EAP-WSC failure during P2P connection with Dell laptop

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Has anyone seen this before?

05-16 16:20:28.429  1195  1195 D wpa_supplicant: EAP-WSC: MESG -> MESG
05-16 16:20:28.429  1195  1195 D wpa_supplicant: EAP-WSC: Generating Response
05-16 16:20:28.429  1195  1195 D wpa_supplicant: EAP-WSC: Sending out 60 bytes (message sent completely)
05-16 16:20:28.429  1195  1195 D wpa_supplicant: EAP-WSC: MESG -> FAIL
05-16 16:20:28.429  1195  1195 D wpa_supplicant: EAP: method process -> ignore=FALSE methodState=DONE decision=FAIL eapRespData=0x7f59630310
05-16 16:20:28.429  1195  1195 D wpa_supplicant: EAP: EAP entering state SEND_RESPONSE
05-16 16:20:28.429  1195  1195 D wpa_supplicant: EAP: EAP entering state IDLE
05-16 16:20:28.429  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state RESPONSE
05-16 16:20:28.429  1195  1195 D wpa_supplicant: EAPOL: txSuppRsp
05-16 16:20:28.429  1195  1195 D wpa_supplicant: TX EAPOL: dst=b6:ae:2b:e6:ad:23
05-16 16:20:28.429  1195  1195 D wpa_supplicant: TX EAPOL - hexdump(len=78): 01 00 00 4a 02 2a 00 4a fe 00 37 2a 00 00 00 01 05 00 10 4a 00 01 10 10 22 00 01 0f 10 1a 00 10 ...
05-16 16:20:28.429  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state RECEIVE
05-16 16:20:28.432  1195  1195 D wpa_supplicant: l2_packet_receive: src=b6:ae:2b:e6:ad:23 len=8
05-16 16:20:28.432  1195  1195 D wpa_supplicant: p2p0: RX EAPOL from b6:ae:2b:e6:ad:23
05-16 16:20:28.432  1195  1195 D wpa_supplicant: RX EAPOL - hexdump(len=8): 01 00 00 04 04 2a 00 04
05-16 16:20:28.432  1195  1195 D wpa_supplicant: EAPOL: Received EAP-Packet frame
05-16 16:20:28.432  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state REQUEST
05-16 16:20:28.432  1195  1195 D wpa_supplicant: EAPOL: getSuppRsp
05-16 16:20:28.432  1195  1195 D wpa_supplicant: EAP: EAP entering state RECEIVED
05-16 16:20:28.432  1195  1195 D wpa_supplicant: EAP: Received EAP-Failure
05-16 16:20:28.433  1195  1195 D wpa_supplicant: EAP: Status notification: completion (param=failure)
05-16 16:20:28.433  1195  1195 D wpa_supplicant: EAP: EAP entering state FAILURE
05-16 16:20:28.433  1195  1195 I wpa_supplicant: p2p0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
05-16 16:20:28.433  1195  1195 D wpa_supplicant: EAPOL: SUPP_PAE entering state HELD
05-16 16:20:28.433  1195  1195 D wpa_supplicant: EAPOL: Supplicant port status: Unauthorized
05-16 16:20:28.433  1195  1195 D wpa_supplicant: nl80211: Set supplicant port unauthorized for b6:ae:2b:e6:ad:23
05-16 16:20:28.433  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state RECEIVE
05-16 16:20:28.433  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state FAIL
05-16 16:20:28.433  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state IDLE
05-16 16:20:28.433  1195  1195 D wpa_supplicant: EAPOL authentication completed - result=FAILURE
05-16 16:20:28.433  1195  1195 D wpa_supplicant: WPS: Network configuration replaced - try to associate with the received credential (freq=5180)

It happens from time to time with most devices in our environment, but we have several "new" Dell laptops that seem to have this happen EVERY time.

(Full log attached).

Thanks!
-Chris
05-16 16:20:26.291  1195  1195 D wpa_supplicant: p2p0: State: ASSOCIATING -> ASSOCIATED
05-16 16:20:26.291  1195  1195 D wpa_supplicant: nl80211: Set p2p0 operstate 0->0 (DORMANT)
05-16 16:20:26.291  1195  1195 D wpa_supplicant: netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
05-16 16:20:26.293  1195  1195 D wpa_supplicant: p2p0: Determining shared radio frequencies (max len 1)
05-16 16:20:26.293  1195  1195 D wpa_supplicant: p2p0: Shared frequencies (len=1): completed iteration
05-16 16:20:26.294  1195  1195 D wpa_supplicant: p2p0: freq[0]: 5180, flags=0x2
05-16 16:20:26.294  1195  1195 D wpa_supplicant: P2P: Add operating class 81
05-16 16:20:26.294  1195  1195 D wpa_supplicant: P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
05-16 16:20:26.294  1195  1195 D wpa_supplicant: P2P: Add operating class 115
05-16 16:20:26.294  1195  1195 D wpa_supplicant: P2P: Channels - hexdump(len=4): 24 28 2c 30
05-16 16:20:26.294  1195  1195 D wpa_supplicant: P2P: Add operating class 116
05-16 16:20:26.294  1195  1195 D wpa_supplicant: P2P: Channels - hexdump(len=2): 24 2c
05-16 16:20:26.294  1195  1195 D wpa_supplicant: P2P: Add operating class 117
05-16 16:20:26.294  1195  1195 D wpa_supplicant: P2P: Channels - hexdump(len=2): 28 30
05-16 16:20:26.294  1195  1195 D wpa_supplicant: P2P: Add operating class 124
05-16 16:20:26.294  1195  1195 D wpa_supplicant: P2P: Channels - hexdump(len=4): 95 99 9d a1
05-16 16:20:26.294  1195  1195 D wpa_supplicant: P2P: Add operating class 125
05-16 16:20:26.294  1195  1195 D wpa_supplicant: P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
05-16 16:20:26.294  1195  1195 D wpa_supplicant: P2P: Add operating class 126
05-16 16:20:26.294  1195  1195 D wpa_supplicant: P2P: Channels - hexdump(len=2): 95 9d
05-16 16:20:26.294  1195  1195 D wpa_supplicant: P2P: Add operating class 127
05-16 16:20:26.294  1195  1195 D wpa_supplicant: P2P: Channels - hexdump(len=2): 99 a1
05-16 16:20:26.294  1195  1195 D wpa_supplicant: P2P: Add operating class 130
05-16 16:20:26.294  1195  1195 D wpa_supplicant: P2P: Channels - hexdump(len=4): 24 28 2c 30
05-16 16:20:26.294  1195  1195 D wpa_supplicant: P2P: Update channel list
05-16 16:20:26.295  1195  1195 D wpa_supplicant: P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:153,161 130:36,40,44,48
05-16 16:20:26.295  1195  1195 D wpa_supplicant: P2P: cli_channels:
05-16 16:20:26.295  1195  1195 D wpa_supplicant: p2p0: Associated to a new BSS: BSSID=b6:ae:2b:e6:ad:23
05-16 16:20:26.295  1195  1195 I wpa_supplicant: p2p0: Associated with b6:ae:2b:e6:ad:23
05-16 16:20:26.295  1195  1195 D wpa_supplicant: p2p0: WPA: Association event - clear replay counter
05-16 16:20:26.295  1195  1195 D wpa_supplicant: p2p0: WPA: Clear old PTK
05-16 16:20:26.295  1195  1195 D wpa_supplicant: TDLS: Remove peers on association
05-16 16:20:26.295  1195  1195 D wpa_supplicant: EAPOL: External notification - portEnabled=0
05-16 16:20:26.295  1195  1195 D wpa_supplicant: EAPOL: External notification - portValid=0
05-16 16:20:26.295  1195  1195 D wpa_supplicant: EAPOL: External notification - portEnabled=1
05-16 16:20:26.295  1195  1195 D wpa_supplicant: EAPOL: SUPP_PAE entering state CONNECTING
05-16 16:20:26.296  1195  1195 D wpa_supplicant: EAPOL: enable timer tick
05-16 16:20:26.296  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state IDLE
05-16 16:20:26.296  1195  1195 D wpa_supplicant: EAP: EAP entering state INITIALIZE
05-16 16:20:26.296  1195  1195 D wpa_supplicant: EAP: deinitialize previously used EAP method (254, WSC) at INITIALIZE
05-16 16:20:26.296  1195  1195 D wpa_supplicant: EAP: EAP entering state IDLE
05-16 16:20:26.296  1195  1195 D wpa_supplicant: p2p0: Setting authentication timeout: 10 sec 0 usec
05-16 16:20:26.296  1195  1195 D wpa_supplicant: p2p0: Cancelling scan request
05-16 16:20:26.296  1195  1195 D wpa_supplicant: WMM AC: Missing U-APSD configuration
05-16 16:20:26.296  1195  1195 I wpa_supplicant: p2p0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
05-16 16:20:26.296  1195  1195 D wpa_supplicant: RTM_NEWLINK: ifi_index=5 ifname=p2p0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
05-16 16:20:28.064  1195  1195 D wpa_supplicant: wlan0: Control interface command 'SIGNAL_POLL'
05-16 16:20:28.297  1195  1195 D wpa_supplicant: EAPOL: startWhen --> 0
05-16 16:20:28.298  1195  1195 D wpa_supplicant: EAPOL: SUPP_PAE entering state CONNECTING
05-16 16:20:28.298  1195  1195 D wpa_supplicant: EAPOL: txStart
05-16 16:20:28.298  1195  1195 D wpa_supplicant: TX EAPOL: dst=b6:ae:2b:e6:ad:23
05-16 16:20:28.298  1195  1195 D wpa_supplicant: TX EAPOL - hexdump(len=4): 01 01 00 00
05-16 16:20:28.300  1195  1195 D wpa_supplicant: l2_packet_receive: src=b6:ae:2b:e6:ad:23 len=9
05-16 16:20:28.300  1195  1195 D wpa_supplicant: p2p0: RX EAPOL from b6:ae:2b:e6:ad:23
05-16 16:20:28.300  1195  1195 D wpa_supplicant: RX EAPOL - hexdump(len=9): 01 00 00 05 01 25 00 05 01
05-16 16:20:28.300  1195  1195 D wpa_supplicant: p2p0: Setting authentication timeout: 70 sec 0 usec
05-16 16:20:28.301  1195  1195 D wpa_supplicant: EAPOL: Received EAP-Packet frame
05-16 16:20:28.301  1195  1195 D wpa_supplicant: EAPOL: SUPP_PAE entering state RESTART
05-16 16:20:28.301  1195  1195 D wpa_supplicant: EAP: EAP entering state INITIALIZE
05-16 16:20:28.301  1195  1195 D wpa_supplicant: EAP: EAP entering state IDLE
05-16 16:20:28.301  1195  1195 D wpa_supplicant: EAPOL: SUPP_PAE entering state AUTHENTICATING
05-16 16:20:28.301  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state REQUEST
05-16 16:20:28.301  1195  1195 D wpa_supplicant: EAPOL: getSuppRsp
05-16 16:20:28.301  1195  1195 D wpa_supplicant: EAP: EAP entering state RECEIVED
05-16 16:20:28.301  1195  1195 D wpa_supplicant: EAP: Received EAP-Request id=37 method=1 vendor=0 vendorMethod=0
05-16 16:20:28.301  1195  1195 D wpa_supplicant: EAP: EAP entering state IDENTITY
05-16 16:20:28.301  1195  1195 I wpa_supplicant: p2p0: CTRL-EVENT-EAP-STARTED EAP authentication started
05-16 16:20:28.302  1195  1195 D wpa_supplicant: EAP: Status notification: started (param=)
05-16 16:20:28.302  1195  1195 D wpa_supplicant: EAP: EAP-Request Identity data - hexdump(len=0):
05-16 16:20:28.302  1195  1195 D wpa_supplicant: EAP: using real identity - hexdump(len=29): 57 46 41 2d 53 69 6d 70 6c 65 43 6f 6e 66 69 67 2d 45 6e 72 6f 6c 6c 65 65 2d 31 2d 30
05-16 16:20:28.302  1195  1195 D wpa_supplicant: EAP: EAP entering state SEND_RESPONSE
05-16 16:20:28.302  1195  1195 D wpa_supplicant: EAP: EAP entering state IDLE
05-16 16:20:28.302  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state RESPONSE
05-16 16:20:28.302  1195  1195 D wpa_supplicant: EAPOL: txSuppRsp
05-16 16:20:28.302  1195  1195 D wpa_supplicant: TX EAPOL: dst=b6:ae:2b:e6:ad:23
05-16 16:20:28.303  1195  1195 D wpa_supplicant: TX EAPOL - hexdump(len=38): 01 00 00 22 02 25 00 22 01 57 46 41 2d 53 69 6d 70 6c 65 43 6f 6e 66 69 67 2d 45 6e 72 6f 6c 6c ...
05-16 16:20:28.303  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state RECEIVE
05-16 16:20:28.307  1195  1195 D wpa_supplicant: l2_packet_receive: src=b6:ae:2b:e6:ad:23 len=18
05-16 16:20:28.308  1195  1195 D wpa_supplicant: p2p0: RX EAPOL from b6:ae:2b:e6:ad:23
05-16 16:20:28.308  1195  1195 D wpa_supplicant: RX EAPOL - hexdump(len=18): 01 00 00 0e 01 26 00 0e fe 00 37 2a 00 00 00 01 01 00
05-16 16:20:28.308  1195  1195 D wpa_supplicant: EAPOL: Received EAP-Packet frame
05-16 16:20:28.308  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state REQUEST
05-16 16:20:28.308  1195  1195 D wpa_supplicant: EAPOL: getSuppRsp
05-16 16:20:28.308  1195  1195 D wpa_supplicant: EAP: EAP entering state RECEIVED
05-16 16:20:28.308  1195  1195 D wpa_supplicant: EAP: Received EAP-Request id=38 method=254 vendor=14122 vendorMethod=1
05-16 16:20:28.308  1195  1195 D wpa_supplicant: EAP: EAP entering state GET_METHOD
05-16 16:20:28.308  1195  1195 I wpa_supplicant: p2p0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=14122 method=1
05-16 16:20:28.309  1195  1195 D wpa_supplicant: EAP: Status notification: accept proposed method (param=WSC)
05-16 16:20:28.309  1195  1195 D wpa_supplicant: EAP: Initialize selected EAP method: vendor 14122 method 1 (WSC)
05-16 16:20:28.309  1195  1195 D wpa_supplicant: EAP-WSC: Fragment size limit 1398
05-16 16:20:28.309  1195  1195 I wpa_supplicant: p2p0: CTRL-EVENT-EAP-METHOD EAP vendor 14122 method 1 (WSC) selected
05-16 16:20:28.309  1195  1195 D wpa_supplicant: EAP: EAP entering state METHOD
05-16 16:20:28.309  1195  1195 D wpa_supplicant: EAP-WSC: Received packet: Op-Code 1 Flags 0x0 Message Length 0
05-16 16:20:28.310  1195  1195 D wpa_supplicant: EAP-WSC: Received start
05-16 16:20:28.310  1195  1195 D wpa_supplicant: EAP-WSC: WAIT_START -> MESG
05-16 16:20:28.310  1195  1195 D wpa_supplicant: Get randomness: len=16 entropy=1001
05-16 16:20:28.313  1195  1195 D wpa_supplicant: random from os_get_random - hexdump(len=16): [REMOVED]
05-16 16:20:28.313  1195  1195 D wpa_supplicant: random_mix_pool - hexdump(len=20): [REMOVED]
05-16 16:20:28.313  1195  1195 D wpa_supplicant: random from internal pool - hexdump(len=16): [REMOVED]
05-16 16:20:28.313  1195  1195 D wpa_supplicant: mixed random - hexdump(len=16): [REMOVED]
05-16 16:20:28.313  1195  1195 D wpa_supplicant: WPS: Enrollee Nonce - hexdump(len=16): a9 1d ca c9 c7 f4 91 df 09 10 c8 bf 80 5b d5 e2
05-16 16:20:28.313  1195  1195 D wpa_supplicant: WPS: Building Message M1
05-16 16:20:28.313  1195  1195 D wpa_supplicant: WPS:  * Version (hardcoded 0x10)
05-16 16:20:28.313  1195  1195 D wpa_supplicant: WPS:  * Message Type (4)
05-16 16:20:28.313  1195  1195 D wpa_supplicant: WPS:  * UUID-E
05-16 16:20:28.313  1195  1195 D wpa_supplicant: WPS:  * MAC Address (2e:6f:c9:0c:f9:cb)
05-16 16:20:28.313  1195  1195 D wpa_supplicant: WPS:  * Enrollee Nonce
05-16 16:20:28.313  1195  1195 D wpa_supplicant: WPS:  * Public Key
05-16 16:20:28.314  1195  1195 D wpa_supplicant: WPS: Generate new DH keys
05-16 16:20:28.345  1195  1195 D wpa_supplicant: WPS: DH Private Key - hexdump(len=192): [REMOVED]
05-16 16:20:28.346  1195  1195 D wpa_supplicant: WPS: DH own Public Key - hexdump(len=192): a7 cf 99 96 0a 58 28 60 55 30 49 fa a6 ce 55 f8 c5 41 73 b4 22 57 ec 1f 0f 3a 44 34 36 aa ee 38 ...
05-16 16:20:28.346  1195  1195 D wpa_supplicant: WPS:  * Authentication Type Flags (0x23)
05-16 16:20:28.346  1195  1195 D wpa_supplicant: WPS:  * Encryption Type Flags (0xd)
05-16 16:20:28.346  1195  1195 D wpa_supplicant: WPS:  * Connection Type Flags
05-16 16:20:28.346  1195  1195 D wpa_supplicant: WPS:  * Config Methods (4388)
05-16 16:20:28.346  1195  1195 D wpa_supplicant: WPS:  * Wi-Fi Protected Setup State (1)
05-16 16:20:28.346  1195  1195 D wpa_supplicant: WPS:  * Manufacturer
05-16 16:20:28.346  1195  1195 D wpa_supplicant: WPS:  * Model Name
05-16 16:20:28.346  1195  1195 D wpa_supplicant: WPS:  * Model Number
05-16 16:20:28.346  1195  1195 D wpa_supplicant: WPS:  * Serial Number
05-16 16:20:28.346  1195  1195 D wpa_supplicant: WPS:  * Primary Device Type
05-16 16:20:28.346  1195  1195 D wpa_supplicant: WPS:  * Device Name
05-16 16:20:28.346  1195  1195 D wpa_supplicant: WPS:  * RF Bands (2)
05-16 16:20:28.346  1195  1195 D wpa_supplicant: WPS:  * Association State
05-16 16:20:28.346  1195  1195 D wpa_supplicant: WPS:  * Device Password ID (4)
05-16 16:20:28.346  1195  1195 D wpa_supplicant: WPS:  * Configuration Error (0)
05-16 16:20:28.346  1195  1195 D wpa_supplicant: WPS:  * OS Version
05-16 16:20:28.346  1195  1195 D wpa_supplicant: WPS:  * Version2 (0x20)
05-16 16:20:28.346  1195  1195 D wpa_supplicant: EAP-WSC: MESG -> MESG
05-16 16:20:28.346  1195  1195 D wpa_supplicant: EAP-WSC: Generating Response
05-16 16:20:28.346  1195  1195 D wpa_supplicant: EAP-WSC: Sending out 374 bytes (message sent completely)
05-16 16:20:28.346  1195  1195 D wpa_supplicant: EAP-WSC: MESG -> MESG
05-16 16:20:28.346  1195  1195 D wpa_supplicant: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x7f59647880
05-16 16:20:28.346  1195  1195 D wpa_supplicant: EAP: EAP entering state SEND_RESPONSE
05-16 16:20:28.346  1195  1195 D wpa_supplicant: EAP: EAP entering state IDLE
05-16 16:20:28.346  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state RESPONSE
05-16 16:20:28.346  1195  1195 D wpa_supplicant: EAPOL: txSuppRsp
05-16 16:20:28.346  1195  1195 D wpa_supplicant: TX EAPOL: dst=b6:ae:2b:e6:ad:23
05-16 16:20:28.346  1195  1195 D wpa_supplicant: TX EAPOL - hexdump(len=392): 01 00 01 84 02 26 01 84 fe 00 37 2a 00 00 00 01 04 00 10 4a 00 01 10 10 22 00 01 04 10 47 00 10 ...
05-16 16:20:28.346  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state RECEIVE
05-16 16:20:28.365  1195  1195 D wpa_supplicant: l2_packet_receive: src=b6:ae:2b:e6:ad:23 len=434
05-16 16:20:28.365  1195  1195 D wpa_supplicant: p2p0: RX EAPOL from b6:ae:2b:e6:ad:23
05-16 16:20:28.365  1195  1195 D wpa_supplicant: RX EAPOL - hexdump(len=434): 01 00 01 ae 01 27 01 ae fe 00 37 2a 00 00 00 01 04 00 10 4a 00 01 10 10 22 00 01 05 10 1a 00 10 ...
05-16 16:20:28.365  1195  1195 D wpa_supplicant: EAPOL: Received EAP-Packet frame
05-16 16:20:28.365  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state REQUEST
05-16 16:20:28.365  1195  1195 D wpa_supplicant: EAPOL: getSuppRsp
05-16 16:20:28.365  1195  1195 D wpa_supplicant: EAP: EAP entering state RECEIVED
05-16 16:20:28.365  1195  1195 D wpa_supplicant: EAP: Received EAP-Request id=39 method=254 vendor=14122 vendorMethod=1
05-16 16:20:28.365  1195  1195 D wpa_supplicant: EAP: EAP entering state METHOD
05-16 16:20:28.365  1195  1195 D wpa_supplicant: EAP-WSC: Received packet: Op-Code 4 Flags 0x0 Message Length 0
05-16 16:20:28.365  1195  1195 D wpa_supplicant: WPS: Processing received message (len=416 op_code=4)
05-16 16:20:28.365  1195  1195 D wpa_supplicant: WPS: Received WSC_MSG
05-16 16:20:28.365  1195  1195 D wpa_supplicant: WPS: attr type=0x104a len=1
05-16 16:20:28.365  1195  1195 D wpa_supplicant: WPS: attr type=0x1022 len=1
05-16 16:20:28.365  1195  1195 D wpa_supplicant: WPS: attr type=0x101a len=16
05-16 16:20:28.365  1195  1195 D wpa_supplicant: WPS: attr type=0x1039 len=16
05-16 16:20:28.365  1195  1195 D wpa_supplicant: WPS: attr type=0x1048 len=16
05-16 16:20:28.365  1195  1195 D wpa_supplicant: WPS: attr type=0x1032 len=192
05-16 16:20:28.365  1195  1195 D wpa_supplicant: WPS: attr type=0x1004 len=2
05-16 16:20:28.365  1195  1195 D wpa_supplicant: WPS: attr type=0x1010 len=2
05-16 16:20:28.365  1195  1195 D wpa_supplicant: WPS: attr type=0x100d len=1
05-16 16:20:28.365  1195  1195 D wpa_supplicant: WPS: attr type=0x1008 len=2
05-16 16:20:28.365  1195  1195 D wpa_supplicant: WPS: attr type=0x1021 len=9
05-16 16:20:28.365  1195  1195 D wpa_supplicant: WPS: attr type=0x1023 len=7
05-16 16:20:28.365  1195  1195 D wpa_supplicant: WPS: attr type=0x1024 len=10
05-16 16:20:28.365  1195  1195 D wpa_supplicant: WPS: attr type=0x1042 len=1
05-16 16:20:28.365  1195  1195 D wpa_supplicant: WPS: attr type=0x1054 len=8
05-16 16:20:28.365  1195  1195 D wpa_supplicant: WPS: attr type=0x1011 len=15
05-16 16:20:28.365  1195  1195 D wpa_supplicant: WPS: attr type=0x103c len=1
05-16 16:20:28.365  1195  1195 D wpa_supplicant: WPS: attr type=0x1002 len=2
05-16 16:20:28.366  1195  1195 D wpa_supplicant: WPS: attr type=0x1009 len=2
05-16 16:20:28.366  1195  1195 D wpa_supplicant: WPS: attr type=0x1012 len=2
05-16 16:20:28.366  1195  1195 D wpa_supplicant: WPS: attr type=0x102d len=4
05-16 16:20:28.366  1195  1195 D wpa_supplicant: WPS: attr type=0x1049 len=6
05-16 16:20:28.366  1195  1195 D wpa_supplicant: WPS: WFA subelement id=0 len=1
05-16 16:20:28.366  1195  1195 D wpa_supplicant: WPS: attr type=0x1005 len=8
05-16 16:20:28.366  1195  1195 D wpa_supplicant: WPS: Received M2
05-16 16:20:28.366  1195  1195 D wpa_supplicant: WPS: Registrar Nonce - hexdump(len=16): eb 7a 21 22 32 ac 0b 52 38 84 47 57 0c 21 0c b8
05-16 16:20:28.366  1195  1195 D wpa_supplicant: WPS: UUID-R - hexdump(len=16): a3 0f e6 21 a9 47 46 36 82 06 b9 2f 83 4e 07 81
05-16 16:20:28.366  1195  1195 D wpa_supplicant: WPS: Device Password ID 4
05-16 16:20:28.366  1195  1195 D wpa_supplicant: WPS: DH Private Key - hexdump(len=192): [REMOVED]
05-16 16:20:28.366  1195  1195 D wpa_supplicant: WPS: DH peer Public Key - hexdump(len=192): 03 58 f5 1b 17 c6 8d 0a 1a 44 9e be f3 6a 5b f5 ba aa 8c 05 e4 83 d3 b3 4b 95 2b 53 f5 98 49 67 ...
05-16 16:20:28.381  1195  1195 D wpa_supplicant: WPS: DH shared key - hexdump(len=192): [REMOVED]
05-16 16:20:28.381  1195  1195 D wpa_supplicant: WPS: DHKey - hexdump(len=32): [REMOVED]
05-16 16:20:28.381  1195  1195 D wpa_supplicant: WPS: KDK - hexdump(len=32): [REMOVED]
05-16 16:20:28.381  1195  1195 D wpa_supplicant: WPS: AuthKey - hexdump(len=32): [REMOVED]
05-16 16:20:28.381  1195  1195 D wpa_supplicant: WPS: KeyWrapKey - hexdump(len=16): [REMOVED]
05-16 16:20:28.381  1195  1195 D wpa_supplicant: WPS: EMSK - hexdump(len=32): [REMOVED]
05-16 16:20:28.381  1195  1195 D wpa_supplicant: WPS: Manufacturer - hexdump(len=9): 4d 69 63 72 6f 73 6f 66 74
05-16 16:20:28.381  1195  1195 D wpa_supplicant: WPS: Model Name - hexdump(len=7): 57 69 6e 64 6f 77 73
05-16 16:20:28.381  1195  1195 D wpa_supplicant: WPS: Model Number - hexdump(len=10): 31 30 2e 30 2e 31 37 37 36 33
05-16 16:20:28.382  1195  1195 D wpa_supplicant: WPS: Serial Number - hexdump(len=1): 30
05-16 16:20:28.382  1195  1195 D wpa_supplicant: WPS: Primary Device Type: 1-0050F204-1
05-16 16:20:28.382  1195  1195 D wpa_supplicant: WPS: Device Name - hexdump(len=15): 44 45 53 4b 54 4f 50 2d 4c 48 48 48 54 52 4f
05-16 16:20:28.382  1195  1195 D wpa_supplicant: EAP-WSC: MESG -> MESG
05-16 16:20:28.382  1195  1195 D wpa_supplicant: WPS: Building Message M3
05-16 16:20:28.382  1195  1195 D wpa_supplicant: WPS: Device Password - hexdump(len=8): [REMOVED]
05-16 16:20:28.382  1195  1195 D wpa_supplicant: WPS: PSK1 - hexdump(len=16): [REMOVED]
05-16 16:20:28.382  1195  1195 D wpa_supplicant: WPS: PSK2 - hexdump(len=16): [REMOVED]
05-16 16:20:28.382  1195  1195 D wpa_supplicant: WPS:  * Version (hardcoded 0x10)
05-16 16:20:28.382  1195  1195 D wpa_supplicant: WPS:  * Message Type (7)
05-16 16:20:28.382  1195  1195 D wpa_supplicant: WPS:  * Registrar Nonce
05-16 16:20:28.382  1195  1195 D wpa_supplicant: Get randomness: len=32 entropy=985
05-16 16:20:28.383  1195  1195 D wpa_supplicant: random from os_get_random - hexdump(len=32): [REMOVED]
05-16 16:20:28.383  1195  1195 D wpa_supplicant: random_mix_pool - hexdump(len=20): [REMOVED]
05-16 16:20:28.383  1195  1195 D wpa_supplicant: random from internal pool - hexdump(len=16): [REMOVED]
05-16 16:20:28.383  1195  1195 D wpa_supplicant: random_mix_pool - hexdump(len=20): [REMOVED]
05-16 16:20:28.383  1195  1195 D wpa_supplicant: random from internal pool - hexdump(len=16): [REMOVED]
05-16 16:20:28.383  1195  1195 D wpa_supplicant: mixed random - hexdump(len=32): [REMOVED]
05-16 16:20:28.383  1195  1195 D wpa_supplicant: WPS: E-S1 - hexdump(len=16): 48 3a d4 a0 50 57 47 73 f0 9f f9 e7 b1 7d 08 62
05-16 16:20:28.383  1195  1195 D wpa_supplicant: WPS: E-S2 - hexdump(len=16): a8 8d 72 e4 d7 d9 f7 eb 0e a9 94 15 d7 10 0a 60
05-16 16:20:28.383  1195  1195 D wpa_supplicant: WPS:  * E-Hash1
05-16 16:20:28.383  1195  1195 D wpa_supplicant: WPS: E-Hash1 - hexdump(len=32): ec 73 15 aa da 10 4c 13 c8 b9 dd b9 54 3f a8 fe f9 8d 16 59 b7 98 e7 1a 14 65 7f b9 af 53 b6 48
05-16 16:20:28.383  1195  1195 D wpa_supplicant: WPS:  * E-Hash2
05-16 16:20:28.384  1195  1195 D wpa_supplicant: WPS: E-Hash2 - hexdump(len=32): fb 1d 08 40 d7 d9 1f 5b 7f a4 ad db 84 e0 cd d6 e0 72 ce 1a d0 f3 f8 bd 95 3f 57 13 e1 99 d3 2e
05-16 16:20:28.384  1195  1195 D wpa_supplicant: WPS:  * Version2 (0x20)
05-16 16:20:28.384  1195  1195 D wpa_supplicant: WPS:  * Authenticator
05-16 16:20:28.384  1195  1195 D wpa_supplicant: EAP-WSC: MESG -> MESG
05-16 16:20:28.384  1195  1195 D wpa_supplicant: EAP-WSC: Generating Response
05-16 16:20:28.384  1195  1195 D wpa_supplicant: EAP-WSC: Sending out 124 bytes (message sent completely)
05-16 16:20:28.384  1195  1195 D wpa_supplicant: EAP-WSC: MESG -> MESG
05-16 16:20:28.384  1195  1195 D wpa_supplicant: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x7f596616c0
05-16 16:20:28.384  1195  1195 D wpa_supplicant: EAP: EAP entering state SEND_RESPONSE
05-16 16:20:28.384  1195  1195 D wpa_supplicant: EAP: EAP entering state IDLE
05-16 16:20:28.384  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state RESPONSE
05-16 16:20:28.384  1195  1195 D wpa_supplicant: EAPOL: txSuppRsp
05-16 16:20:28.384  1195  1195 D wpa_supplicant: TX EAPOL: dst=b6:ae:2b:e6:ad:23
05-16 16:20:28.384  1195  1195 D wpa_supplicant: TX EAPOL - hexdump(len=142): 01 00 00 8a 02 27 00 8a fe 00 37 2a 00 00 00 01 04 00 10 4a 00 01 10 10 22 00 01 07 10 39 00 10 ...
05-16 16:20:28.384  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state RECEIVE
05-16 16:20:28.388  1195  1195 D wpa_supplicant: l2_packet_receive: src=b6:ae:2b:e6:ad:23 len=210
05-16 16:20:28.388  1195  1195 D wpa_supplicant: p2p0: RX EAPOL from b6:ae:2b:e6:ad:23
05-16 16:20:28.388  1195  1195 D wpa_supplicant: RX EAPOL - hexdump(len=210): 01 00 00 ce 01 28 00 ce fe 00 37 2a 00 00 00 01 04 00 10 4a 00 01 10 10 22 00 01 08 10 1a 00 10 ...
05-16 16:20:28.388  1195  1195 D wpa_supplicant: EAPOL: Received EAP-Packet frame
05-16 16:20:28.388  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state REQUEST
05-16 16:20:28.388  1195  1195 D wpa_supplicant: EAPOL: getSuppRsp
05-16 16:20:28.388  1195  1195 D wpa_supplicant: EAP: EAP entering state RECEIVED
05-16 16:20:28.388  1195  1195 D wpa_supplicant: EAP: Received EAP-Request id=40 method=254 vendor=14122 vendorMethod=1
05-16 16:20:28.388  1195  1195 D wpa_supplicant: EAP: EAP entering state METHOD
05-16 16:20:28.388  1195  1195 D wpa_supplicant: EAP-WSC: Received packet: Op-Code 4 Flags 0x0 Message Length 0
05-16 16:20:28.388  1195  1195 D wpa_supplicant: WPS: Processing received message (len=192 op_code=4)
05-16 16:20:28.388  1195  1195 D wpa_supplicant: WPS: Received WSC_MSG
05-16 16:20:28.388  1195  1195 D wpa_supplicant: WPS: attr type=0x104a len=1
05-16 16:20:28.388  1195  1195 D wpa_supplicant: WPS: attr type=0x1022 len=1
05-16 16:20:28.388  1195  1195 D wpa_supplicant: WPS: attr type=0x101a len=16
05-16 16:20:28.388  1195  1195 D wpa_supplicant: WPS: attr type=0x103d len=32
05-16 16:20:28.388  1195  1195 D wpa_supplicant: WPS: attr type=0x103e len=32
05-16 16:20:28.388  1195  1195 D wpa_supplicant: WPS: attr type=0x1018 len=64
05-16 16:20:28.389  1195  1195 D wpa_supplicant: WPS: attr type=0x1049 len=6
05-16 16:20:28.389  1195  1195 D wpa_supplicant: WPS: WFA subelement id=0 len=1
05-16 16:20:28.389  1195  1195 D wpa_supplicant: WPS: attr type=0x1005 len=8
05-16 16:20:28.389  1195  1195 D wpa_supplicant: WPS: Received M4
05-16 16:20:28.389  1195  1195 D wpa_supplicant: WPS: R-Hash1 - hexdump(len=32): 04 a7 56 3a ba 68 83 5b 6f e7 0f 9c 9e 70 3d 5a 2b 2b 9c 01 ce 2d 8d e8 2e dc c9 9a 61 14 f7 3f
05-16 16:20:28.389  1195  1195 D wpa_supplicant: WPS: R-Hash2 - hexdump(len=32): 51 13 3f 75 d7 ae 4e 35 9c 69 03 ba ff ef 85 92 f3 df d4 41 e7 f4 b3 ca 9b 71 2f 46 5e ff 04 d7
05-16 16:20:28.389  1195  1195 D wpa_supplicant: WPS: Encrypted Settings - hexdump(len=64): 71 62 61 6e 62 5c bd 99 3a 62 49 b8 73 ba 97 06 b4 ab 7f e2 3c e2 94 ce 70 9c e9 7d 42 ff 7e be ...
05-16 16:20:28.389  1195  1195 D wpa_supplicant: WPS: Decrypted Encrypted Settings - hexdump(len=48): [REMOVED]
05-16 16:20:28.389  1195  1195 D wpa_supplicant: WPS: Processing decrypted Encrypted Settings attribute
05-16 16:20:28.389  1195  1195 D wpa_supplicant: WPS: attr type=0x103f len=16
05-16 16:20:28.389  1195  1195 D wpa_supplicant: WPS: attr type=0x101e len=8
05-16 16:20:28.389  1195  1195 D wpa_supplicant: WPS: R-SNonce1 - hexdump(len=16): [REMOVED]
05-16 16:20:28.389  1195  1195 D wpa_supplicant: WPS: Registrar proved knowledge of the first half of the device password
05-16 16:20:28.389  1195  1195 D wpa_supplicant: EAP-WSC: MESG -> MESG
05-16 16:20:28.389  1195  1195 D wpa_supplicant: WPS: Building Message M5
05-16 16:20:28.389  1195  1195 D wpa_supplicant: WPS:  * Version (hardcoded 0x10)
05-16 16:20:28.389  1195  1195 D wpa_supplicant: WPS:  * Message Type (9)
05-16 16:20:28.389  1195  1195 D wpa_supplicant: WPS:  * Registrar Nonce
05-16 16:20:28.389  1195  1195 D wpa_supplicant: WPS:  * E-SNonce1
05-16 16:20:28.389  1195  1195 D wpa_supplicant: WPS:  * Key Wrap Authenticator
05-16 16:20:28.389  1195  1195 D wpa_supplicant: WPS:  * Encrypted Settings
05-16 16:20:28.389  1195  1195 D wpa_supplicant: Get randomness: len=16 entropy=953
05-16 16:20:28.390  1195  1195 D wpa_supplicant: random from os_get_random - hexdump(len=16): [REMOVED]
05-16 16:20:28.391  1195  1195 D wpa_supplicant: random_mix_pool - hexdump(len=20): [REMOVED]
05-16 16:20:28.391  1195  1195 D wpa_supplicant: random from internal pool - hexdump(len=16): [REMOVED]
05-16 16:20:28.391  1195  1195 D wpa_supplicant: mixed random - hexdump(len=16): [REMOVED]
05-16 16:20:28.391  1195  1195 D wpa_supplicant: WPS:  * Version2 (0x20)
05-16 16:20:28.391  1195  1195 D wpa_supplicant: WPS:  * Authenticator
05-16 16:20:28.391  1195  1195 D wpa_supplicant: EAP-WSC: MESG -> MESG
05-16 16:20:28.391  1195  1195 D wpa_supplicant: EAP-WSC: Generating Response
05-16 16:20:28.391  1195  1195 D wpa_supplicant: EAP-WSC: Sending out 120 bytes (message sent completely)
05-16 16:20:28.391  1195  1195 D wpa_supplicant: EAP-WSC: MESG -> MESG
05-16 16:20:28.391  1195  1195 D wpa_supplicant: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x7f596616c0
05-16 16:20:28.391  1195  1195 D wpa_supplicant: EAP: EAP entering state SEND_RESPONSE
05-16 16:20:28.391  1195  1195 D wpa_supplicant: EAP: EAP entering state IDLE
05-16 16:20:28.391  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state RESPONSE
05-16 16:20:28.391  1195  1195 D wpa_supplicant: EAPOL: txSuppRsp
05-16 16:20:28.391  1195  1195 D wpa_supplicant: TX EAPOL: dst=b6:ae:2b:e6:ad:23
05-16 16:20:28.391  1195  1195 D wpa_supplicant: TX EAPOL - hexdump(len=138): 01 00 00 86 02 28 00 86 fe 00 37 2a 00 00 00 01 04 00 10 4a 00 01 10 10 22 00 01 09 10 39 00 10 ...
05-16 16:20:28.391  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state RECEIVE
05-16 16:20:28.395  1195  1195 D wpa_supplicant: l2_packet_receive: src=b6:ae:2b:e6:ad:23 len=138
05-16 16:20:28.395  1195  1195 D wpa_supplicant: p2p0: RX EAPOL from b6:ae:2b:e6:ad:23
05-16 16:20:28.395  1195  1195 D wpa_supplicant: RX EAPOL - hexdump(len=138): 01 00 00 86 01 29 00 86 fe 00 37 2a 00 00 00 01 04 00 10 4a 00 01 10 10 22 00 01 0a 10 1a 00 10 ...
05-16 16:20:28.395  1195  1195 D wpa_supplicant: EAPOL: Received EAP-Packet frame
05-16 16:20:28.395  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state REQUEST
05-16 16:20:28.395  1195  1195 D wpa_supplicant: EAPOL: getSuppRsp
05-16 16:20:28.395  1195  1195 D wpa_supplicant: EAP: EAP entering state RECEIVED
05-16 16:20:28.395  1195  1195 D wpa_supplicant: EAP: Received EAP-Request id=41 method=254 vendor=14122 vendorMethod=1
05-16 16:20:28.395  1195  1195 D wpa_supplicant: EAP: EAP entering state METHOD
05-16 16:20:28.395  1195  1195 D wpa_supplicant: EAP-WSC: Received packet: Op-Code 4 Flags 0x0 Message Length 0
05-16 16:20:28.395  1195  1195 D wpa_supplicant: WPS: Processing received message (len=120 op_code=4)
05-16 16:20:28.395  1195  1195 D wpa_supplicant: WPS: Received WSC_MSG
05-16 16:20:28.395  1195  1195 D wpa_supplicant: WPS: attr type=0x104a len=1
05-16 16:20:28.395  1195  1195 D wpa_supplicant: WPS: attr type=0x1022 len=1
05-16 16:20:28.395  1195  1195 D wpa_supplicant: WPS: attr type=0x101a len=16
05-16 16:20:28.395  1195  1195 D wpa_supplicant: WPS: attr type=0x1018 len=64
05-16 16:20:28.395  1195  1195 D wpa_supplicant: WPS: attr type=0x1049 len=6
05-16 16:20:28.395  1195  1195 D wpa_supplicant: WPS: WFA subelement id=0 len=1
05-16 16:20:28.395  1195  1195 D wpa_supplicant: WPS: attr type=0x1005 len=8
05-16 16:20:28.395  1195  1195 D wpa_supplicant: WPS: Received M6
05-16 16:20:28.395  1195  1195 D wpa_supplicant: WPS: Encrypted Settings - hexdump(len=64): 30 fd c2 dd b0 91 a3 e6 53 c3 03 ba 12 2c 88 ce 9b 3e 3e f8 af 79 bf c3 9f 8a 05 b0 67 4e 97 cf ...
05-16 16:20:28.396  1195  1195 D wpa_supplicant: WPS: Decrypted Encrypted Settings - hexdump(len=48): [REMOVED]
05-16 16:20:28.396  1195  1195 D wpa_supplicant: WPS: Processing decrypted Encrypted Settings attribute
05-16 16:20:28.396  1195  1195 D wpa_supplicant: WPS: attr type=0x1040 len=16
05-16 16:20:28.396  1195  1195 D wpa_supplicant: WPS: attr type=0x101e len=8
05-16 16:20:28.396  1195  1195 D wpa_supplicant: WPS: R-SNonce2 - hexdump(len=16): [REMOVED]
05-16 16:20:28.396  1195  1195 D wpa_supplicant: WPS: Registrar proved knowledge of the second half of the device password
05-16 16:20:28.396  1195  1195 D wpa_supplicant: EAP-WSC: MESG -> MESG
05-16 16:20:28.396  1195  1195 D wpa_supplicant: WPS: Building Message M7
05-16 16:20:28.396  1195  1195 D wpa_supplicant: WPS:  * Version (hardcoded 0x10)
05-16 16:20:28.396  1195  1195 D wpa_supplicant: WPS:  * Message Type (11)
05-16 16:20:28.396  1195  1195 D wpa_supplicant: WPS:  * Registrar Nonce
05-16 16:20:28.396  1195  1195 D wpa_supplicant: WPS:  * E-SNonce2
05-16 16:20:28.396  1195  1195 D wpa_supplicant: WPS:  * Key Wrap Authenticator
05-16 16:20:28.396  1195  1195 D wpa_supplicant: WPS:  * Encrypted Settings
05-16 16:20:28.396  1195  1195 D wpa_supplicant: Get randomness: len=16 entropy=937
05-16 16:20:28.397  1195  1195 D wpa_supplicant: random from os_get_random - hexdump(len=16): [REMOVED]
05-16 16:20:28.397  1195  1195 D wpa_supplicant: random_mix_pool - hexdump(len=20): [REMOVED]
05-16 16:20:28.397  1195  1195 D wpa_supplicant: random from internal pool - hexdump(len=16): [REMOVED]
05-16 16:20:28.397  1195  1195 D wpa_supplicant: mixed random - hexdump(len=16): [REMOVED]
05-16 16:20:28.397  1195  1195 D wpa_supplicant: WPS:  * Version2 (0x20)
05-16 16:20:28.397  1195  1195 D wpa_supplicant: WPS:  * Authenticator
05-16 16:20:28.397  1195  1195 D wpa_supplicant: EAP-WSC: MESG -> MESG
05-16 16:20:28.397  1195  1195 D wpa_supplicant: EAP-WSC: Generating Response
05-16 16:20:28.397  1195  1195 D wpa_supplicant: EAP-WSC: Sending out 120 bytes (message sent completely)
05-16 16:20:28.397  1195  1195 D wpa_supplicant: EAP-WSC: MESG -> MESG
05-16 16:20:28.398  1195  1195 D wpa_supplicant: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x7f59661480
05-16 16:20:28.398  1195  1195 D wpa_supplicant: EAP: EAP entering state SEND_RESPONSE
05-16 16:20:28.398  1195  1195 D wpa_supplicant: EAP: EAP entering state IDLE
05-16 16:20:28.398  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state RESPONSE
05-16 16:20:28.398  1195  1195 D wpa_supplicant: EAPOL: txSuppRsp
05-16 16:20:28.398  1195  1195 D wpa_supplicant: TX EAPOL: dst=b6:ae:2b:e6:ad:23
05-16 16:20:28.398  1195  1195 D wpa_supplicant: TX EAPOL - hexdump(len=138): 01 00 00 86 02 29 00 86 fe 00 37 2a 00 00 00 01 04 00 10 4a 00 01 10 10 22 00 01 0b 10 39 00 10 ...
05-16 16:20:28.398  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state RECEIVE
05-16 16:20:28.403  1195  1195 D wpa_supplicant: l2_packet_receive: src=b6:ae:2b:e6:ad:23 len=257
05-16 16:20:28.403  1195  1195 D wpa_supplicant: p2p0: RX EAPOL from b6:ae:2b:e6:ad:23
05-16 16:20:28.403  1195  1195 D wpa_supplicant: RX EAPOL - hexdump(len=257): 01 00 00 fd 01 2a 00 fd fe 00 37 2a 00 00 00 01 04 00 10 4a 00 01 10 10 22 00 01 0c 10 1a 00 10 ...
05-16 16:20:28.403  1195  1195 D wpa_supplicant: EAPOL: Received EAP-Packet frame
05-16 16:20:28.403  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state REQUEST
05-16 16:20:28.403  1195  1195 D wpa_supplicant: EAPOL: getSuppRsp
05-16 16:20:28.404  1195  1195 D wpa_supplicant: EAP: EAP entering state RECEIVED
05-16 16:20:28.404  1195  1195 D wpa_supplicant: EAP: Received EAP-Request id=42 method=254 vendor=14122 vendorMethod=1
05-16 16:20:28.404  1195  1195 D wpa_supplicant: EAP: EAP entering state METHOD
05-16 16:20:28.404  1195  1195 D wpa_supplicant: EAP-WSC: Received packet: Op-Code 4 Flags 0x0 Message Length 0
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: Processing received message (len=239 op_code=4)
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: Received WSC_MSG
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: attr type=0x104a len=1
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: attr type=0x1022 len=1
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: attr type=0x101a len=16
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: attr type=0x1018 len=176
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: attr type=0x1049 len=6
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: WFA subelement id=0 len=1
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: attr type=0x1049 len=3
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: Unknown Vendor Extension (Vendor ID 311)
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: attr type=0x1005 len=8
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: Received M8
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: Encrypted Settings - hexdump(len=176): 92 bf a5 fc 0d 1c c3 66 a7 3f 38 7b 92 57 61 cf fd 29 4d 18 d0 1f 2d 2f 00 5c 0f f8 e5 40 47 06 ...
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: Decrypted Encrypted Settings - hexdump(len=160): [REMOVED]
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: Processing decrypted Encrypted Settings attribute
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: attr type=0x100e len=132
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: attr type=0x101e len=8
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: Received Credential
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: attr type=0x1026 len=1
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: attr type=0x1045 len=28
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: attr type=0x1003 len=2
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: attr type=0x100f len=2
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: attr type=0x1028 len=1
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: attr type=0x1027 len=64
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: attr type=0x1020 len=6
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: Process Credential
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: Network Index: 1
05-16 16:20:28.404  1195  1195 D wpa_supplicant: WPS: SSID - hexdump(len=28): 44 49 52 45 43 54 2d 47 63 44 45 53 4b 54 4f 50 2d 4c 48 48 48 54 52 4f 51 41 66 52
05-16 16:20:28.405  1195  1195 D wpa_supplicant: WPS: Authentication Type: 0x20
05-16 16:20:28.405  1195  1195 D wpa_supplicant: WPS: Encryption Type: 0x8
05-16 16:20:28.405  1195  1195 D wpa_supplicant: WPS: Network Key Index: 1
05-16 16:20:28.405  1195  1195 D wpa_supplicant: WPS: Network Key - hexdump(len=64): [REMOVED]
05-16 16:20:28.405  1195  1195 D wpa_supplicant: WPS: MAC Address 2e:6f:c9:0c:f9:cb
05-16 16:20:28.405  1195  1195 I wpa_supplicant: p2p0: WPS-CRED-RECEIVED 
05-16 16:20:28.406  1195  1195 D wpa_supplicant: WPS: Received Credential attribute - hexdump(len=136): [REMOVED]
05-16 16:20:28.406  1195  1195 D wpa_supplicant: WPS: SSID - hexdump(len=28): 44 49 52 45 43 54 2d 47 63 44 45 53 4b 54 4f 50 2d 4c 48 48 48 54 52 4f 51 41 66 52
05-16 16:20:28.406  1195  1195 D wpa_supplicant: WPS: Authentication Type 0x20
05-16 16:20:28.406  1195  1195 D wpa_supplicant: WPS: Encryption Type 0x8
05-16 16:20:28.406  1195  1195 D wpa_supplicant: WPS: Network Key Index 1
05-16 16:20:28.406  1195  1195 D wpa_supplicant: WPS: Network Key - hexdump(len=64): [REMOVED]
05-16 16:20:28.406  1195  1195 D wpa_supplicant: WPS: MAC Address 2e:6f:c9:0c:f9:cb
05-16 16:20:28.406  1195  1195 D wpa_supplicant: WPS: Replace WPS network block based on the received credential
05-16 16:20:28.406  1195  1195 D wpa_supplicant: WPS: The AP was not found from BSS table - use credential as-is
05-16 16:20:28.421  1195  1195 D wpa_supplicant: EAP-WSC: MESG -> MESG
05-16 16:20:28.421  1195  1195 D wpa_supplicant: WPS: Building Message WSC_Done
05-16 16:20:28.421  1195  1195 D wpa_supplicant: WPS:  * Version (hardcoded 0x10)
05-16 16:20:28.421  1195  1195 D wpa_supplicant: WPS:  * Message Type (15)
05-16 16:20:28.421  1195  1195 D wpa_supplicant: WPS:  * Enrollee Nonce
05-16 16:20:28.421  1195  1195 D wpa_supplicant: WPS:  * Registrar Nonce
05-16 16:20:28.421  1195  1195 D wpa_supplicant: WPS:  * Version2 (0x20)
05-16 16:20:28.421  1195  1195 I wpa_supplicant: p2p0: WPS-SUCCESS 
05-16 16:20:28.422  1195  1195 D wpa_supplicant: P2P: Parsing P2P IE
05-16 16:20:28.423  1195  1195 D wpa_supplicant: P2P: Attribute 2 length 2
05-16 16:20:28.423  1195  1195 D wpa_supplicant: P2P: * Device Capability 25 Group Capability eb
05-16 16:20:28.423  1195  1195 D wpa_supplicant: P2P: Attribute 13 length 36
05-16 16:20:28.423  1195  1195 D wpa_supplicant: P2P: * Device Info: addr b6:ae:2b:e6:a8:23 primary device type 1-0050F200-0 device name 'DESKTOP-LHHHTRO' config methods 0x11e8
05-16 16:20:28.423  1195  1195 D wpa_supplicant: P2P: Parsing P2P IE
05-16 16:20:28.423  1195  1195 D wpa_supplicant: P2P: Attribute 2 length 2
05-16 16:20:28.423  1195  1195 D wpa_supplicant: P2P: * Device Capability 25 Group Capability eb
05-16 16:20:28.423  1195  1195 D wpa_supplicant: P2P: Attribute 13 length 36
05-16 16:20:28.423  1195  1195 D wpa_supplicant: P2P: * Device Info: addr b6:ae:2b:e6:a8:23 primary device type 1-0050F200-0 device name 'DESKTOP-LHHHTRO' config methods 0x11e8
05-16 16:20:28.423  1195  1195 D wpa_supplicant: P2P: Checking whether group is persistent: group_capab=0xeb
05-16 16:20:28.423  1195  1195 D wpa_supplicant: P2P: GO Device Address b6:ae:2b:e6:a8:23
05-16 16:20:28.423  1195  1195 D wpa_supplicant: P2P: BSS b6:ae:2b:e6:ad:23 group_capab=0xeb go_dev_addr=b6:ae:2b:e6:a8:23
05-16 16:20:28.423  1195  1195 D wpa_supplicant: p2p0: P2P: Re-start group formation timeout (10 seconds) as client for initial connection
05-16 16:20:28.423  1195  1195 D wpa_supplicant: P2P: Group Formation completed successfully with b6:ae:2b:e6:ad:23
05-16 16:20:28.423  1195  1195 D wpa_supplicant: P2P: Clear timeout (state=PROVISIONING)
05-16 16:20:28.423  1195  1195 D wpa_supplicant: P2P: State PROVISIONING -> IDLE
05-16 16:20:28.423  1195  1195 D wpa_supplicant: p2p0: P2P: TRACE wpas_group_formation_completed
05-16 16:20:28.423  1195  1195 I wpa_supplicant: P2P-GROUP-FORMATION-SUCCESS 
05-16 16:20:28.424  1195  1195 D wpa_supplicant: P2P: Parsing P2P IE
05-16 16:20:28.424  1195  1195 D wpa_supplicant: P2P: Attribute 2 length 2
05-16 16:20:28.424  1195  1195 D wpa_supplicant: P2P: * Device Capability 25 Group Capability eb
05-16 16:20:28.424  1195  1195 D wpa_supplicant: P2P: Attribute 13 length 36
05-16 16:20:28.424  1195  1195 D wpa_supplicant: P2P: * Device Info: addr b6:ae:2b:e6:a8:23 primary device type 1-0050F200-0 device name 'DESKTOP-LHHHTRO' config methods 0x11e8
05-16 16:20:28.424  1195  1195 D wpa_supplicant: P2P: Parsing P2P IE
05-16 16:20:28.424  1195  1195 D wpa_supplicant: P2P: Attribute 2 length 2
05-16 16:20:28.424  1195  1195 D wpa_supplicant: P2P: * Device Capability 25 Group Capability eb
05-16 16:20:28.424  1195  1195 D wpa_supplicant: P2P: Attribute 13 length 36
05-16 16:20:28.424  1195  1195 D wpa_supplicant: P2P: * Device Info: addr b6:ae:2b:e6:a8:23 primary device type 1-0050F200-0 device name 'DESKTOP-LHHHTRO' config methods 0x11e8
05-16 16:20:28.424  1195  1195 D wpa_supplicant: P2P: Checking whether group is persistent: group_capab=0xeb
05-16 16:20:28.424  1195  1195 D wpa_supplicant: P2P: GO Device Address b6:ae:2b:e6:a8:23
05-16 16:20:28.425  1195  1195 D wpa_supplicant: P2P: BSS b6:ae:2b:e6:ad:23 group_capab=0xeb go_dev_addr=b6:ae:2b:e6:a8:23
05-16 16:20:28.425  1195  1195 D wpa_supplicant: P2P: Storing credentials for a persistent group (GO Dev Addr b6:ae:2b:e6:a8:23)
05-16 16:20:28.425  1195  1195 D wpa_supplicant: P2P: Create a new persistent group entry
05-16 16:20:28.429  1195  1195 D wpa_supplicant: EAP-WSC: MESG -> MESG
05-16 16:20:28.429  1195  1195 D wpa_supplicant: EAP-WSC: Generating Response
05-16 16:20:28.429  1195  1195 D wpa_supplicant: EAP-WSC: Sending out 60 bytes (message sent completely)
05-16 16:20:28.429  1195  1195 D wpa_supplicant: EAP-WSC: MESG -> FAIL
05-16 16:20:28.429  1195  1195 D wpa_supplicant: EAP: method process -> ignore=FALSE methodState=DONE decision=FAIL eapRespData=0x7f59630310
05-16 16:20:28.429  1195  1195 D wpa_supplicant: EAP: EAP entering state SEND_RESPONSE
05-16 16:20:28.429  1195  1195 D wpa_supplicant: EAP: EAP entering state IDLE
05-16 16:20:28.429  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state RESPONSE
05-16 16:20:28.429  1195  1195 D wpa_supplicant: EAPOL: txSuppRsp
05-16 16:20:28.429  1195  1195 D wpa_supplicant: TX EAPOL: dst=b6:ae:2b:e6:ad:23
05-16 16:20:28.429  1195  1195 D wpa_supplicant: TX EAPOL - hexdump(len=78): 01 00 00 4a 02 2a 00 4a fe 00 37 2a 00 00 00 01 05 00 10 4a 00 01 10 10 22 00 01 0f 10 1a 00 10 ...
05-16 16:20:28.429  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state RECEIVE
05-16 16:20:28.432  1195  1195 D wpa_supplicant: l2_packet_receive: src=b6:ae:2b:e6:ad:23 len=8
05-16 16:20:28.432  1195  1195 D wpa_supplicant: p2p0: RX EAPOL from b6:ae:2b:e6:ad:23
05-16 16:20:28.432  1195  1195 D wpa_supplicant: RX EAPOL - hexdump(len=8): 01 00 00 04 04 2a 00 04
05-16 16:20:28.432  1195  1195 D wpa_supplicant: EAPOL: Received EAP-Packet frame
05-16 16:20:28.432  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state REQUEST
05-16 16:20:28.432  1195  1195 D wpa_supplicant: EAPOL: getSuppRsp
05-16 16:20:28.432  1195  1195 D wpa_supplicant: EAP: EAP entering state RECEIVED
05-16 16:20:28.432  1195  1195 D wpa_supplicant: EAP: Received EAP-Failure
05-16 16:20:28.433  1195  1195 D wpa_supplicant: EAP: Status notification: completion (param=failure)
05-16 16:20:28.433  1195  1195 D wpa_supplicant: EAP: EAP entering state FAILURE
05-16 16:20:28.433  1195  1195 I wpa_supplicant: p2p0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
05-16 16:20:28.433  1195  1195 D wpa_supplicant: EAPOL: SUPP_PAE entering state HELD
05-16 16:20:28.433  1195  1195 D wpa_supplicant: EAPOL: Supplicant port status: Unauthorized
05-16 16:20:28.433  1195  1195 D wpa_supplicant: nl80211: Set supplicant port unauthorized for b6:ae:2b:e6:ad:23
05-16 16:20:28.433  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state RECEIVE
05-16 16:20:28.433  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state FAIL
05-16 16:20:28.433  1195  1195 D wpa_supplicant: EAPOL: SUPP_BE entering state IDLE
05-16 16:20:28.433  1195  1195 D wpa_supplicant: EAPOL authentication completed - result=FAILURE
05-16 16:20:28.433  1195  1195 D wpa_supplicant: WPS: Network configuration replaced - try to associate with the received credential (freq=5180)
05-16 16:20:28.433  1195  1195 D wpa_supplicant: p2p0: Request to deauthenticate - bssid=b6:ae:2b:e6:ad:23 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED
05-16 16:20:28.434  1195  1195 D wpa_supplicant: TDLS: Tear down peers
05-16 16:20:28.434  1195  1195 D wpa_supplicant: wpa_driver_nl80211_disconnect(reason_code=3)

_______________________________________________
Hostap mailing list
Hostap@xxxxxxxxxxxxxxxxxxx
http://lists.infradead.org/mailman/listinfo/hostap

[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]

  Powered by Linux