed:fc:41 SSID 'eduroam' freq 2412
- p2p-dev-wlan0: BSS: Add new id 5 BSSID b0:b8:67:f1:57:81 SSID 'eduroam' freq 2462
- p2p-dev-wlan0: BSS: Add new id 6 BSSID b0:b8:67:ef:47:d1 SSID 'eduroam' freq 5200
- p2p-dev-wlan0: BSS: Add new id 7 BSSID 38:17:c3:af:96:e1 SSID 'eduroam' freq 2437
- p2p-dev-wlan0: BSS: Add new id 8 BSSID b0:b8:67:ef:d9:10 SSID 'XXX-OPEN' freq 5745
- p2p-dev-wlan0: BSS: Add new id 9 BSSID b0:b8:67:ed:fc:50 SSID 'XXX-OPEN' freq 5200
- p2p-dev-wlan0: BSS: Add new id 10 BSSID b0:b8:67:f1:57:90 SSID 'XXX-OPEN' freq 5240
- p2p-dev-wlan0: BSS: Add new id 11 BSSID b0:b8:67:ef:d9:00 SSID 'XXX-OPEN' freq 2462
- p2p-dev-wlan0: BSS: Add new id 12 BSSID b0:b8:67:ed:fc:40 SSID 'XXX-OPEN' freq 2412
- p2p-dev-wlan0: BSS: Add new id 13 BSSID b0:b8:67:f1:57:80 SSID 'XXX-OPEN' freq 2462
- p2p-dev-wlan0: BSS: Add new id 14 BSSID b0:b8:67:ef:47:d0 SSID 'XXX-OPEN' freq 5200
- p2p-dev-wlan0: BSS: Add new id 15 BSSID 38:17:c3:af:96:e0 SSID 'XXX-OPEN' freq 2437
- BSS: last_scan_res_used=16/32
- wlan0: Starting radio work 'connect'@0x1dff250 after 0.001725 second wait
- wlan0: Trying to associate with SSID 'eduroam'
- wlan0: Cancelling scan request
- wlan0: WPA: clearing own WPA/RSN IE
- RSN: PMKSA cache search - network_ctx=0x1dde570 try_opportunistic=0 akmp=0x0
- RSN: Search for BSSID b0:b8:67:ef:d9:11
- RSN: No PMKSA cache entry found
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: Selected mgmt group cipher 32
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- WPA: No current PMKSA - clear PMK
- wlan0: Automatic auth_alg selection: 0x1
- Added supported operating classes IE - hexdump(len=22): 3b 14 7c 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82
- wlan0: State: SCANNING -> ASSOCIATING
- nl80211: Set wlan0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- wlan0: Determining shared radio frequencies (max len 2)
- wlan0: Shared frequencies (len=0): completed iteration
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- wlan0: set_disable_max_amsdu: -1
- wlan0: set_ampdu_factor: -1
- wlan0: set_ampdu_density: -1
- wlan0: set_disable_ht40: 0
- wlan0: set_disable_sgi: 0
- wlan0: set_disable_ldpc: 0
- wlan0: set_rx_stbc: -1
- wlan0: set_tx_stbc: -1
- nl80211: Set mode ifindex 3 iftype 2 (STATION)
- nl80211: Unsubscribe mgmt frames handle 0x89555629 (mode change)
- nl80211: Subscribe to mgmt frames with non-AP handle 0x1dddea0
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0104
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040b
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040c
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040d
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090b
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090c
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090d
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0409506f9a09
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=7f506f9a09
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0409506f9a1a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0801
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040e
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=12
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=06
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a07
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a11
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a1a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=1101
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=1102
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0505
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0500
- nl80211: Connect (ifindex=3)
- * bssid_hint=b0:b8:67:ef:d9:11
- * freq_hint=5745
- * SSID - hexdump_ascii(len=7):
- 65 64 75 72 6f 61 6d eduroam
- * IEs - hexdump(len=44): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 3b 14 7c 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82
- * WPA Versions 0x2
- * pairwise=0xfac04
- * group=0xfac04
- * akm=0xfac01
- * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
- * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
- * Auth Type 0
- nl80211: Connect request send successfully
- wlan0: Setting authentication timeout: 10 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - EAP fail=0
- EAPOL: External notification - portControl=Auto
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=46
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- wlan0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00)
- nl80211: Ignored event (cmd=46) for foreign interface (ifindex 3 wdev 0x0)
- nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlan0
- nl80211: Connect event (status=0 ignore_next_local_disconnect=0)
- nl80211: Associated on 5745 MHz
- nl80211: Associated with b0:b8:67:ef:d9:11
- nl80211: Operating frequency for the associated BSS from scan results: 5745 MHz
- nl80211: Associated on 5745 MHz
- nl80211: Associated with b0:b8:67:ef:d9:11
- nl80211: Set drv->ssid based on scan res info to 'eduroam'
- wlan0: Event ASSOC (0) received
- wlan0: Association info event
- req_ies - hexdump(len=130): 00 07 65 64 75 72 6f 61 6d 01 05 24 b0 c8 60 6c 21 02 03 e0 24 0a 24 04 34 04 64 0c 95 04 a5 01 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 2d 1a 63 00 17 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 08 00 00 00 00 40 bf 0c 32 50 80 0f fe ff 00 00 fe ff 00 00 dd 09 00 10 18 02 00 00 10 00 00 dd 07 00 50 f2 02 00 01 00 01 00 00 ff
- resp_ies - hexdump(len=122): 01 05 24 b0 c8 60 6c 2d 1a ef 09 1b ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 95 05 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 bf 0c 91 79 8b 33 aa ff 00 00 aa ff 00 00 c0 05 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 00 fe ff 00 00 dd
- IEEE 802.11 element parse failed (id=0 elen=254 left=4)
- wlan0: freq=5745 MHz
- WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- Truncated IE in assoc_info - hexdump(len=6): 00 fe ff 00 00 dd
- FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
- wlan0: State: ASSOCIATING -> ASSOCIATED
- nl80211: Set wlan0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- wlan0: Determining shared radio frequencies (max len 2)
- wlan0: Shared frequencies (len=1): completed iteration
- wlan0: freq[0]: 5745, flags=0x1
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- wlan0: Associated to a new BSS: BSSID=b0:b8:67:ef:d9:11
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
- wlan0: Associated with b0:b8:67:ef:d9:11
- wlan0: WPA: Association event - clear replay counter
- wlan0: WPA: Clear old PTK
- TDLS: Remove peers on association
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: SUPP_BE entering state IDLE
- EAP: EAP entering state INITIALIZE
- EAP: EAP entering state IDLE
- wlan0: Setting authentication timeout: 10 sec 0 usec
- wlan0: Cancelling scan request
- EAPOL: External notification - portValid=1
- wlan0: Process pending EAPOL frame that was received just before association notification
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- wlan0: Setting authentication timeout: 70 sec 0 usec
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_PAE entering state RESTART
- EAP: EAP entering state INITIALIZE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
- EAP: EAP entering state IDENTITY
- wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
- EAP: Status notification: started (param=)
- EAP: EAP-Request Identity data - hexdump_ascii(len=0):
- EAP: using real identity - hexdump_ascii(len=24):
- [OMITTED]
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for p2p-dev-wlan0
- nl80211: Regulatory domain change
- * initiator=3
- * type=0
- * alpha2=US
- p2p-dev-wlan0: Event CHANNEL_LIST_CHANGED (27) received
- wlan0: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=US
- p2p-dev-wlan0: Updating hw mode
- nl80211: Regulatory information - country=US (DFS-FCC)
- nl80211: 2402-2472 @ 40 MHz 30 mBm
- nl80211: 5170-5250 @ 80 MHz 23 mBm
- nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
- nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
- nl80211: 5735-5835 @ 80 MHz 30 mBm
- nl80211: 57240-63720 @ 2160 MHz 40 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
- nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- wlan0: Updating hw mode
- nl80211: Regulatory information - country=US (DFS-FCC)
- nl80211: 2402-2472 @ 40 MHz 30 mBm
- nl80211: 5170-5250 @ 80 MHz 23 mBm
- nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
- nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
- nl80211: 5735-5835 @ 80 MHz 30 mBm
- nl80211: 57240-63720 @ 2160 MHz 40 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
- nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- p2p-dev-wlan0: Determining shared radio frequencies (max len 2)
- p2p-dev-wlan0: Shared frequencies (len=1): completed iteration
- p2p-dev-wlan0: freq[0]: 5745, flags=0x1
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=46
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
- EAP: Status notification: accept proposed method (param=PEAP)
- EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
- TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
- TLS: using phase1 config options
- wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
- EAP: EAP entering state METHOD
- SSL: Received packet(len=6) - Flags 0x21
- EAP-PEAP: Start (server ver=1, own ver=1)
- EAP-PEAP: Using PEAP version 1
- SSL: (where=0x10 ret=0x1)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:before SSL initialization
- OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
- OpenSSL: TX ver=0x303 content_type=22 (handshake/client hello)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS write client hello
- SSL: (where=0x1002 ret=0xffffffff)
- SSL: SSL_connect:error in SSLv3/TLS write client hello
- SSL: SSL_connect - want more data
- SSL: 190 bytes pending from ssl_out
- SSL: Using TLS version TLSv1.2
- SSL: 190 bytes left to be sent out (of total 190 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e0a7a0
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1038
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1034) - Flags 0xc1
- SSL: TLS Message Length: 6430
- SSL: Need 5406 bytes more input data
- SSL: Building ACK (type=25 id=3 ver=1)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e09100
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1034
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1030) - Flags 0x41
- SSL: Need 4382 bytes more input data
- SSL: Building ACK (type=25 id=4 ver=1)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e09100
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1034
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1030) - Flags 0x41
- SSL: Need 3358 bytes more input data
- SSL: Building ACK (type=25 id=5 ver=1)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e09100
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1034
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1030) - Flags 0x41
- SSL: Need 2334 bytes more input data
- SSL: Building ACK (type=25 id=6 ver=1)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e09100
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1034
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1030) - Flags 0x41
- SSL: Need 1310 bytes more input data
- SSL: Building ACK (type=25 id=7 ver=1)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e09100
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1034
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1030) - Flags 0x41
- SSL: Need 286 bytes more input data
- SSL: Building ACK (type=25 id=8 ver=1)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e09100
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=296
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=292) - Flags 0x01
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS write client hello
- OpenSSL: RX ver=0x303 content_type=22 (handshake/server hello)
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS read server hello
- OpenSSL: RX ver=0x303 content_type=22 (handshake/certificate)
- TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=3 buf='/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=AAA Certificate Services'
- wlan0: CTRL-EVENT-EAP-PEER-CERT depth=3 subject='/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=AAA Certificate Services' hash=d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef4
- TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=3 buf='/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=AAA Certificate Services'
- wlan0: CTRL-EVENT-EAP-PEER-CERT depth=3 subject='/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=AAA Certificate Services' hash=d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef4
- TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=2 buf='/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority'
- wlan0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority' hash=68b9c761219a5b1f0131784474665db61bbdb109e00f05ca9f74244ee5f5f52b
- TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=1 buf='/C=US/ST=MI/L=Ann Arbor/O=Internet2/OU=InCommon/CN=InCommon RSA Server CA'
- wlan0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=US/ST=MI/L=Ann Arbor/O=Internet2/OU=InCommon/CN=InCommon RSA Server CA' hash=0a05c462756390dd1f1d5dd82794c300f04be789dce76d7e312f790d68fd385a
- TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=0 buf='[OMITTED]
- wlan0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='[OMITTED]hash=74e40048dc2c07b1b5498b2792ceb62b976cc29d5c704d0426cedbccb49a8e31
- wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:clearpass.[OMITTED].edu
- wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:clearpass-cra.[OMITTED].edu
- wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:clearpass-hv.[OMITTED].edu
- wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:clearpass-tel-2.[OMITTED].edu
- wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:clearpass-tel.[OMITTED].edu
- EAP: Status notification: remote certificate verification (param=success)
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS read server certificate
- OpenSSL: RX ver=0x303 content_type=22 (handshake/server key exchange)
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS read server key exchange
- OpenSSL: RX ver=0x303 content_type=22 (handshake/server hello done)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS read server done
- OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
- OpenSSL: TX ver=0x303 content_type=22 (handshake/client key exchange)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS write client key exchange
- OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
- OpenSSL: TX ver=0x303 content_type=20 (change cipher spec/)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS write change cipher spec
- OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
- OpenSSL: TX ver=0x303 content_type=22 (handshake/finished)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS write finished
- SSL: (where=0x1002 ret=0xffffffff)
- SSL: SSL_connect:error in SSLv3/TLS write finished
- SSL: SSL_connect - want more data
- SSL: 126 bytes pending from ssl_out
- SSL: Using TLS version TLSv1.2
- SSL: 126 bytes left to be sent out (of total 126 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1df80a0
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=65
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=10 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=61) - Flags 0x81
- SSL: TLS Message Length: 51
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS write finished
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS read change cipher spec
- OpenSSL: RX ver=0x303 content_type=22 (handshake/finished)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS read finished
- SSL: (where=0x20 ret=0x1)
- SSL: (where=0x1002 ret=0x1)
- SSL: 0 bytes pending from ssl_out
- OpenSSL: Handshake finished - resumed=0
- SSL: No Application Data included
- SSL: Using TLS version TLSv1.2
- SSL: No data to be sent out
- EAP-PEAP: TLS done, proceed to Phase 2
- EAP-PEAP: using label 'client EAP encryption' in key derivation
- EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
- EAP-PEAP: Derived Session-Id - hexdump(len=65): 19 4b 88 f0 dc b7 2b ff ae 99 2c fc 40 34 22 84 79 f5 d4 1c a7 3e 67 78 5f eb e0 1e 58 23 26 ce 91 38 da 14 85 b3 bd 75 38 52 07 66 b3 1e 82 92 d4 c5 a0 e8 fb 0e 0c 89 2e b1 87 c6 48 b3 b5 ee 53
- SSL: Building ACK (type=25 id=10 ver=1)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e261c0
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=46
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=11 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=40) - Flags 0x01
- EAP-PEAP: received 34 bytes encrypted data for Phase 2
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 0b 00 05 01
- EAP-PEAP: received Phase 2: code=1 identifier=11 length=5
- EAP-PEAP: Phase 2 Request: type=1
- EAP: using real identity - hexdump_ascii(len=24):
- [OMITTED]
- EAP-PEAP: Encrypting Phase 2 data - hexdump(len=29): [REMOVED]
- OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
- SSL: 58 bytes left to be sent out (of total 58 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e1b5a8
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=89
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=12 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=85) - Flags 0x01
- EAP-PEAP: received 79 bytes encrypted data for Phase 2
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=50): 01 0c 00 32 1a 01 0c 00 2d 10 4c 00 ee 90 e5 f4 48 64 db 81 58 f6 77 f0 af 22 72 6f 68 72 65 72 67 6a 40 72 6f 73 65 2d 68 75 6c 6d 61 6e 2e 65 64 75
- EAP-PEAP: received Phase 2: code=1 identifier=12 length=50
- EAP-PEAP: Phase 2 Request: type=26
- EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26
- EAP-MSCHAPV2: RX identifier 12 mschapv2_id 12
- EAP-MSCHAPV2: Received challenge
- EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=24):
- [OMITTED]
- EAP-MSCHAPV2: Generating Challenge Response
- MSCHAPV2: Identity - hexdump_ascii(len=24):
- [OMITTED]
- MSCHAPV2: Username - hexdump_ascii(len=24):
- [OMITTED]
- MSCHAPV2: auth_challenge - hexdump(len=16): 4c 00 ee 90 e5 f4 48 64 db 81 58 f6 77 f0 af 22
- MSCHAPV2: peer_challenge - hexdump(len=16): 94 6a a6 6b b6 1a 1a d2 b7 56 b6 a5 e4 50 71 23
- MSCHAPV2: username - hexdump_ascii(len=24):
- [OMITTED]
- MSCHAPV2: password hash - hexdump(len=16): [REMOVED]
- MSCHAPV2: NT Response - hexdump(len=24): 9f 09 e2 70 e1 4c 68 77 02 f1 72 6e 48 c8 37 09 5e ca 3a 54 f1 ac 2b c3
- MSCHAPV2: Auth Response - hexdump(len=20): 3c dc ab 4a 9c 3c d5 50 3b 59 b8 58 76 97 a2 87 65 a3 ad fe
- MSCHAPV2: Master Key - hexdump(len=16): [REMOVED]
- EAP-MSCHAPV2: TX identifier 12 mschapv2_id 12 (response)
- EAP-PEAP: Encrypting Phase 2 data - hexdump(len=83): [REMOVED]
- OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
- SSL: 112 bytes left to be sent out (of total 112 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e1b5e0
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=90
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=13 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=86) - Flags 0x01
- EAP-PEAP: received 80 bytes encrypted data for Phase 2
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=51): 01 0d 00 33 1a 03 0c 00 2e 53 3d 33 43 44 43 41 42 34 41 39 43 33 43 44 35 35 30 33 42 35 39 42 38 35 38 37 36 39 37 41 32 38 37 36 35 41 33 41 44 46 45
- EAP-PEAP: received Phase 2: code=1 identifier=13 length=51
- EAP-PEAP: Phase 2 Request: type=26
- EAP-MSCHAPV2: RX identifier 13 mschapv2_id 12
- EAP-MSCHAPV2: Received success
- EAP-MSCHAPV2: Success message - hexdump_ascii(len=0):
- EAP-MSCHAPV2: Authentication succeeded
- EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED]
- OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
- SSL: 35 bytes left to be sent out (of total 35 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e239e8
- EAP: Session-Id - hexdump(len=65): 19 4b 88 f0 dc b7 2b ff ae 99 2c fc 40 34 22 84 79 f5 d4 1c a7 3e 67 78 5f eb e0 1e 58 23 26 ce 91 38 da 14 85 b3 bd 75 38 52 07 66 b3 1e 82 92 d4 c5 a0 e8 fb 0e 0c 89 2e b1 87 c6 48 b3 b5 ee 53
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=50
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=14 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=46) - Flags 0x01
- EAP-PEAP: received 40 bytes encrypted data for Phase 2
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 0e 00 0b 21 80 03 00 02 00 01
- EAP-PEAP: received Phase 2: code=1 identifier=14 length=11
- EAP-PEAP: Phase 2 Request: type=33
- EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01
- EAP-TLV: Result TLV - hexdump(len=2): 00 01
- EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed
- EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED]
- OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
- SSL: 40 bytes left to be sent out (of total 40 bytes)
- EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC eapRespData=0x1e1b670
- EAP: Session-Id - hexdump(len=65): 19 4b 88 f0 dc b7 2b ff ae 99 2c fc 40 34 22 84 79 f5 d4 1c a7 3e 67 78 5f eb e0 1e 58 23 26 ce 91 38 da 14 85 b3 bd 75 38 52 07 66 b3 1e 82 92 d4 c5 a0 e8 fb 0e 0c 89 2e b1 87 c6 48 b3 b5 ee 53
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=46
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Success
- EAP: Status notification: completion (param=success)
- EAP: EAP entering state SUCCESS
- wlan0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
- EAPOL: SUPP_PAE entering state AUTHENTICATED
- EAPOL: Supplicant port status: Authorized
- nl80211: Set supplicant port authorized for b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- EAPOL: SUPP_BE entering state SUCCESS
- EAPOL: SUPP_BE entering state IDLE
- EAPOL authentication completed - result=SUCCESS
- Configure PMK for driver-based RSN 4-way handshake
- EAPOL: Successfully fetched key (len=32)
- RSN: Configure PMK for driver-based 4-way handshake - hexdump(len=32): [REMOVED]
- wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=5 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=32
- nl80211: Set PMK to the driver for b0:b8:67:ef:d9:11
- nl80211: PMK - hexdump(len=32): [REMOVED]
- nl80211: Set PMK failed: ret=-22 (Invalid argument)
- Failed to set PMK to the driver
- wlan0: Cancelling scan request
- wlan0: Cancelling authentication timeout
- wlan0: State: ASSOCIATED -> COMPLETED
- wlan0: Radio work 'connect'@0x1dff250 done in 3.088286 seconds
- wlan0: radio_work_free('connect'@0x1dff250): num_active_works --> 0
- wlan0: CTRL-EVENT-CONNECTED - Connection to b0:b8:67:ef:d9:11 completed [id=0 id_str=]
- nl80211: Set wlan0 operstate 0->1 (UP)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
- wlan0: Determining shared radio frequencies (max len 2)
- wlan0: Shared frequencies (len=1): completed iteration
- wlan0: freq[0]: 5745, flags=0x1
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=121
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
- EAPOL: External notification - portValid=1
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=121
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
- EAPOL: External notification - portValid=1
- EAPOL: startWhen --> 0
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=121
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
- EAPOL: External notification - portValid=1
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
- nl80211: Ignored event (cmd=48) for foreign interface (ifindex 3 wdev 0x0)
- nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlan0
- nl80211: Disconnect event
- wlan0: Event DEAUTH (11) received
- wlan0: Deauthentication notification
- wlan0: * reason 3
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlan0: CTRL-EVENT-DISCONNECTED bssid=b0:b8:67:ef:d9:11 reason=3
- wlan0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9)
- wlan0: Setting scan request: 0.100000 sec
- Added BSSID b0:b8:67:ef:d9:11 into blacklist
- wlan0: Another BSS in this ESS has been seen; try it next
- BSSID b0:b8:67:ef:d9:11 blacklist count incremented to 2
- wlan0: Blacklist count 1 --> request scan in 100 ms
- wlan0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner
- TDLS: Remove peers on disassociation
- wlan0: WPA: Clear old PMK and PTK
- wlan0: Disconnect event - remove keys
- wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x1ddc304 key_idx=0 set_tx=0 seq_len=0 key_len=0
- addr=b0:b8:67:ef:d9:11
- nl80211: Data frame filter flags=0x0
- wlan0: State: COMPLETED -> DISCONNECTED
- nl80211: Set wlan0 operstate 1->0 (DORMANT)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- wlan0: Determining shared radio frequencies (max len 2)
- wlan0: Shared frequencies (len=0): completed iteration
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Skip set_supp_port(unauthorized) while not associated
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: External notification - portValid=0
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
- nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for p2p-dev-wlan0
- nl80211: Regulatory domain change
- * initiator=0
- * type=1
- p2p-dev-wlan0: Event CHANNEL_LIST_CHANGED (27) received
- wlan0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
- p2p-dev-wlan0: Updating hw mode
- nl80211: Regulatory information - country=US (DFS-FCC)
- nl80211: 2402-2472 @ 40 MHz 30 mBm
- nl80211: 5170-5250 @ 80 MHz 23 mBm
- nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
- nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
- nl80211: 5735-5835 @ 80 MHz 30 mBm
- nl80211: 57240-63720 @ 2160 MHz 40 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
- nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- wlan0: Updating hw mode
- nl80211: Regulatory information - country=US (DFS-FCC)
- nl80211: 2402-2472 @ 40 MHz 30 mBm
- nl80211: 5170-5250 @ 80 MHz 23 mBm
- nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
- nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
- nl80211: 5735-5835 @ 80 MHz 30 mBm
- nl80211: 57240-63720 @ 2160 MHz 40 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
- nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- p2p-dev-wlan0: Determining shared radio frequencies (max len 2)
- p2p-dev-wlan0: Shared frequencies (len=0): completed iteration
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for p2p-dev-wlan0
- nl80211: Regulatory domain change
- * initiator=1
- * type=0
- * alpha2=US
- p2p-dev-wlan0: Event CHANNEL_LIST_CHANGED (27) received
- wlan0: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=US
- p2p-dev-wlan0: Updating hw mode
- nl80211: Regulatory information - country=US (DFS-FCC)
- nl80211: 2402-2472 @ 40 MHz 30 mBm
- nl80211: 5170-5250 @ 80 MHz 23 mBm
- nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
- nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
- nl80211: 5735-5835 @ 80 MHz 30 mBm
- nl80211: 57240-63720 @ 2160 MHz 40 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
- nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- wlan0: Updating hw mode
- nl80211: Regulatory information - country=US (DFS-FCC)
- nl80211: 2402-2472 @ 40 MHz 30 mBm
- nl80211: 5170-5250 @ 80 MHz 23 mBm
- nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
- nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
- nl80211: 5735-5835 @ 80 MHz 30 mBm
- nl80211: 57240-63720 @ 2160 MHz 40 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
- nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- p2p-dev-wlan0: Determining shared radio frequencies (max len 2)
- p2p-dev-wlan0: Shared frequencies (len=0): completed iteration
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- wlan0: State: DISCONNECTED -> SCANNING
- wlan0: Determining shared radio frequencies (max len 2)
- wlan0: Shared frequencies (len=0): completed iteration
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- Scan SSID - hexdump_ascii(len=7):
- 65 64 75 72 6f 61 6d eduroam
- wlan0: Starting AP scan for wildcard SSID
- WPS: Building WPS IE for Probe Request
- WPS: * Version (hardcoded 0x10)
- WPS: * Request Type
- WPS: * Config Methods (3148)
- WPS: * UUID-E
- WPS: * Primary Device Type
- WPS: * RF Bands (3)
- WPS: * Association State
- WPS: * Configuration Error (0)
- WPS: * Device Password ID (0)
- WPS: * Manufacturer
- WPS: * Model Name
- WPS: * Model Number
- WPS: * Device Name
- WPS: * Version2 (0x20)
- P2P: * P2P IE header
- P2P: * Capability dev=25 group=00
- P2P: * Listen Channel: Regulatory Class 81 Channel 6
- wlan0: Optimize scan based on previously generated frequency list
- wlan0: Add radio work 'scan'@0x1e238b8
- wlan0: First radio work item in the queue - schedule start immediately
- wlan0: Starting radio work 'scan'@0x1e238b8 after 0.000057 second wait
- wlan0: nl80211: scan request
- Scan requested (ret=0) - scan timeout 30 seconds
- nl80211: Ignored event (cmd=33) for foreign interface (ifindex 3 wdev 0x0)
- nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
- wlan0: nl80211: Scan trigger
- wlan0: Event SCAN_STARTED (46) received
- wlan0: Own scan request started a scan in 0.000186 seconds
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
- nl80211: Ignored event (cmd=34) for foreign interface (ifindex 3 wdev 0x0)
- nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
- wlan0: nl80211: New scan results available
- nl80211: Scan probed for SSID 'eduroam'
- nl80211: Scan probed for SSID ''
- nl80211: Scan included frequencies: 5200 5240 2462 2412 2437
- wlan0: Event SCAN_RESULTS (3) received
- wlan0: Scan completed in 0.219446 seconds
- nl80211: Received scan results (18 BSSes)
- wlan0: BSS: Start scan result update 2
- wlan0: BSS: Add new id 16 BSSID f2:a3:b2:31:45:e3 SSID '' freq 2437
- wlan0: BSS: Add new id 17 BSSID b0:b8:67:ef:47:c0 SSID 'XXX-OPEN' freq 2412
- BSS: last_scan_res_used=18/32
- wlan0: New scan results available (own=1 ext=0)
- WPS: AP f2:a3:b2:31:45:e3 type 0 added
- WPS: AP[0] f2:a3:b2:31:45:e3 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
- wlan0: Radio work 'scan'@0x1e238b8 done in 0.222102 seconds
- wlan0: radio_work_free('scan'@0x1e238b8): num_active_works --> 0
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: b0:b8:67:ef:d9:11 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-49 freq=5745
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 1: b0:b8:67:ed:fc:51 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-54 freq=5200
- wlan0: selected based on RSN IE
- wlan0: selected BSS b0:b8:67:ed:fc:51 ssid='eduroam'
- wlan0: Considering connect request: reassociate: 0 selected: b0:b8:67:ed:fc:51 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x1dde570 current_ssid=(nil)
- wlan0: Request association with b0:b8:67:ed:fc:51
- wlan0: Re-association to the same ESS
- TDLS: TDLS is allowed in the target BSS
- TDLS: TDLS channel switch allowed in the target BSS
- wlan0: No ongoing scan/p2p-scan found to abort
- wlan0: Add radio work 'connect'@0x1e261c0
- wlan0: First radio work item in the queue - schedule start immediately
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- p2p-dev-wlan0: Updating scan results from sibling
- nl80211: Received scan results (18 BSSes)
- p2p-dev-wlan0: BSS: Start scan result update 2
- p2p-dev-wlan0: BSS: Add new id 16 BSSID f2:a3:b2:31:45:e3 SSID '' freq 2437
- p2p-dev-wlan0: BSS: Add new id 17 BSSID b0:b8:67:ef:47:c0 SSID 'XXX-OPEN' freq 2412
- BSS: last_scan_res_used=18/32
- wlan0: Starting radio work 'connect'@0x1e261c0 after 0.001140 second wait
- wlan0: Trying to associate with SSID 'eduroam'
- wlan0: Cancelling scan request
- wlan0: WPA: clearing own WPA/RSN IE
- RSN: PMKSA cache search - network_ctx=0x1dde570 try_opportunistic=0 akmp=0x0
- RSN: Search for BSSID b0:b8:67:ed:fc:51
- RSN: No PMKSA cache entry found
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: Selected mgmt group cipher 32
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- WPA: No current PMKSA - clear PMK
- wlan0: Automatic auth_alg selection: 0x1
- Added supported operating classes IE - hexdump(len=22): 3b 14 73 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82
- wlan0: State: SCANNING -> ASSOCIATING
- nl80211: Set wlan0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- wlan0: Determining shared radio frequencies (max len 2)
- wlan0: Shared frequencies (len=0): completed iteration
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- wlan0: set_disable_max_amsdu: -1
- wlan0: set_ampdu_factor: -1
- wlan0: set_ampdu_density: -1
- wlan0: set_disable_ht40: 0
- wlan0: set_disable_sgi: 0
- wlan0: set_disable_ldpc: 0
- wlan0: set_rx_stbc: -1
- wlan0: set_tx_stbc: -1
- nl80211: Set mode ifindex 3 iftype 2 (STATION)
- nl80211: Unsubscribe mgmt frames handle 0x89555629 (mode change)
- nl80211: Subscribe to mgmt frames with non-AP handle 0x1dddea0
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0104
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040b
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040c
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040d
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090b
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090c
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090d
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0409506f9a09
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=7f506f9a09
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0409506f9a1a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0801
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040e
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=12
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=06
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a07
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a11
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a1a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=1101
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=1102
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0505
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0500
- nl80211: Connect (ifindex=3)
- * bssid_hint=b0:b8:67:ed:fc:51
- * freq_hint=5200
- * SSID - hexdump_ascii(len=7):
- 65 64 75 72 6f 61 6d eduroam
- * IEs - hexdump(len=44): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 3b 14 73 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82
- * WPA Versions 0x2
- * pairwise=0xfac04
- * group=0xfac04
- * akm=0xfac01
- * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
- * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
- * Auth Type 0
- nl80211: Connect request send successfully
- wlan0: Setting authentication timeout: 10 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - EAP fail=0
- EAPOL: External notification - portControl=Auto
- EAPOL: disable timer tick
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=46
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- wlan0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00)
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- nl80211: Ignored event (cmd=46) for foreign interface (ifindex 3 wdev 0x0)
- nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlan0
- nl80211: Connect event (status=0 ignore_next_local_disconnect=0)
- nl80211: Associated on 5745 MHz
- nl80211: Associated with b0:b8:67:ef:d9:11
- nl80211: Operating frequency for the associated BSS from scan results: 5745 MHz
- nl80211: Associated on 5745 MHz
- nl80211: Associated with b0:b8:67:ef:d9:11
- nl80211: Set drv->ssid based on scan res info to 'eduroam'
- wlan0: Event ASSOC (0) received
- wlan0: Association info event
- req_ies - hexdump(len=130): 00 07 65 64 75 72 6f 61 6d 01 05 24 b0 c8 60 6c 21 02 03 e0 24 0a 24 04 34 04 64 0c 95 04 a5 01 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 2d 1a 63 00 17 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 08 00 00 00 00 40 bf 0c 32 50 80 0f fe ff 00 00 fe ff 00 00 dd 09 00 10 18 02 00 00 10 00 00 dd 07 00 50 f2 02 00 01 00 01 00 00 ff
- resp_ies - hexdump(len=122): 01 05 24 b0 c8 60 6c 2d 1a ef 09 1b ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 95 05 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 bf 0c 91 79 8b 33 aa ff 00 00 aa ff 00 00 c0 05 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 00 fe ff 00 00 dd
- IEEE 802.11 element parse failed (id=0 elen=254 left=4)
- wlan0: freq=5745 MHz
- WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- Truncated IE in assoc_info - hexdump(len=6): 00 fe ff 00 00 dd
- FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
- wlan0: State: ASSOCIATING -> ASSOCIATED
- nl80211: Set wlan0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- wlan0: Determining shared radio frequencies (max len 2)
- wlan0: Shared frequencies (len=1): completed iteration
- wlan0: freq[0]: 5745, flags=0x1
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- wlan0: Associated to a new BSS: BSSID=b0:b8:67:ef:d9:11
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
- wlan0: Associated with b0:b8:67:ef:d9:11
- wlan0: WPA: Association event - clear replay counter
- wlan0: WPA: Clear old PTK
- TDLS: Remove peers on association
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: SUPP_BE entering state IDLE
- EAP: EAP entering state INITIALIZE
- EAP: maintaining EAP method data for fast reauthentication
- EAP: EAP entering state IDLE
- wlan0: Setting authentication timeout: 10 sec 0 usec
- wlan0: Cancelling scan request
- EAPOL: External notification - portValid=1
- wlan0: Process pending EAPOL frame that was received just before association notification
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- wlan0: Setting authentication timeout: 70 sec 0 usec
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_PAE entering state RESTART
- EAP: EAP entering state INITIALIZE
- EAP: maintaining EAP method data for fast reauthentication
- EAP: EAP entering state IDLE
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
- EAP: EAP entering state IDENTITY
- wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
- EAP: Status notification: started (param=)
- EAP: EAP-Request Identity data - hexdump_ascii(len=0):
- EAP: using real identity - hexdump_ascii(len=24):
- [OMITTED]
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for p2p-dev-wlan0
- nl80211: Regulatory domain change
- * initiator=3
- * type=0
- * alpha2=US
- p2p-dev-wlan0: Event CHANNEL_LIST_CHANGED (27) received
- wlan0: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=US
- p2p-dev-wlan0: Updating hw mode
- nl80211: Regulatory information - country=US (DFS-FCC)
- nl80211: 2402-2472 @ 40 MHz 30 mBm
- nl80211: 5170-5250 @ 80 MHz 23 mBm
- nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
- nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
- nl80211: 5735-5835 @ 80 MHz 30 mBm
- nl80211: 57240-63720 @ 2160 MHz 40 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
- nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- wlan0: Updating hw mode
- nl80211: Regulatory information - country=US (DFS-FCC)
- nl80211: 2402-2472 @ 40 MHz 30 mBm
- nl80211: 5170-5250 @ 80 MHz 23 mBm
- nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
- nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
- nl80211: 5735-5835 @ 80 MHz 30 mBm
- nl80211: 57240-63720 @ 2160 MHz 40 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
- nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- p2p-dev-wlan0: Determining shared radio frequencies (max len 2)
- p2p-dev-wlan0: Shared frequencies (len=1): completed iteration
- p2p-dev-wlan0: freq[0]: 5745, flags=0x1
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=46
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
- EAP: Status notification: accept proposed method (param=PEAP)
- EAP: Using previous method data for fast re-authentication
- EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
- wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
- EAP: EAP entering state METHOD
- SSL: Received packet(len=6) - Flags 0x21
- EAP-PEAP: Start (server ver=1, own ver=1)
- EAP-PEAP: Using PEAP version 1
- SSL: (where=0x10 ret=0x1)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:before SSL initialization
- OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
- OpenSSL: TX ver=0x303 content_type=22 (handshake/client hello)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS write client hello
- SSL: (where=0x1002 ret=0xffffffff)
- SSL: SSL_connect:error in SSLv3/TLS write client hello
- SSL: SSL_connect - want more data
- SSL: 222 bytes pending from ssl_out
- SSL: Using TLS version TLSv1.2
- SSL: 222 bytes left to be sent out (of total 222 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e12a38
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=154
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=150) - Flags 0x81
- SSL: TLS Message Length: 140
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS write client hello
- OpenSSL: RX ver=0x303 content_type=22 (handshake/server hello)
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS read server hello
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS read change cipher spec
- OpenSSL: RX ver=0x303 content_type=22 (handshake/finished)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS read finished
- OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
- OpenSSL: TX ver=0x303 content_type=20 (change cipher spec/)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS write change cipher spec
- OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
- OpenSSL: TX ver=0x303 content_type=22 (handshake/finished)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS write finished
- SSL: (where=0x20 ret=0x1)
- SSL: (where=0x1002 ret=0x1)
- SSL: 51 bytes pending from ssl_out
- OpenSSL: Handshake finished - resumed=1
- SSL: No Application Data included
- SSL: Using TLS version TLSv1.2
- SSL: 51 bytes left to be sent out (of total 51 bytes)
- EAP-PEAP: TLS done, proceed to Phase 2
- EAP-PEAP: using label 'client EAP encryption' in key derivation
- EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
- EAP-PEAP: Derived Session-Id - hexdump(len=65): 19 7d 3a 0c f8 e1 cb 91 1a 98 a1 5c 5a 7d b1 da 88 64 86 03 05 66 f3 bf 1c 21 29 8b ac 9a aa c1 fc d5 10 9a 37 ce de 02 37 77 37 39 51 b2 8a 0e 1c 92 8d 9b 13 ce ea fc eb 6e a3 2d ec 9c 13 c6 11
- EAP-PEAP: Workaround - allow outer EAP-Success to terminate PEAP resumption
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=COND_SUCC eapRespData=0x1ddf490
- EAP: Session-Id - hexdump(len=65): 19 7d 3a 0c f8 e1 cb 91 1a 98 a1 5c 5a 7d b1 da 88 64 86 03 05 66 f3 bf 1c 21 29 8b ac 9a aa c1 fc d5 10 9a 37 ce de 02 37 77 37 39 51 b2 8a 0e 1c 92 8d 9b 13 ce ea fc eb 6e a3 2d ec 9c 13 c6 11
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=50
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=46) - Flags 0x01
- EAP-PEAP: received 40 bytes encrypted data for Phase 2
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 04 00 0b 21 80 03 00 02 00 01
- EAP-PEAP: received Phase 2: code=1 identifier=4 length=11
- EAP-PEAP: Phase 2 Request: type=33
- EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01
- EAP-TLV: Result TLV - hexdump(len=2): 00 01
- EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed
- EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED]
- OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
- SSL: 40 bytes left to be sent out (of total 40 bytes)
- EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC eapRespData=0x1e26518
- EAP: Session-Id - hexdump(len=65): 19 7d 3a 0c f8 e1 cb 91 1a 98 a1 5c 5a 7d b1 da 88 64 86 03 05 66 f3 bf 1c 21 29 8b ac 9a aa c1 fc d5 10 9a 37 ce de 02 37 77 37 39 51 b2 8a 0e 1c 92 8d 9b 13 ce ea fc eb 6e a3 2d ec 9c 13 c6 11
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=46
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Success
- EAP: Status notification: completion (param=success)
- EAP: EAP entering state SUCCESS
- wlan0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
- EAPOL: SUPP_PAE entering state AUTHENTICATED
- EAPOL: Supplicant port status: Authorized
- nl80211: Set supplicant port authorized for b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- EAPOL: SUPP_BE entering state SUCCESS
- EAPOL: SUPP_BE entering state IDLE
- EAPOL authentication completed - result=SUCCESS
- Configure PMK for driver-based RSN 4-way handshake
- EAPOL: Successfully fetched key (len=32)
- RSN: Configure PMK for driver-based 4-way handshake - hexdump(len=32): [REMOVED]
- wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=5 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=32
- nl80211: Set PMK to the driver for b0:b8:67:ef:d9:11
- nl80211: PMK - hexdump(len=32): [REMOVED]
- nl80211: Set PMK failed: ret=-22 (Invalid argument)
- Failed to set PMK to the driver
- wlan0: Cancelling scan request
- wlan0: Cancelling authentication timeout
- Removed BSSID b0:b8:67:ef:d9:11 from blacklist
- wlan0: State: ASSOCIATED -> COMPLETED
- wlan0: Radio work 'connect'@0x1e261c0 done in 2.992865 seconds
- wlan0: radio_work_free('connect'@0x1e261c0): num_active_works --> 0
- wlan0: CTRL-EVENT-CONNECTED - Connection to b0:b8:67:ef:d9:11 completed [id=0 id_str=]
- nl80211: Set wlan0 operstate 0->1 (UP)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
- wlan0: Determining shared radio frequencies (max len 2)
- wlan0: Shared frequencies (len=1): completed iteration
- wlan0: freq[0]: 5745, flags=0x1
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=121
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
- EAPOL: External notification - portValid=1
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=121
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
- EAPOL: External notification - portValid=1
- EAPOL: startWhen --> 0
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=121
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
- EAPOL: External notification - portValid=1
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
- nl80211: Ignored event (cmd=48) for foreign interface (ifindex 3 wdev 0x0)
- nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlan0
- nl80211: Disconnect event
- wlan0: Event DEAUTH (11) received
- wlan0: Deauthentication notification
- wlan0: * reason 3
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlan0: CTRL-EVENT-DISCONNECTED bssid=b0:b8:67:ef:d9:11 reason=3
- wlan0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9)
- wlan0: Setting scan request: 0.100000 sec
- Added BSSID b0:b8:67:ef:d9:11 into blacklist
- wlan0: Another BSS in this ESS has been seen; try it next
- BSSID b0:b8:67:ef:d9:11 blacklist count incremented to 2
- wlan0: Blacklist count 1 --> request scan in 100 ms
- wlan0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner
- TDLS: Remove peers on disassociation
- wlan0: WPA: Clear old PMK and PTK
- wlan0: Disconnect event - remove keys
- wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x1ddc304 key_idx=0 set_tx=0 seq_len=0 key_len=0
- addr=b0:b8:67:ef:d9:11
- nl80211: Data frame filter flags=0x0
- wlan0: State: COMPLETED -> DISCONNECTED
- nl80211: Set wlan0 operstate 1->0 (DORMANT)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- wlan0: Determining shared radio frequencies (max len 2)
- wlan0: Shared frequencies (len=0): completed iteration
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Skip set_supp_port(unauthorized) while not associated
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: External notification - portValid=0
- nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for p2p-dev-wlan0
- nl80211: Regulatory domain change
- * initiator=0
- * type=1
- p2p-dev-wlan0: Event CHANNEL_LIST_CHANGED (27) received
- wlan0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
- p2p-dev-wlan0: Updating hw mode
- nl80211: Regulatory information - country=US (DFS-FCC)
- nl80211: 2402-2472 @ 40 MHz 30 mBm
- nl80211: 5170-5250 @ 80 MHz 23 mBm
- nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
- nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
- nl80211: 5735-5835 @ 80 MHz 30 mBm
- nl80211: 57240-63720 @ 2160 MHz 40 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
- nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- wlan0: Updating hw mode
- nl80211: Regulatory information - country=US (DFS-FCC)
- nl80211: 2402-2472 @ 40 MHz 30 mBm
- nl80211: 5170-5250 @ 80 MHz 23 mBm
- nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
- nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
- nl80211: 5735-5835 @ 80 MHz 30 mBm
- nl80211: 57240-63720 @ 2160 MHz 40 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
- nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- p2p-dev-wlan0: Determining shared radio frequencies (max len 2)
- p2p-dev-wlan0: Shared frequencies (len=0): completed iteration
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for p2p-dev-wlan0
- nl80211: Regulatory domain change
- * initiator=1
- * type=0
- * alpha2=US
- p2p-dev-wlan0: Event CHANNEL_LIST_CHANGED (27) received
- wlan0: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=US
- p2p-dev-wlan0: Updating hw mode
- nl80211: Regulatory information - country=US (DFS-FCC)
- nl80211: 2402-2472 @ 40 MHz 30 mBm
- nl80211: 5170-5250 @ 80 MHz 23 mBm
- nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
- nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
- nl80211: 5735-5835 @ 80 MHz 30 mBm
- nl80211: 57240-63720 @ 2160 MHz 40 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
- nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- wlan0: Updating hw mode
- nl80211: Regulatory information - country=US (DFS-FCC)
- nl80211: 2402-2472 @ 40 MHz 30 mBm
- nl80211: 5170-5250 @ 80 MHz 23 mBm
- nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
- nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
- nl80211: 5735-5835 @ 80 MHz 30 mBm
- nl80211: 57240-63720 @ 2160 MHz 40 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
- nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- p2p-dev-wlan0: Determining shared radio frequencies (max len 2)
- p2p-dev-wlan0: Shared frequencies (len=0): completed iteration
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- wlan0: State: DISCONNECTED -> SCANNING
- wlan0: Determining shared radio frequencies (max len 2)
- wlan0: Shared frequencies (len=0): completed iteration
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- Scan SSID - hexdump_ascii(len=7):
- 65 64 75 72 6f 61 6d eduroam
- wlan0: Starting AP scan for wildcard SSID
- WPS: Building WPS IE for Probe Request
- WPS: * Version (hardcoded 0x10)
- WPS: * Request Type
- WPS: * Config Methods (3148)
- WPS: * UUID-E
- WPS: * Primary Device Type
- WPS: * RF Bands (3)
- WPS: * Association State
- WPS: * Configuration Error (0)
- WPS: * Device Password ID (0)
- WPS: * Manufacturer
- WPS: * Model Name
- WPS: * Model Number
- WPS: * Device Name
- WPS: * Version2 (0x20)
- P2P: * P2P IE header
- P2P: * Capability dev=25 group=00
- P2P: * Listen Channel: Regulatory Class 81 Channel 6
- wlan0: Optimize scan based on previously generated frequency list
- wlan0: Add radio work 'scan'@0x1e26560
- wlan0: First radio work item in the queue - schedule start immediately
- wlan0: Starting radio work 'scan'@0x1e26560 after 0.000051 second wait
- wlan0: nl80211: scan request
- Scan requested (ret=0) - scan timeout 30 seconds
- nl80211: Ignored event (cmd=33) for foreign interface (ifindex 3 wdev 0x0)
- nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
- wlan0: nl80211: Scan trigger
- wlan0: Event SCAN_STARTED (46) received
- wlan0: Own scan request started a scan in 0.000165 seconds
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
- nl80211: Ignored event (cmd=34) for foreign interface (ifindex 3 wdev 0x0)
- nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
- wlan0: nl80211: New scan results available
- nl80211: Scan probed for SSID 'eduroam'
- nl80211: Scan probed for SSID ''
- nl80211: Scan included frequencies: 5200 5240 2462 2412 2437
- wlan0: Event SCAN_RESULTS (3) received
- wlan0: Scan completed in 0.218749 seconds
- nl80211: Received scan results (18 BSSes)
- wlan0: BSS: Start scan result update 3
- BSS: last_scan_res_used=18/32
- wlan0: New scan results available (own=1 ext=0)
- WPS: AP f2:a3:b2:31:45:e3 type 0 added
- WPS: AP[0] f2:a3:b2:31:45:e3 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
- wlan0: Radio work 'scan'@0x1e26560 done in 0.221190 seconds
- wlan0: radio_work_free('scan'@0x1e26560): num_active_works --> 0
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: b0:b8:67:ef:d9:11 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-48 freq=5745
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 1: b0:b8:67:ed:fc:51 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-53 freq=5200
- wlan0: selected based on RSN IE
- wlan0: selected BSS b0:b8:67:ed:fc:51 ssid='eduroam'
- wlan0: Considering connect request: reassociate: 0 selected: b0:b8:67:ed:fc:51 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x1dde570 current_ssid=(nil)
- wlan0: Request association with b0:b8:67:ed:fc:51
- wlan0: Re-association to the same ESS
- TDLS: TDLS is allowed in the target BSS
- TDLS: TDLS channel switch allowed in the target BSS
- wlan0: No ongoing scan/p2p-scan found to abort
- wlan0: Add radio work 'connect'@0x1dff250
- wlan0: First radio work item in the queue - schedule start immediately
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- p2p-dev-wlan0: Updating scan results from sibling
- nl80211: Received scan results (18 BSSes)
- p2p-dev-wlan0: BSS: Start scan result update 3
- BSS: last_scan_res_used=18/32
- wlan0: Starting radio work 'connect'@0x1dff250 after 0.000987 second wait
- wlan0: Trying to associate with SSID 'eduroam'
- wlan0: Cancelling scan request
- wlan0: WPA: clearing own WPA/RSN IE
- RSN: PMKSA cache search - network_ctx=0x1dde570 try_opportunistic=0 akmp=0x0
- RSN: Search for BSSID b0:b8:67:ed:fc:51
- RSN: No PMKSA cache entry found
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: Selected mgmt group cipher 32
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- WPA: No current PMKSA - clear PMK
- wlan0: Automatic auth_alg selection: 0x1
- Added supported operating classes IE - hexdump(len=22): 3b 14 73 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82
- wlan0: State: SCANNING -> ASSOCIATING
- nl80211: Set wlan0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- wlan0: Determining shared radio frequencies (max len 2)
- wlan0: Shared frequencies (len=0): completed iteration
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- wlan0: set_disable_max_amsdu: -1
- wlan0: set_ampdu_factor: -1
- wlan0: set_ampdu_density: -1
- wlan0: set_disable_ht40: 0
- wlan0: set_disable_sgi: 0
- wlan0: set_disable_ldpc: 0
- wlan0: set_rx_stbc: -1
- wlan0: set_tx_stbc: -1
- nl80211: Set mode ifindex 3 iftype 2 (STATION)
- nl80211: Unsubscribe mgmt frames handle 0x89555629 (mode change)
- nl80211: Subscribe to mgmt frames with non-AP handle 0x1dddea0
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0104
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040b
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040c
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040d
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090b
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090c
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090d
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0409506f9a09
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=7f506f9a09
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0409506f9a1a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0801
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040e
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=12
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=06
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a07
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a11
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a1a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=1101
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=1102
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0505
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0500
- nl80211: Connect (ifindex=3)
- * bssid_hint=b0:b8:67:ed:fc:51
- * freq_hint=5200
- * SSID - hexdump_ascii(len=7):
- 65 64 75 72 6f 61 6d eduroam
- * IEs - hexdump(len=44): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 3b 14 73 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82
- * WPA Versions 0x2
- * pairwise=0xfac04
- * group=0xfac04
- * akm=0xfac01
- * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
- * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
- * Auth Type 0
- nl80211: Connect request send successfully
- wlan0: Setting authentication timeout: 10 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - EAP fail=0
- EAPOL: External notification - portControl=Auto
- EAPOL: disable timer tick
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=46
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- wlan0: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00)
- nl80211: Ignored event (cmd=46) for foreign interface (ifindex 3 wdev 0x0)
- nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlan0
- nl80211: Connect event (status=0 ignore_next_local_disconnect=0)
- nl80211: Associated on 5745 MHz
- nl80211: Associated with b0:b8:67:ef:d9:11
- nl80211: Operating frequency for the associated BSS from scan results: 5745 MHz
- nl80211: Associated on 5745 MHz
- nl80211: Associated with b0:b8:67:ef:d9:11
- nl80211: Set drv->ssid based on scan res info to 'eduroam'
- wlan0: Event ASSOC (0) received
- wlan0: Association info event
- req_ies - hexdump(len=130): 00 07 65 64 75 72 6f 61 6d 01 05 24 b0 c8 60 6c 21 02 03 e0 24 0a 24 04 34 04 64 0c 95 04 a5 01 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 2d 1a 63 00 17 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 08 00 00 00 00 40 bf 0c 32 50 80 0f fe ff 00 00 fe ff 00 00 dd 09 00 10 18 02 00 00 10 00 00 dd 07 00 50 f2 02 00 01 00 01 00 00 ff
- resp_ies - hexdump(len=122): 01 05 24 b0 c8 60 6c 2d 1a ef 09 1b ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 95 05 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 bf 0c 91 79 8b 33 aa ff 00 00 aa ff 00 00 c0 05 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 00 fe ff 00 00 dd
- IEEE 802.11 element parse failed (id=0 elen=254 left=4)
- wlan0: freq=5745 MHz
- WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- Truncated IE in assoc_info - hexdump(len=6): 00 fe ff 00 00 dd
- FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
- wlan0: State: ASSOCIATING -> ASSOCIATED
- nl80211: Set wlan0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- wlan0: Determining shared radio frequencies (max len 2)
- wlan0: Shared frequencies (len=1): completed iteration
- wlan0: freq[0]: 5745, flags=0x1
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- wlan0: Associated to a new BSS: BSSID=b0:b8:67:ef:d9:11
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
- wlan0: Associated with b0:b8:67:ef:d9:11
- wlan0: WPA: Association event - clear replay counter
- wlan0: WPA: Clear old PTK
- TDLS: Remove peers on association
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: enable timer tick
- EAPOL: SUPP_BE entering state IDLE
- EAP: EAP entering state INITIALIZE
- EAP: maintaining EAP method data for fast reauthentication
- EAP: EAP entering state IDLE
- wlan0: Setting authentication timeout: 10 sec 0 usec
- wlan0: Cancelling scan request
- EAPOL: External notification - portValid=1
- wlan0: Process pending EAPOL frame that was received just before association notification
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- wlan0: Setting authentication timeout: 70 sec 0 usec
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_PAE entering state RESTART
- EAP: EAP entering state INITIALIZE
- EAP: maintaining EAP method data for fast reauthentication
- EAP: EAP entering state IDLE
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
- EAP: EAP entering state IDENTITY
- wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
- EAP: Status notification: started (param=)
- EAP: EAP-Request Identity data - hexdump_ascii(len=0):
- EAP: using real identity - hexdump_ascii(len=24):
- [OMITTED]
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
- nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for p2p-dev-wlan0
- nl80211: Regulatory domain change
- * initiator=3
- * type=0
- * alpha2=US
- p2p-dev-wlan0: Event CHANNEL_LIST_CHANGED (27) received
- wlan0: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=US
- p2p-dev-wlan0: Updating hw mode
- nl80211: Regulatory information - country=US (DFS-FCC)
- nl80211: 2402-2472 @ 40 MHz 30 mBm
- nl80211: 5170-5250 @ 80 MHz 23 mBm
- nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
- nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
- nl80211: 5735-5835 @ 80 MHz 30 mBm
- nl80211: 57240-63720 @ 2160 MHz 40 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
- nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- wlan0: Updating hw mode
- nl80211: Regulatory information - country=US (DFS-FCC)
- nl80211: 2402-2472 @ 40 MHz 30 mBm
- nl80211: 5170-5250 @ 80 MHz 23 mBm
- nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
- nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
- nl80211: 5735-5835 @ 80 MHz 30 mBm
- nl80211: 57240-63720 @ 2160 MHz 40 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
- nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- p2p-dev-wlan0: Determining shared radio frequencies (max len 2)
- p2p-dev-wlan0: Shared frequencies (len=1): completed iteration
- p2p-dev-wlan0: freq[0]: 5745, flags=0x1
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=46
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state GET_METHOD
- wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
- EAP: Status notification: accept proposed method (param=PEAP)
- EAP: Using previous method data for fast re-authentication
- EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
- wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
- EAP: EAP entering state METHOD
- SSL: Received packet(len=6) - Flags 0x21
- EAP-PEAP: Start (server ver=1, own ver=1)
- EAP-PEAP: Using PEAP version 1
- SSL: (where=0x10 ret=0x1)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:before SSL initialization
- OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
- OpenSSL: TX ver=0x303 content_type=22 (handshake/client hello)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS write client hello
- SSL: (where=0x1002 ret=0xffffffff)
- SSL: SSL_connect:error in SSLv3/TLS write client hello
- SSL: SSL_connect - want more data
- SSL: 222 bytes pending from ssl_out
- SSL: Using TLS version TLSv1.2
- SSL: 222 bytes left to be sent out (of total 222 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1dfabb8
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1038
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1034) - Flags 0xc1
- SSL: TLS Message Length: 6430
- SSL: Need 5406 bytes more input data
- SSL: Building ACK (type=25 id=3 ver=1)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e233e0
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1034
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1030) - Flags 0x41
- SSL: Need 4382 bytes more input data
- SSL: Building ACK (type=25 id=4 ver=1)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1dff448
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1034
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1030) - Flags 0x41
- SSL: Need 3358 bytes more input data
- SSL: Building ACK (type=25 id=5 ver=1)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e23440
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1034
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1030) - Flags 0x41
- SSL: Need 2334 bytes more input data
- SSL: Building ACK (type=25 id=6 ver=1)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e05c30
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1034
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1030) - Flags 0x41
- SSL: Need 1310 bytes more input data
- SSL: Building ACK (type=25 id=7 ver=1)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e233e0
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=1034
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=1030) - Flags 0x41
- SSL: Need 286 bytes more input data
- SSL: Building ACK (type=25 id=8 ver=1)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1dff448
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=296
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=292) - Flags 0x01
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS write client hello
- OpenSSL: RX ver=0x303 content_type=22 (handshake/server hello)
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS read server hello
- OpenSSL: RX ver=0x303 content_type=22 (handshake/certificate)
- TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=3 buf='/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=AAA Certificate Services'
- wlan0: CTRL-EVENT-EAP-PEER-CERT depth=3 subject='/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=AAA Certificate Services' hash=d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef4
- TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=3 buf='/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=AAA Certificate Services'
- wlan0: CTRL-EVENT-EAP-PEER-CERT depth=3 subject='/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=AAA Certificate Services' hash=d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef4
- TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=2 buf='/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority'
- wlan0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority' hash=68b9c761219a5b1f0131784474665db61bbdb109e00f05ca9f74244ee5f5f52b
- TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=1 buf='/C=US/ST=MI/L=Ann Arbor/O=Internet2/OU=InCommon/CN=InCommon RSA Server CA'
- wlan0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=US/ST=MI/L=Ann Arbor/O=Internet2/OU=InCommon/CN=InCommon RSA Server CA' hash=0a05c462756390dd1f1d5dd82794c300f04be789dce76d7e312f790d68fd385a
- TLS: tls_verify_cb - preverify_ok=1 err=19 (self signed certificate in certificate chain) ca_cert_verify=0 depth=0 buf='[OMITTED]'
- wlan0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='[OMITTED]' hash=74e40048dc2c07b1b5498b2792ceb62b976cc29d5c704d0426cedbccb49a8e31
- wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:clearpass.[OMITTED].edu
- wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:clearpass-cra.[OMITTED].edu
- wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:clearpass-hv.[OMITTED].edu
- wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:clearpass-tel-2.[OMITTED].edu
- wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:clearpass-tel.[OMITTED].edu
- EAP: Status notification: remote certificate verification (param=success)
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS read server certificate
- OpenSSL: RX ver=0x303 content_type=22 (handshake/server key exchange)
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS read server key exchange
- OpenSSL: RX ver=0x303 content_type=22 (handshake/server hello done)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS read server done
- OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
- OpenSSL: TX ver=0x303 content_type=22 (handshake/client key exchange)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS write client key exchange
- OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
- OpenSSL: TX ver=0x303 content_type=20 (change cipher spec/)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS write change cipher spec
- OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
- OpenSSL: TX ver=0x303 content_type=22 (handshake/finished)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS write finished
- SSL: (where=0x1002 ret=0xffffffff)
- SSL: SSL_connect:error in SSLv3/TLS write finished
- SSL: SSL_connect - want more data
- SSL: 126 bytes pending from ssl_out
- SSL: Using TLS version TLSv1.2
- SSL: 126 bytes left to be sent out (of total 126 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e22660
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=65
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=10 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=61) - Flags 0x81
- SSL: TLS Message Length: 51
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS write finished
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS read change cipher spec
- OpenSSL: RX ver=0x303 content_type=22 (handshake/finished)
- SSL: (where=0x1001 ret=0x1)
- SSL: SSL_connect:SSLv3/TLS read finished
- SSL: (where=0x20 ret=0x1)
- SSL: (where=0x1002 ret=0x1)
- SSL: 0 bytes pending from ssl_out
- OpenSSL: Handshake finished - resumed=0
- SSL: No Application Data included
- SSL: Using TLS version TLSv1.2
- SSL: No data to be sent out
- EAP-PEAP: TLS done, proceed to Phase 2
- EAP-PEAP: using label 'client EAP encryption' in key derivation
- EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
- EAP-PEAP: Derived Session-Id - hexdump(len=65): 19 ba 2a ef 81 d2 71 b3 e8 d0 0d 3e e5 82 1d 2b 26 a6 af e9 20 b4 03 49 b0 fb ea 6e 64 71 80 16 ae 0f 03 f5 90 93 cd 28 24 0b f9 67 70 bd ff 04 03 c6 25 73 fd 6a 68 36 d0 ee 46 77 c8 51 74 14 42
- EAP-PEAP: Workaround - allow outer EAP-Success to terminate PEAP resumption
- SSL: Building ACK (type=25 id=10 ver=1)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=COND_SUCC eapRespData=0x1e23300
- EAP: Session-Id - hexdump(len=65): 19 ba 2a ef 81 d2 71 b3 e8 d0 0d 3e e5 82 1d 2b 26 a6 af e9 20 b4 03 49 b0 fb ea 6e 64 71 80 16 ae 0f 03 f5 90 93 cd 28 24 0b f9 67 70 bd ff 04 03 c6 25 73 fd 6a 68 36 d0 ee 46 77 c8 51 74 14 42
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=46
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=11 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=40) - Flags 0x01
- EAP-PEAP: received 34 bytes encrypted data for Phase 2
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 0b 00 05 01
- EAP-PEAP: received Phase 2: code=1 identifier=11 length=5
- EAP-PEAP: Phase 2 Request: type=1
- EAP: using real identity - hexdump_ascii(len=24):
- [OMITTED]
- EAP-PEAP: Encrypting Phase 2 data - hexdump(len=29): [REMOVED]
- OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
- SSL: 58 bytes left to be sent out (of total 58 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e02d68
- EAP: Session-Id - hexdump(len=65): 19 ba 2a ef 81 d2 71 b3 e8 d0 0d 3e e5 82 1d 2b 26 a6 af e9 20 b4 03 49 b0 fb ea 6e 64 71 80 16 ae 0f 03 f5 90 93 cd 28 24 0b f9 67 70 bd ff 04 03 c6 25 73 fd 6a 68 36 d0 ee 46 77 c8 51 74 14 42
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=89
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=12 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=85) - Flags 0x01
- EAP-PEAP: received 79 bytes encrypted data for Phase 2
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=50): 01 0c 00 32 1a 01 0c 00 2d 10 c0 57 02 3e e6 f0 52 f1 4a 08 b9 3b 5b 6f 08 12 72 6f 68 72 65 72 67 6a 40 72 6f 73 65 2d 68 75 6c 6d 61 6e 2e 65 64 75
- EAP-PEAP: received Phase 2: code=1 identifier=12 length=50
- EAP-PEAP: Phase 2 Request: type=26
- EAP-MSCHAPV2: RX identifier 12 mschapv2_id 12
- EAP-MSCHAPV2: Received challenge
- EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=24):
- [OMITTED]
- EAP-MSCHAPV2: Generating Challenge Response
- MSCHAPV2: Identity - hexdump_ascii(len=24):
- [OMITTED]
- MSCHAPV2: Username - hexdump_ascii(len=24):
- [OMITTED]
- MSCHAPV2: auth_challenge - hexdump(len=16): c0 57 02 3e e6 f0 52 f1 4a 08 b9 3b 5b 6f 08 12
- MSCHAPV2: peer_challenge - hexdump(len=16): 2d dc b4 7a 7b 58 0c 62 c2 4d 5f ea d3 19 cc 21
- MSCHAPV2: username - hexdump_ascii(len=24):
- [OMITTED]
- MSCHAPV2: password hash - hexdump(len=16): [REMOVED]
- MSCHAPV2: NT Response - hexdump(len=24): f9 08 46 93 e4 89 5d df 31 aa c8 68 eb 95 a3 ff 31 50 f3 0e 7f ef 4e 11
- MSCHAPV2: Auth Response - hexdump(len=20): 46 fb c1 4a 57 ad cb 5e 52 3e 0f 79 c8 83 ed 68 69 a9 8e f5
- MSCHAPV2: Master Key - hexdump(len=16): [REMOVED]
- EAP-MSCHAPV2: TX identifier 12 mschapv2_id 12 (response)
- EAP-PEAP: Encrypting Phase 2 data - hexdump(len=83): [REMOVED]
- OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
- SSL: 112 bytes left to be sent out (of total 112 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e02de8
- EAP: Session-Id - hexdump(len=65): 19 ba 2a ef 81 d2 71 b3 e8 d0 0d 3e e5 82 1d 2b 26 a6 af e9 20 b4 03 49 b0 fb ea 6e 64 71 80 16 ae 0f 03 f5 90 93 cd 28 24 0b f9 67 70 bd ff 04 03 c6 25 73 fd 6a 68 36 d0 ee 46 77 c8 51 74 14 42
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=90
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=13 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=86) - Flags 0x01
- EAP-PEAP: received 80 bytes encrypted data for Phase 2
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=51): 01 0d 00 33 1a 03 0c 00 2e 53 3d 34 36 46 42 43 31 34 41 35 37 41 44 43 42 35 45 35 32 33 45 30 46 37 39 43 38 38 33 45 44 36 38 36 39 41 39 38 45 46 35
- EAP-PEAP: received Phase 2: code=1 identifier=13 length=51
- EAP-PEAP: Phase 2 Request: type=26
- EAP-MSCHAPV2: RX identifier 13 mschapv2_id 12
- EAP-MSCHAPV2: Received success
- EAP-MSCHAPV2: Success message - hexdump_ascii(len=0):
- EAP-MSCHAPV2: Authentication succeeded
- EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED]
- OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
- SSL: 35 bytes left to be sent out (of total 35 bytes)
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x1e22430
- EAP: Session-Id - hexdump(len=65): 19 ba 2a ef 81 d2 71 b3 e8 d0 0d 3e e5 82 1d 2b 26 a6 af e9 20 b4 03 49 b0 fb ea 6e 64 71 80 16 ae 0f 03 f5 90 93 cd 28 24 0b f9 67 70 bd ff 04 03 c6 25 73 fd 6a 68 36 d0 ee 46 77 c8 51 74 14 42
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=50
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=14 method=25 vendor=0 vendorMethod=0
- EAP: EAP entering state METHOD
- SSL: Received packet(len=46) - Flags 0x01
- EAP-PEAP: received 40 bytes encrypted data for Phase 2
- OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
- EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 0e 00 0b 21 80 03 00 02 00 01
- EAP-PEAP: received Phase 2: code=1 identifier=14 length=11
- EAP-PEAP: Phase 2 Request: type=33
- EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01
- EAP-TLV: Result TLV - hexdump(len=2): 00 01
- EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed
- EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED]
- OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
- SSL: 40 bytes left to be sent out (of total 40 bytes)
- EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC eapRespData=0x1dfbdd0
- EAP: Session-Id - hexdump(len=65): 19 ba 2a ef 81 d2 71 b3 e8 d0 0d 3e e5 82 1d 2b 26 a6 af e9 20 b4 03 49 b0 fb ea 6e 64 71 80 16 ae 0f 03 f5 90 93 cd 28 24 0b f9 67 70 bd ff 04 03 c6 25 73 fd 6a 68 36 d0 ee 46 77 c8 51 74 14 42
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=46
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Success
- EAP: Status notification: completion (param=success)
- EAP: EAP entering state SUCCESS
- wlan0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
- EAPOL: SUPP_PAE entering state AUTHENTICATED
- EAPOL: Supplicant port status: Authorized
- nl80211: Set supplicant port authorized for b0:b8:67:ef:d9:11
- EAPOL: SUPP_BE entering state RECEIVE
- EAPOL: SUPP_BE entering state SUCCESS
- EAPOL: SUPP_BE entering state IDLE
- EAPOL authentication completed - result=SUCCESS
- Configure PMK for driver-based RSN 4-way handshake
- EAPOL: Successfully fetched key (len=32)
- RSN: Configure PMK for driver-based 4-way handshake - hexdump(len=32): [REMOVED]
- wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=5 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=32
- nl80211: Set PMK to the driver for b0:b8:67:ef:d9:11
- nl80211: PMK - hexdump(len=32): [REMOVED]
- nl80211: Set PMK failed: ret=-22 (Invalid argument)
- Failed to set PMK to the driver
- wlan0: Cancelling scan request
- wlan0: Cancelling authentication timeout
- Removed BSSID b0:b8:67:ef:d9:11 from blacklist
- wlan0: State: ASSOCIATED -> COMPLETED
- wlan0: Radio work 'connect'@0x1dff250 done in 3.092585 seconds
- wlan0: radio_work_free('connect'@0x1dff250): num_active_works --> 0
- wlan0: CTRL-EVENT-CONNECTED - Connection to b0:b8:67:ef:d9:11 completed [id=0 id_str=]
- nl80211: Set wlan0 operstate 0->1 (UP)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
- wlan0: Determining shared radio frequencies (max len 2)
- wlan0: Shared frequencies (len=1): completed iteration
- wlan0: freq[0]: 5745, flags=0x1
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=121
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
- EAPOL: External notification - portValid=1
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=121
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
- EAPOL: External notification - portValid=1
- EAPOL: startWhen --> 0
- l2_packet_receive: src=b0:b8:67:ef:d9:11 len=121
- wlan0: RX EAPOL from b0:b8:67:ef:d9:11
- EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
- EAPOL: External notification - portValid=1
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
- nl80211: Ignored event (cmd=48) for foreign interface (ifindex 3 wdev 0x0)
- nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlan0
- nl80211: Disconnect event
- wlan0: Event DEAUTH (11) received
- wlan0: Deauthentication notification
- wlan0: * reason 3
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlan0: CTRL-EVENT-DISCONNECTED bssid=b0:b8:67:ef:d9:11 reason=3
- wlan0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=9)
- wlan0: Setting scan request: 0.100000 sec
- Added BSSID b0:b8:67:ef:d9:11 into blacklist
- wlan0: Another BSS in this ESS has been seen; try it next
- BSSID b0:b8:67:ef:d9:11 blacklist count incremented to 2
- wlan0: Blacklist count 1 --> request scan in 100 ms
- wlan0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner
- TDLS: Remove peers on disassociation
- wlan0: WPA: Clear old PMK and PTK
- wlan0: Disconnect event - remove keys
- wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
- wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=0 addr=0x1ddc304 key_idx=0 set_tx=0 seq_len=0 key_len=0
- addr=b0:b8:67:ef:d9:11
- nl80211: Data frame filter flags=0x0
- wlan0: State: COMPLETED -> DISCONNECTED
- nl80211: Set wlan0 operstate 1->0 (DORMANT)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- wlan0: Determining shared radio frequencies (max len 2)
- wlan0: Shared frequencies (len=0): completed iteration
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Skip set_supp_port(unauthorized) while not associated
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: External notification - portValid=0
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
- nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for p2p-dev-wlan0
- nl80211: Regulatory domain change
- * initiator=0
- * type=1
- p2p-dev-wlan0: Event CHANNEL_LIST_CHANGED (27) received
- wlan0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
- p2p-dev-wlan0: Updating hw mode
- nl80211: Regulatory information - country=US (DFS-FCC)
- nl80211: 2402-2472 @ 40 MHz 30 mBm
- nl80211: 5170-5250 @ 80 MHz 23 mBm
- nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
- nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
- nl80211: 5735-5835 @ 80 MHz 30 mBm
- nl80211: 57240-63720 @ 2160 MHz 40 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
- nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- wlan0: Updating hw mode
- nl80211: Regulatory information - country=US (DFS-FCC)
- nl80211: 2402-2472 @ 40 MHz 30 mBm
- nl80211: 5170-5250 @ 80 MHz 23 mBm
- nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
- nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
- nl80211: 5735-5835 @ 80 MHz 30 mBm
- nl80211: 57240-63720 @ 2160 MHz 40 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
- nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- p2p-dev-wlan0: Determining shared radio frequencies (max len 2)
- p2p-dev-wlan0: Shared frequencies (len=0): completed iteration
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for p2p-dev-wlan0
- nl80211: Regulatory domain change
- * initiator=1
- * type=0
- * alpha2=US
- p2p-dev-wlan0: Event CHANNEL_LIST_CHANGED (27) received
- wlan0: CTRL-EVENT-REGDOM-CHANGE init=USER type=COUNTRY alpha2=US
- p2p-dev-wlan0: Updating hw mode
- nl80211: Regulatory information - country=US (DFS-FCC)
- nl80211: 2402-2472 @ 40 MHz 30 mBm
- nl80211: 5170-5250 @ 80 MHz 23 mBm
- nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
- nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
- nl80211: 5735-5835 @ 80 MHz 30 mBm
- nl80211: 57240-63720 @ 2160 MHz 40 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
- nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- wlan0: Updating hw mode
- nl80211: Regulatory information - country=US (DFS-FCC)
- nl80211: 2402-2472 @ 40 MHz 30 mBm
- nl80211: 5170-5250 @ 80 MHz 23 mBm
- nl80211: 5250-5330 @ 80 MHz 23 mBm (DFS)
- nl80211: 5490-5730 @ 160 MHz 23 mBm (DFS)
- nl80211: 5735-5835 @ 80 MHz 30 mBm
- nl80211: 57240-63720 @ 2160 MHz 40 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- nl80211: Mode IEEE 802.11a: 5170[DISABLED] 5180 5190[DISABLED] 5200 5210[DISABLED] 5220 5230[DISABLED] 5240 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
- nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[DISABLED] 2472[DISABLED] 2484[DISABLED]
- p2p-dev-wlan0: Determining shared radio frequencies (max len 2)
- p2p-dev-wlan0: Shared frequencies (len=0): completed iteration
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- wlan0: State: DISCONNECTED -> SCANNING
- wlan0: Determining shared radio frequencies (max len 2)
- wlan0: Shared frequencies (len=0): completed iteration
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- Scan SSID - hexdump_ascii(len=7):
- 65 64 75 72 6f 61 6d eduroam
- wlan0: Starting AP scan for wildcard SSID
- WPS: Building WPS IE for Probe Request
- WPS: * Version (hardcoded 0x10)
- WPS: * Request Type
- WPS: * Config Methods (3148)
- WPS: * UUID-E
- WPS: * Primary Device Type
- WPS: * RF Bands (3)
- WPS: * Association State
- WPS: * Configuration Error (0)
- WPS: * Device Password ID (0)
- WPS: * Manufacturer
- WPS: * Model Name
- WPS: * Model Number
- WPS: * Device Name
- WPS: * Version2 (0x20)
- P2P: * P2P IE header
- P2P: * Capability dev=25 group=00
- P2P: * Listen Channel: Regulatory Class 81 Channel 6
- wlan0: Optimize scan based on previously generated frequency list
- wlan0: Add radio work 'scan'@0x1e31280
- wlan0: First radio work item in the queue - schedule start immediately
- wlan0: Starting radio work 'scan'@0x1e31280 after 0.000053 second wait
- wlan0: nl80211: scan request
- Scan requested (ret=0) - scan timeout 30 seconds
- nl80211: Ignored event (cmd=33) for foreign interface (ifindex 3 wdev 0x0)
- nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
- wlan0: nl80211: Scan trigger
- wlan0: Event SCAN_STARTED (46) received
- wlan0: Own scan request started a scan in 0.000749 seconds
- RTM_NEWLINK: ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
- nl80211: Ignored event (cmd=34) for foreign interface (ifindex 3 wdev 0x0)
- nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
- wlan0: nl80211: New scan results available
- nl80211: Scan probed for SSID 'eduroam'
- nl80211: Scan probed for SSID ''
- nl80211: Scan included frequencies: 5200 5240 2462 2412 2437
- wlan0: Event SCAN_RESULTS (3) received
- wlan0: Scan completed in 0.217013 seconds
- nl80211: Received scan results (19 BSSes)
- wlan0: BSS: Start scan result update 4
- wlan0: BSS: Add new id 18 BSSID b0:b8:67:ef:47:c1 SSID 'eduroam' freq 2412
- BSS: last_scan_res_used=19/32
- wlan0: New scan results available (own=1 ext=0)
- WPS: AP f2:a3:b2:31:45:e3 type 0 added
- WPS: AP[0] f2:a3:b2:31:45:e3 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
- wlan0: Radio work 'scan'@0x1e31280 done in 0.220367 seconds
- wlan0: radio_work_free('scan'@0x1e31280): num_active_works --> 0
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: b0:b8:67:ef:d9:11 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-49 freq=5745
- wlan0: skip - blacklisted (count=2 limit=0)
- wlan0: 1: b0:b8:67:ed:fc:51 ssid='eduroam' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-54 freq=5200
- wlan0: selected based on RSN IE
- wlan0: selected BSS b0:b8:67:ed:fc:51 ssid='eduroam'
- wlan0: Considering connect request: reassociate: 0 selected: b0:b8:67:ed:fc:51 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x1dde570 current_ssid=(nil)
- wlan0: Request association with b0:b8:67:ed:fc:51
- wlan0: Re-association to the same ESS
- TDLS: TDLS is allowed in the target BSS
- TDLS: TDLS channel switch allowed in the target BSS
- wlan0: No ongoing scan/p2p-scan found to abort
- wlan0: Add radio work 'connect'@0x1e238b8
- wlan0: First radio work item in the queue - schedule start immediately
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- RSN: Ignored PMKID candidate without preauth flag
- p2p-dev-wlan0: Updating scan results from sibling
- nl80211: Received scan results (19 BSSes)
- p2p-dev-wlan0: BSS: Start scan result update 4
- p2p-dev-wlan0: BSS: Add new id 18 BSSID b0:b8:67:ef:47:c1 SSID 'eduroam' freq 2412
- BSS: last_scan_res_used=19/32
- wlan0: Starting radio work 'connect'@0x1e238b8 after 0.001952 second wait
- wlan0: Trying to associate with SSID 'eduroam'
- wlan0: Cancelling scan request
- wlan0: WPA: clearing own WPA/RSN IE
- RSN: PMKSA cache search - network_ctx=0x1dde570 try_opportunistic=0 akmp=0x0
- RSN: Search for BSSID b0:b8:67:ed:fc:51
- RSN: No PMKSA cache entry found
- wlan0: RSN: using IEEE 802.11i/D9.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
- wlan0: WPA: Selected mgmt group cipher 32
- wlan0: WPA: clearing AP WPA IE
- WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT 802.1X
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
- WPA: No current PMKSA - clear PMK
- wlan0: Automatic auth_alg selection: 0x1
- Added supported operating classes IE - hexdump(len=22): 3b 14 73 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82
- wlan0: State: SCANNING -> ASSOCIATING
- nl80211: Set wlan0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- wlan0: Determining shared radio frequencies (max len 2)
- wlan0: Shared frequencies (len=0): completed iteration
- P2P: Add operating class 81
- P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
- P2P: Add operating class 115
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 116
- P2P: Channels - hexdump(len=2): 24 2c
- P2P: Add operating class 117
- P2P: Channels - hexdump(len=2): 28 30
- P2P: Add operating class 124
- P2P: Channels - hexdump(len=4): 95 99 9d a1
- P2P: Add operating class 125
- P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
- P2P: Add operating class 126
- P2P: Channels - hexdump(len=2): 95 9d
- P2P: Add operating class 127
- P2P: Channels - hexdump(len=2): 99 a1
- P2P: Add operating class 128
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Add operating class 130
- P2P: Channels - hexdump(len=4): 24 28 2c 30
- P2P: Update channel list
- P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 128:36,40,44,48 130:36,40,44,48
- P2P: cli_channels:
- wlan0: set_disable_max_amsdu: -1
- wlan0: set_ampdu_factor: -1
- wlan0: set_ampdu_density: -1
- wlan0: set_disable_ht40: 0
- wlan0: set_disable_sgi: 0
- wlan0: set_disable_ldpc: 0
- wlan0: set_rx_stbc: -1
- wlan0: set_tx_stbc: -1
- nl80211: Set mode ifindex 3 iftype 2 (STATION)
- nl80211: Unsubscribe mgmt frames handle 0x89555629 (mode change)
- nl80211: Subscribe to mgmt frames with non-AP handle 0x1dddea0
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0104
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040b
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040c
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040d
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090b
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090c
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=090d
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0409506f9a09
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=7f506f9a09
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0409506f9a1a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0801
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=040e
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=12
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=06
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a07
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a11
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0a1a
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=1101
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=1102
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0505
- nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1dddea0 match=0500
- nl80211: Connect (ifindex=3)
- * bssid_hint=b0:b8:67:ed:fc:51
- * freq_hint=5200
- * SSID - hexdump_ascii(len=7):
- 65 64 75 72 6f 61 6d eduroam
- * IEs - hexdump(len=44): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 3b 14 73 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82
- * WPA Versions 0x2
- * pairwise=0xfac04
- * group=0xfac04
- * akm=0xfac01
- * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
- * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
- * Auth Type 0
- nl80211: Connect request send successfully
- wlan0: Setting authentication timeout: 10 sec 0 usec
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - EAP fail=0
- EAPOL: External notification - portControl=Auto
- EAPOL: disable timer tick
- ^Cp2p-dev-wlan0: Removing interface p2p-dev-wlan0
- p2p-dev-wlan0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=DISCONNECTED
- TDLS: Tear down peers
- nl80211: Data frame filter flags=0x0
- nl80211: Failed to open /proc/sys/net/ipv4/conf/p2p-dev-wlan0/drop_unicast_in_l2_multicast: No such file or directory
- nl80211: Failed to set IPv4 unicast in multicast filter
- p2p-dev-wlan0: State: DISCONNECTED -> DISCONNECTED
- nl80211: Set p2p-dev-wlan0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=0 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- p2p-dev-wlan0: WPA: Clear old PMK and PTK
- p2p-dev-wlan0: BSS: Remove id 0 BSSID b0:b8:67:ef:d9:11 SSID 'eduroam' due to wpa_bss_flush
- p2p-dev-wlan0: BSS: Remove id 1 BSSID b0:b8:67:ed:fc:51 SSID 'eduroam' due to wpa_bss_flush
- p2p-dev-wlan0: BSS: Remove id 2 BSSID b0:b8:67:f1:57:91 SSID 'eduroam' due to wpa_bss_flush
- p2p-dev-wlan0: BSS: Remove id 3 BSSID b0:b8:67:ef:d9:01 SSID 'eduroam' due to wpa_bss_flush
- p2p-dev-wlan0: BSS: Remove id 4 BSSID b0:b8:67:ed:fc:41 SSID 'eduroam' due to wpa_bss_flush
- p2p-dev-wlan0: BSS: Remove id 5 BSSID b0:b8:67:f1:57:81 SSID 'eduroam' due to wpa_bss_flush
- p2p-dev-wlan0: BSS: Remove id 6 BSSID b0:b8:67:ef:47:d1 SSID 'eduroam' due to wpa_bss_flush
- p2p-dev-wlan0: BSS: Remove id 7 BSSID 38:17:c3:af:96:e1 SSID 'eduroam' due to wpa_bss_flush
- p2p-dev-wlan0: BSS: Remove id 18 BSSID b0:b8:67:ef:47:c1 SSID 'eduroam' due to wpa_bss_flush
- p2p-dev-wlan0: BSS: Remove id 16 BSSID f2:a3:b2:31:45:e3 SSID '' due to wpa_bss_flush
- p2p-dev-wlan0: BSS: Remove id 8 BSSID b0:b8:67:ef:d9:10 SSID 'XXX-OPEN' due to wpa_bss_flush
- p2p-dev-wlan0: BSS: Remove id 9 BSSID b0:b8:67:ed:fc:50 SSID 'XXX-OPEN' due to wpa_bss_flush
- p2p-dev-wlan0: BSS: Remove id 10 BSSID b0:b8:67:f1:57:90 SSID 'XXX-OPEN' due to wpa_bss_flush
- p2p-dev-wlan0: BSS: Remove id 11 BSSID b0:b8:67:ef:d9:00 SSID 'XXX-OPEN' due to wpa_bss_flush
- p2p-dev-wlan0: BSS: Remove id 12 BSSID b0:b8:67:ed:fc:40 SSID 'XXX-OPEN' due to wpa_bss_flush
- p2p-dev-wlan0: BSS: Remove id 13 BSSID b0:b8:67:f1:57:80 SSID 'XXX-OPEN' due to wpa_bss_flush
- p2p-dev-wlan0: BSS: Remove id 15 BSSID 38:17:c3:af:96:e0 SSID 'XXX-OPEN' due to wpa_bss_flush
- p2p-dev-wlan0: BSS: Remove id 14 BSSID b0:b8:67:ef:47:d0 SSID 'XXX-OPEN' due to wpa_bss_flush
- p2p-dev-wlan0: BSS: Remove id 17 BSSID b0:b8:67:ef:47:c0 SSID 'XXX-OPEN' due to wpa_bss_flush
- p2p-dev-wlan0: Cancelling delayed sched scan
- p2p-dev-wlan0: Cancelling scan request
- p2p-dev-wlan0: Cancelling authentication timeout
- Off-channel: Clear pending Action frame TX (pending_action_tx=(nil)
- nl80211: Data frame filter flags=0x0
- nl80211: Failed to open /proc/sys/net/ipv4/conf/p2p-dev-wlan0/drop_unicast_in_l2_multicast: No such file or directory
- nl80211: Failed to set IPv4 unicast in multicast filter
- HS20: Delete all stored icons
- Off-channel: Action frame sequence done notification: pending_action_tx=(nil) drv_offchan_tx=1 action_tx_wait_time=0 off_channel_freq=0 roc_waiting_drv_freq=0
- p2p-dev-wlan0: P2P: Disable P2P since removing the management interface is being removed
- P2P: All ASP advertisements flushed
- P2P: Disabling Extended Listen Timing
- P2P: Stopping find
- P2P: Clear timeout (state=IDLE)
- P2P: State IDLE -> IDLE
- P2P: All ASP advertisements flushed
- Remove interface p2p-dev-wlan0 from radio phy0
- nl80211: deinit ifname=p2p-dev-wlan0 disabled_11b_rates=0
- nl80211: Remove monitor interface: refcount=0
- netlink: Operstate: ifindex=0 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
- nl80211: Stop P2P Device p2p-dev-wlan0 (0x6): Success
- nl80211: Unsubscribe mgmt frames handle 0x8957f3a9 (deinit)
- nl80211: Delete P2P Device p2p-dev-wlan0 (0x6): Success
- p2p-dev-wlan0: CTRL-EVENT-TERMINATING
- Control interface directory not empty - leaving it behind
- wlan0: Removing interface wlan0
- wlan0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=b0:b8:67:ed:fc:51 reason=3 state=ASSOCIATING
- TDLS: Tear down peers
- wpa_driver_nl80211_disconnect(reason_code=3)
- wlan0: Event DEAUTH (11) received
- wlan0: Deauthentication notification
- wlan0: * reason 3 (locally generated)
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlan0: CTRL-EVENT-DISCONNECTED bssid=b0:b8:67:ed:fc:51 reason=3 locally_generated=1
- wlan0: Auto connect disabled: do not try to re-connect
- wlan0: Radio work 'connect'@0x1e238b8 done in 0.980123 seconds
- wlan0: radio_work_free('connect'@0x1e238b8): num_active_works --> 0
- wlan0: Ignore connection failure indication since interface has been put into disconnected state
- TDLS: Remove peers on disassociation
- wlan0: WPA: Clear old PMK and PTK
- wlan0: Disconnect event - remove keys
- nl80211: Data frame filter flags=0x0
- wlan0: State: ASSOCIATING -> DISCONNECTED
- nl80211: Set wlan0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- nl80211: Data frame filter flags=0x0
- wlan0: State: DISCONNECTED -> DISCONNECTED
- nl80211: Set wlan0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit
- ENGINE: engine deinit
- wlan0: WPA: Clear old PMK and PTK
- Removed BSSID b0:b8:67:ef:d9:11 from blacklist (clear)
- wlan0: BSS: Remove id 0 BSSID b0:b8:67:ef:d9:11 SSID 'eduroam' due to wpa_bss_flush
- wlan0: BSS: Remove id 1 BSSID b0:b8:67:ed:fc:51 SSID 'eduroam' due to wpa_bss_flush
- wlan0: BSS: Remove id 2 BSSID b0:b8:67:f1:57:91 SSID 'eduroam' due to wpa_bss_flush
- wlan0: BSS: Remove id 3 BSSID b0:b8:67:ef:d9:01 SSID 'eduroam' due to wpa_bss_flush
- wlan0: BSS: Remove id 4 BSSID b0:b8:67:ed:fc:41 SSID 'eduroam' due to wpa_bss_flush
- wlan0: BSS: Remove id 5 BSSID b0:b8:67:f1:57:81 SSID 'eduroam' due to wpa_bss_flush
- wlan0: BSS: Remove id 6 BSSID b0:b8:67:ef:47:d1 SSID 'eduroam' due to wpa_bss_flush
- wlan0: BSS: Remove id 7 BSSID 38:17:c3:af:96:e1 SSID 'eduroam' due to wpa_bss_flush
- wlan0: BSS: Remove id 18 BSSID b0:b8:67:ef:47:c1 SSID 'eduroam' due to wpa_bss_flush
- wlan0: BSS: Remove id 16 BSSID f2:a3:b2:31:45:e3 SSID '' due to wpa_bss_flush
- wlan0: BSS: Remove id 8 BSSID b0:b8:67:ef:d9:10 SSID 'XXX-OPEN' due to wpa_bss_flush
- wlan0: BSS: Remove id 9 BSSID b0:b8:67:ed:fc:50 SSID 'XXX-OPEN' due to wpa_bss_flush
- wlan0: BSS: Remove id 10 BSSID b0:b8:67:f1:57:90 SSID 'XXX-OPEN' due to wpa_bss_flush
- wlan0: BSS: Remove id 11 BSSID b0:b8:67:ef:d9:00 SSID 'XXX-OPEN' due to wpa_bss_flush
- wlan0: BSS: Remove id 12 BSSID b0:b8:67:ed:fc:40 SSID 'XXX-OPEN' due to wpa_bss_flush
- wlan0: BSS: Remove id 13 BSSID b0:b8:67:f1:57:80 SSID 'XXX-OPEN' due to wpa_bss_flush
- wlan0: BSS: Remove id 15 BSSID 38:17:c3:af:96:e0 SSID 'XXX-OPEN' due to wpa_bss_flush
- wlan0: BSS: Remove id 14 BSSID b0:b8:67:ef:47:d0 SSID 'XXX-OPEN' due to wpa_bss_flush
- wlan0: BSS: Remove id 17 BSSID b0:b8:67:ef:47:c0 SSID 'XXX-OPEN' due to wpa_bss_flush
- wlan0: Cancelling delayed sched scan
- wlan0: Cancelling scan request
- wlan0: Cancelling authentication timeout
- Off-channel: Clear pending Action frame TX (pending_action_tx=(nil)
- nl80211: Data frame filter flags=0x0
- HS20: Delete all stored icons
- Off-channel: Action frame sequence done notification: pending_action_tx=(nil) drv_offchan_tx=1 action_tx_wait_time=0 off_channel_freq=0 roc_waiting_drv_freq=0
- Remove interface wlan0 from radio phy0
- Remove radio phy0
- nl80211: deinit ifname=wlan0 disabled_11b_rates=0
- nl80211: Remove monitor interface: refcount=0
- netlink: Operstate: ifindex=3 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
- nl80211: Set mode ifindex 3 iftype 2 (STATION)
- nl80211: Unsubscribe mgmt frames handle 0x89555629 (mode change)
- wlan0: CTRL-EVENT-TERMINATING
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement