NetBSD-Bugs archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: port-i386/59908 - WiFi fails to associate on 11.0-RC1
The following reply was made to PR port-i386/59908; it has been noted by GNATS.
From: "requiem." <rqm%0xde501a7a.net@localhost>
To: gnats-bugs%netbsd.org@localhost
Cc:
Subject: Re: port-i386/59908 - WiFi fails to associate on 11.0-RC1
Date: Fri, 13 Feb 2026 19:31:20 +0000
After some longer troubleshooting with the help of some kind people on
IRC, the problem was narrowed down to the changed behaviour in
wpa_supplicant 2.11 regarding the SSID protection to counter
CVE-2023-52424.
The issue was that the local eero routers (!) I was trying to connect
to seem to have some wonky behaviour, sometimes returning empty
responses, which is why the logs had these lines:
RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
This then triggered wpa_supplicant 2.11's SSID protection.
Apparently this behaviour is related to running a WPA3/WPA2 mixed mode
network with eero's.
What seems to have fixed it is forcing wpa_supplicant.conf to use WPA2
only and to disable ieee80211w:
```/etc/wpa_supplicant.conf
network={
ssid=MY_NETWORK
scan_ssid=1
psk="My1337passw0rd!"
key_mgmt=WPA-PSK
proto=RSN
pairwise=CCMP
group=CCMP
ieee80211w=0
}
```
Specifying the above in the config then resetting the interface with
ifconfig, killing any existing wpa_supplicant abd dhcpcd processes the
installer may have launched, then connecting with wpa_supplicant and
starting dhcpcd manually got me a working network in the installer. The
11.0RC1 install succeeded well and WiFi worked perfectly on first boot.
So the problem was NOT NetBSD's side, but a result of changed
behaviour in wpa_supplicant(8) and the particular eccentricities of the
eero mesh access point that I will now probably replace with great
speed...
The issue can be closed.
On Fri, 13 Feb 2026 16:50:01 +0000 (UTC)
"requiem. via gnats" <gnats-admin%NetBSD.org@localhost> wrote:
> The following reply was made to PR port-i386/59908; it has been noted
> by GNATS.
>
> From: "requiem." <rqm%0xde501a7a.net@localhost>
> To: gnats-bugs%netbsd.org@localhost
> Cc:
> Subject: Re: port-i386/59908 - WiFi fails to associate on 11.0-RC1
> Date: Fri, 13 Feb 2026 16:46:57 +0000
>
> --MP_/=AqH6GaA0+Un68Q7y46V_tI
> Content-Type: text/plain; charset=US-ASCII
> Content-Transfer-Encoding: 7bit
> Content-Disposition: inline
>
> Hello,
>
> With the release of 11.0-RC1 I checked whether the dissociation loop
> still occurs, and, I am sad to report, it does.
>
> Here are some fresh logs, but in all honesty, there isn't much change
> in behaviour.
>
> For testing I swapped out the wifi card with an rtwn supported one,
> same behaviour. This makes me think there is something else going on,
> it isn't the athn0 driver that is causing the issues, but something
> else.
>
> What seems to be common is that it keeps throwing an
> IE_IN_4WAY_DIFFERS error. I don't know why this happens.
>
> I attach logs for both devices, as well as a dmesg/sysctl/pcictl
> dump.
> I'm afraid my diagnostic capabilities stop here, I would be open to
> suggestions as to what more can I do?
>
> requiem
>
>
>
>
>
> --MP_/=AqH6GaA0+Un68Q7y46V_tI
> Content-Type: text/plain
> Content-Transfer-Encoding: 7bit
> Content-Disposition: attachment; filename=dmesg_2026-02-13.txt
>
> [ 1.000000] Copyright (c) 1996, 1997, 1998, 1999, 2000, 2001,
> 2002, 2003, [ 1.000000] 2004, 2005, 2006, 2007, 2008, 2009,
> 2010, 2011, 2012, 2013, [ 1.000000] 2014, 2015, 2016, 2017,
> 2018, 2019, 2020, 2021, 2022, 2023, [ 1.000000] 2024
> [ 1.000000] The NetBSD Foundation, Inc. All rights reserved.
> [ 1.000000] Copyright (c) 1982, 1986, 1989, 1991, 1993
> [ 1.000000] The Regents of the University of California.
> All rights reserved.
> [ 1.000000] NetBSD 10.1 (GENERIC) #0: Mon Dec 16 13:08:11 UTC
> 2024 [ 1.000000]
> mkrepro%mkrepro.NetBSD.org@localhost:/usr/src/sys/arch/i386/compile/GENERIC [
> 1.000000] total memory = 1015 MB [ 1.000000] avail memory = 973
> MB [ 1.000000] timecounter: Timecounters tick every 10.000 msec
> [ 1.000000] Kernelized RAIDframe activated
> [ 1.000000] timecounter: Timecounter "i8254" frequency 1193182
> Hz quality 100 [ 1.000004] mainbus0 (root)
> [ 1.000004] ACPI: RSDP 0x00000000000F9C50 000014 (v00 ACPIAM)
> [ 1.000004] ACPI: RSDT 0x000000003F7B0000 000040 (v01 HPQOEM
> SLIC-CPC 20100430 MSFT 00000097) [ 1.000004] ACPI: FACP
> 0x000000003F7B0200 000084 (v02 HPQOEM SLIC-CPC 20100430 MSFT
> 00000097) [ 1.000004] ACPI: DSDT 0x000000003F7B0430 008042 (v01
> 361A0 361A0F16 00000F16 INTL 20060317) [ 1.000004] ACPI: FACS
> 0x000000003F7BE000 000040 [ 1.000004] ACPI: ????
> 0x00000000FFFD5600 FFFFFFFF (v255 ?????? ???????? FFFFFFFF ????
> FFFFFFFF) [ 1.000004] ACPI: APIC 0x000000003F7B0390 00005C (v01
> HPQOEM APIC1004 20100430 MSFT 00000097) [ 1.000004] ACPI: MCFG
> 0x000000003F7B03F0 00003C (v01 HPQOEM OEMMCFG 20100430 MSFT
> 00000097) [ 1.000004] ACPI: OEMB 0x000000003F7BE040 000224 (v01
> HPQOEM OEMB1004 20100430 MSFT 00000097) [ 1.000004] ACPI: ASF!
> 0x000000003F7B8480 000075 (v32 LEGEND I865PASF 00000001 INTL
> 20060317) [ 1.000004] ACPI: SSDT 0x000000003F7BEBE0 0004F0 (v01
> PmRef CpuPm 00003000 INTL 20060317) [ 1.000004] ACPI: 2 ACPI
> AML tables successfully acquired and loaded [ 1.000004] ioapic0
> at mainbus0 apid 2: pa 0xfec00000, version 0x20, 24 pins [
> 1.000004] cpu0 at mainbus0 apid 0 [ 1.000004] cpu0: Use lfence to
> serialize rdtsc [ 1.000004] cpu0: Intel(R) Atom(TM) CPU N270 @
> 1.60GHz, id 0x106c2 [ 1.000004] cpu0: node 0, package 0, core 0,
> smt 0 [ 1.000004] cpu1 at mainbus0 apid 1 [ 1.000004] cpu1:
> Intel(R) Atom(TM) CPU N270 @ 1.60GHz, id 0x106c2 [ 1.000004]
> cpu1: node 0, package 0, core 0, smt 1 [ 1.000004] acpi0 at
> mainbus0: Intel ACPICA 20221020 [ 1.000004] acpi0: X/RSDT: OemId
> <HPQOEM,SLIC-CPC,20100430>, AslId <MSFT,00000097> [ 1.000004]
> acpi0: MCFG: segment 0, bus 0-63, address 0x00000000e0000000 [
> 1.000004] ACPI: Dynamic OEM Table Load: [ 1.000004] ACPI: SSDT
> 0x00000000C2DC3084 00023C (v01 PmRef Cpu0Ist 00003000 INTL
> 20060317) [ 1.000004] ACPI: Dynamic OEM Table Load: [
> 1.000004] ACPI: SSDT 0x00000000C2DC5004 0005D0 (v01 PmRef Cpu0Cst
> 00003001 INTL 20060317) [ 1.000004] ACPI: Dynamic OEM Table Load:
> [ 1.000004] ACPI: SSDT 0x00000000C2D38B04 0000CC (v01 PmRef
> Cpu1Ist 00003000 INTL 20060317) [ 1.000004] ACPI: Dynamic OEM
> Table Load: [ 1.000004] ACPI: SSDT 0x00000000C2DBD7C4 000085 (v01
> PmRef Cpu1Cst 00003000 INTL 20060317) [ 1.000004] acpi0: SCI
> interrupting at int 9 [ 1.000004] acpi0: fixed power button
> present [ 1.000004] timecounter: Timecounter "ACPI-Fast"
> frequency 3579545 Hz quality 1000 [ 1.015079] acpiec0 at acpi0
> (EC0, PNP0C09): io 0x62,0x66 [ 1.015079] MCH (PNP0C01) at acpi0
> not configured [ 1.015079] attimer1 at acpi0 (TMR, PNP0100): io
> 0x40-0x43 irq 0 [ 1.015079] pckbc1 at acpi0 (PS2K, PNP0303) (kbd
> port): io 0x60,0x64 irq 1 [ 1.015079] pckbc2 at acpi0 (PS2M,
> SYN1E02) (aux port): irq 12 [ 1.015079] pcppi1 at acpi0 (SPKR,
> PNP0800): io 0x61 [ 1.015079] midi0 at pcppi1: PC speaker [
> 1.015079] sysbeep0 at pcppi1 [ 1.015079] COPR (PNP0C04) at acpi0
> not configured [ 1.015079] acpibat0 at acpi0 (BAT1, PNP0C0A-1):
> ACPI Battery [ 1.015079] acpiacad0 at acpi0 (AC0, ACPI0003): ACPI
> AC Adapter [ 1.015079] acpivga0 at acpi0 (IGD): ACPI Display
> Adapter [ 1.015079] acpiout0 at acpivga0 (LCD, 0x0110): ACPI
> Display Output Device [ 1.015079] acpiout1 at acpivga0 (CRT,
> 0x0100): ACPI Display Output Device [ 1.015079] acpivga0:
> connected output devices: [ 1.015079] acpivga0: 0x0110
> (acpiout0): LCD Panel, head 0, bios detect [ 1.015079] acpivga0:
> 0x0100 (acpiout1): Ext. Monitor, head 0, bios detect [ 1.015079]
> acpilid0 at acpi0 (LID, PNP0C0D): ACPI Lid Switch [ 1.015079]
> acpibut0 at acpi0 (SLPB, PNP0C0E): ACPI Sleep Button [ 1.015079]
> RMEM (PNP0C01) at acpi0 not configured [ 1.015079] acpiwmi0 at
> acpi0 (WMID, PNP0C14-0): ACPI WMI Interface [ 1.015079] wmihp0 at
> acpiwmi0: HP WMI mappings [ 1.015079] acpibut1 at acpi0 (PWRB,
> PNP0C0C-170): ACPI Power Button [ 1.015079] acpitz0 at acpi0
> (THRM): cpu0 cpu1 [ 1.015079] acpitz0: levels: critical 93.0 C,
> passive 85.0 C, passive cooling [ 1.015079] apm0 at acpi0: Power
> Management spec V1.2 [ 1.015079] ACPI: Enabled 1 GPEs in block 00
> to 1F [ 1.015079] pckbd0 at pckbc1 (kbd slot) [ 1.015079]
> pckbc1: using irq 1 for kbd slot [ 1.015079] wskbd0 at pckbd0:
> console keyboard [ 1.015079] pms0 at pckbc1 (aux slot) [
> 1.015079] pms0: Synaptics touchpad version 7.2 [ 1.015079] pms0:
> Palm detect, Reports max [ 1.015079] pms0: Probed max coordinates
> right: 5856, top: 4890 [ 1.015079] pckbc1: using irq 12 for aux
> slot [ 1.015079] wsmouse0 at pms0 mux 0 [ 1.015079] attimer1:
> attached to pcppi1 [ 1.015079] pci0 at mainbus0 bus 0:
> configuration mode 1 [ 1.015079] pci0: i/o space, memory space
> enabled, rd/line, rd/mult, wr/inv ok [ 1.015079] pchb0 at pci0
> dev 0 function 0: Intel 82945GME Host Bridge (rev. 0x03) [
> 1.015079] agp0 at pchb0: i915-family chipset [ 1.015079] agp0:
> detected 7932k stolen memory [ 1.015079] agp0: aperture at
> 0xd0000000, size 0x10000000 [ 1.015079] i915drmkms0 at pci0 dev 2
> function 0: Intel 82945GME Integrated Graphics Device (rev. 0x03) [
> 1.015079] Intel 82945GM/PM/GMS Integrated Graphics Device
> (miscellaneous display, revision 0x03) at pci0 dev 2 function 1 not
> configured [ 1.015079] hdaudio0 at pci0 dev 27 function 0: HD
> Audio Controller [ 1.015079] hdaudio0: interrupting at msi0 vec 0
> [ 1.015079] hdaudio0: HDA ver. 1.0, OSS 4, ISS 4, BSS 0, SDO 1,
> 64-bit [ 1.015079] hdafg0 at hdaudio0: Sigmatel 92HD75B2X5 [
> 1.015079] hdafg0: DAC00 2ch: Speaker [Built-In], HP Out [Jack] [
> 1.015079] hdafg0: ADC01 2ch: Mic In [Jack] [Built-In] [ 1.015079]
> hdafg0: 2ch/2ch 44100Hz 48000Hz 88200Hz 96000Hz 192000Hz PCM16 PCM20
> PCM24 AC3 [ 1.015079] audio0 at hdafg0: playback, capture, full
> duplex, independent [ 1.015079] audio0: slinear_le:16 2ch
> 48000Hz, blk 1920 bytes (10ms) for playback [ 1.015079] audio0:
> slinear_le:16 2ch 48000Hz, blk 1920 bytes (10ms) for recording [
> 1.015079] ppb0 at pci0 dev 28 function 0: Intel 82801GB/GR PCI
> Express Port #1 (rev. 0x02) [ 1.015079] ppb0: PCI Express
> capability version 1 <Root Port of PCI-E Root Complex> x1 @ 2.5GT/s [
> 1.015079] pci1 at ppb0 bus 1 [ 1.015079] pci1: i/o space,
> memory space enabled, rd/line, wr/inv ok [ 1.015079] athn0 at
> pci1 dev 0 function 0: Atheros AR9280 [ 1.015079] athn0: rev 2
> (2T2R), ROM rev 22, address 74:e5:43:19:a9:b1 [ 1.015079] athn0:
> interrupting at ioapic0 pin 16 [ 1.015079] ppb1 at pci0 dev 28
> function 1: Intel 82801GB/GR PCI Express Port #2 (rev. 0x02) [
> 1.015079] ppb1: PCI Express capability version 1 <Root Port of PCI-E
> Root Complex> x1 @ 2.5GT/s [ 1.015079] pci2 at ppb1 bus 2 [
> 1.015079] pci2: i/o space, memory space enabled, rd/line, wr/inv ok [
> 1.015079] mskc0 at pci2 dev 0 function 0, Yukon-2 FE+ rev. A0
> (0x0) [ 1.015079] mskc0: interrupting at msi1 vec 0 [
> 1.015079] msk0 at mskc0 port A: Ethernet address 00:24:81:3b:4e:5b [
> 1.015079] makphy0 at msk0 phy 0: Marvell 88E3016 10/100 Fast
> Ethernet PHY, rev. 0 [ 1.015079] makphy0: 10baseT, 10baseT-FDX,
> 100baseTX, 100baseTX-FDX, auto [ 1.015079] uhci0 at pci0 dev 29
> function 0: Intel 82801GB/GR USB UHCI Controller (rev. 0x02) [
> 1.015079] uhci0: interrupting at ioapic0 pin 23 [ 1.015079] usb0
> at uhci0: USB revision 1.0 [ 1.015079] uhci1 at pci0 dev 29
> function 1: Intel 82801GB/GR USB UHCI Controller (rev. 0x02) [
> 1.015079] uhci1: interrupting at ioapic0 pin 19 [ 1.015079] usb1
> at uhci1: USB revision 1.0 [ 1.015079] uhci2 at pci0 dev 29
> function 2: Intel 82801GB/GR USB UHCI Controller (rev. 0x02) [
> 1.015079] uhci2: interrupting at ioapic0 pin 18 [ 1.015079] usb2
> at uhci2: USB revision 1.0 [ 1.015079] uhci3 at pci0 dev 29
> function 3: Intel 82801GB/GR USB UHCI Controller (rev. 0x02) [
> 1.015079] uhci3: interrupting at ioapic0 pin 16 [ 1.015079] usb3
> at uhci3: USB revision 1.0 [ 1.015079] ehci0 at pci0 dev 29
> function 7: Intel 82801GB/GR USB EHCI Controller (rev. 0x02) [
> 1.015079] ehci0: 64-bit DMA - limited [ 1.015079] ehci0:
> interrupting at ioapic0 pin 23 [ 1.015079] ehci0: EHCI version
> 1.0 [ 1.015079] ehci0: 4 companion controllers, 2 ports each:
> uhci0 uhci1 uhci2 uhci3 [ 1.015079] ehci0: Using DMA subregion
> for control data structures [ 1.015079] usb4 at ehci0: USB
> revision 2.0 [ 1.015079] ppb2 at pci0 dev 30 function 0: Intel
> 82801BAM Hub-PCI Bridge (rev. 0xe2) [ 1.015079] pci3 at ppb2 bus
> 3 [ 1.015079] pci3: i/o space, memory space enabled [
> 1.015079] ichlpcib0 at pci0 dev 31 function 0: Intel 82801GBM LPC
> Interface Bridge (rev. 0x02) [ 1.015079] timecounter: Timecounter
> "ichlpcib0" frequency 3579545 Hz quality 1000 [ 1.015079]
> ichlpcib0: 24-bit timer [ 1.015079] tco0 at ichlpcib0: TCO
> (watchdog) timer configured. [ 1.015079] tco0: Min/Max interval
> 1/367 seconds [ 1.015079] piixide0 at pci0 dev 31 function 1:
> Intel 82801GB/GR IDE Controller (ICH7) (rev. 0x02) [ 1.015079]
> piixide0: bus-master DMA support present [ 1.015079] piixide0:
> primary channel configured to compatibility mode [ 1.015079]
> piixide0: primary channel interrupting at ioapic0 pin 14 [
> 1.015079] atabus0 at piixide0 channel 0 [ 1.015079] piixide0:
> secondary channel configured to compatibility mode [ 1.015079]
> piixide0: secondary channel ignored (disabled) [ 1.015079]
> ichsmb0 at pci0 dev 31 function 3: Intel 82801GB/GR SMBus Controller
> (rev. 0x02) [ 1.015079] ichsmb0: interrupting at ioapic0 pin 19 [
> 1.015079] iic0 at ichsmb0: I2C bus [ 1.015079] isa0 at
> ichlpcib0 [ 1.015079] acpicpu0 at cpu0: ACPI CPU [ 1.015079]
> acpicpu0: C1: FFH, lat 1 us, pow 1000 mW [ 1.015079] acpicpu0:
> C2: FFH, lat 1 us, pow 500 mW [ 1.015079] acpicpu0: C3: FFH,
> lat 57 us, pow 100 mW, bus master check [ 1.015079] acpicpu0:
> P0: FFH, lat 10 us, pow 25000 mW, 1600 MHz [ 1.015079] acpicpu0:
> P1: FFH, lat 10 us, pow 18000 mW, 1333 MHz [ 1.015079] acpicpu0:
> P2: FFH, lat 10 us, pow 11000 mW, 1067 MHz [ 1.015079] acpicpu0:
> P3: FFH, lat 10 us, pow 5000 mW, 800 MHz [ 1.015079] coretemp0
> at cpu0: thermal sensor, 1 C resolution, Tjmax=90 [ 1.015079]
> acpicpu1 at cpu1: ACPI CPU [ 1.015079] timecounter: Timecounter
> "clockinterrupt" frequency 100 Hz quality 0 [ 1.015079] wmihp0:
> autoconfiguration error: failed to get data for event 0x80:
> AE_BAD_DATA [ 2.002196] IPsec: Initialized Security Association
> Processing. [ 2.002196] acpibat0: Hewlett-Packard LION
> rechargeable battery [ 2.002196] acpibat0: granularity: low->warn
> 0.000 Ah, warn->full 0.100 Ah [ 2.012362] uhub0 at usb0: NetBSD
> (0x0000) UHCI root hub (0x0000), class 9/0, rev 1.00/1.00, addr 1 [
> 2.012362] uhub0: 2 ports with 2 removable, self powered [
> 2.012362] uhub1 at usb1: NetBSD (0x0000) UHCI root hub (0x0000),
> class 9/0, rev 1.00/1.00, addr 1 [ 2.012362] uhub1: 2 ports with
> 2 removable, self powered [ 2.012362] uhub2 at usb2: NetBSD
> (0x0000) UHCI root hub (0x0000), class 9/0, rev 1.00/1.00, addr 1 [
> 2.012362] uhub2: 2 ports with 2 removable, self powered [
> 2.012362] uhub3 at usb3: NetBSD (0x0000) UHCI root hub (0x0000),
> class 9/0, rev 1.00/1.00, addr 1 [ 2.012362] uhub3: 2 ports with
> 2 removable, self powered [ 2.012362] uhub4 at usb4: NetBSD
> (0x0000) EHCI root hub (0x0000), class 9/0, rev 2.00/1.00, addr 1 [
> 2.012362] uhub4: 8 ports with 8 removable, self powered [
> 2.012362] acpiacad0: AC adapter online. [ 2.462753] wmihp0:
> autoconfiguration error: failed to get data for event 0x80:
> AE_BAD_DATA [ 3.763896] uvideo0 at uhub4 port 4 configuration 1
> interface 0: importek (0x10f1) Webcam-101 (0x1a08), rev 2.00/15.12,
> addr 2 [ 3.763896] video0 at uvideo0: importek (0x10f1)
> Webcam-101 (0x1a08), rev 2.00/15.12, addr 2 [ 4.064160] ubt0 at
> uhub1 port 1 [ 4.064160] ubt0: Broadcom Corp (0x13d3) Bluetooth
> 2.1 module (0x3249), rev 2.00/6.07, addr 2 [ 5.085057] wd0 at
> atabus0 drive 0 [ 5.085057] wd0: <SAMSUNG SSD SM841 mSATA 256GB>
> [ 5.085057] wd0: drive supports 16-sector PIO transfers, LBA48
> addressing [ 5.085057] wd0: 238 GB, 496149 cyl, 16 head, 63 sec,
> 512 bytes/sect x 500118192 sectors [ 5.095067] wd0: 32-bit data
> port [ 5.095067] wd0: drive supports PIO mode 4, DMA mode 2,
> Ultra-DMA mode 6 (Ultra/133), WRITE DMA FUA [ 5.095067]
> wd0(piixide0:0:0): using PIO mode 4, Ultra-DMA mode 5 (Ultra/100)
> (using DMA), WRITE DMA FUA EXT [ 5.095067] swwdog0: software
> watchdog initialized [ 5.095067] WARNING: 2 errors while
> detecting hardware; check system log. [ 5.095067] boot device:
> wd0 [ 5.095067] root on wd0a dumps on wd0b [ 5.105191] root
> file system type: ffs [ 5.105191]
> kern.module.path=/stand/i386/10.1/modules [ 5.115121] [drm]
> Supports vblank timestamp caching Rev 2 (21.10.2013). [ 5.115121]
> [drm] Driver supports precise vblank timestamp query. [ 5.115121]
> [drm] Failed to find VBIOS tables (VBT) [ 5.115121] i915drmkms0:
> interrupting at ioapic0 pin 16 (i915drmkms0) [ 5.115121] WARNING:
> NVRAM century is 19 but RTC year is 2026 [ 5.135105] [drm]
> Initialized overlay support. [ 5.135105] [drm] Initialized i915
> 1.6.0 20200114 for i915drmkms0 on minor 0 [ 5.235210] intelfb0 at
> i915drmkms0 [ 5.235210] [drm] DRM_I915_DEBUG enabled [
> 5.235210] [drm] DRM_I915_DEBUG_GEM enabled [ 5.235210] intelfb0:
> framebuffer at 0xd0009000, size 1024x600, depth 32, stride 4096 [
> 6.025886] wsdisplay0 at intelfb0 kbdmux 1: console (default, vt100
> emulation), using wskbd0 [ 6.037294] wsmux1: connecting to
> wsdisplay0 [ 32.589234] acpibat0: normal capacity on 'charge
> state' [ 43.028417] wsdisplay0: screen 1 added (default, vt100
> emulation) [ 43.028417] wsdisplay0: screen 2 added (default, vt100
> emulation) [ 43.028417] wsdisplay0: screen 3 added (default, vt100
> emulation) [ 43.028417] wsdisplay0: screen 4 added (default, vt100
> emulation) [ 153.864808] umass0 at uhub4 port 2 configuration 1
> interface 0 [ 153.864808] umass0: SanDisk (0x0781) Cruzer Blade
> (0x5567), rev 2.00/1.00, addr 3 [ 153.864808] umass0: using SCSI
> over Bulk-Only [ 153.864808] scsibus0 at umass0: 2 targets, 1 lun
> per target [ 153.864808] sd0 at scsibus0 target 0 lun 0: <SanDisk,
> Cruzer Blade, 1.00> disk removable [ 153.874865] sd0: 29358 MB,
> 59648 cyl, 16 head, 63 sec, 512 bytes/sect x 60125184 sectors
> kern.ostype = NetBSD kern.osrelease = 10.1 kern.osrevision =
> 1001000000 kern.version = NetBSD 10.1 (GENERIC) #0: Mon Dec 16
> 13:08:11 UTC 2024
> mkrepro%mkrepro.NetBSD.org@localhost:/usr/src/sys/arch/i386/compile/GENERIC
> kern.maxvnodes = 51982 kern.maxproc = 1044 kern.maxfiles = 3404
> kern.argmax = 262144 kern.securelevel = -1 kern.hostname =
> tynie.0xde501a7a.xyz kern.hostid = 0 kern.clockrate: tick = 10000,
> tickadj = 40, hz = 100, profhz = 100, stathz = 100 kern.posix1version
> = 200112 kern.ngroups = 16 kern.job_control = 1 kern.saved_ids = 0
> kern.domainname =
> kern.maxpartitions = 16
> kern.rawpartition = 3
> kern.rtc_offset = 0
> kern.root_device = wd0
> kern.msgbufsize = 65520
> kern.fsync = 1
> kern.synchronized_io = 1
> kern.iov_max = 1024
> kern.mbuf.msize = 256
> kern.mbuf.mclbytes = 2048
> kern.mbuf.nmbclusters = 32489
> kern.mbuf.mblowat = 16
> kern.mbuf.mcllowat = 8
> kern.mbuf.nmbclusters_limit = 32768
> kern.mapped_files = 1
> kern.memlock = 1
> kern.memlock_range = 1
> kern.memory_protection = 1
> kern.login_name_max = 17
> kern.defcorename = %n.core
> kern.logsigexit = 0
> kern.fscale = 2048
> kern.ccpu = 1948
> kern.cp_time: user = 968, nice = 338, sys = 900, intr = 92, idle =
> 44710 kern.consdev = ttyE0
> kern.maxptys = 992
> kern.pipe.maxbigpipes = 32
> kern.pipe.nbigpipes = 0
> kern.pipe.kvasize = 344064
> kern.maxphys = 65536
> kern.sbmax = 262144
> kern.tkstat.nin = 1180
> kern.tkstat.nout = 17901
> kern.tkstat.cancc = 15
> kern.tkstat.rawcc = 1165
> kern.monotonic_clock = 200112
> kern.urandom = -1650222921
> kern.labelsector = 1
> kern.labeloffset = 0
> kern.forkfsleep = 0
> kern.posix_threads = 200112
> kern.posix_semaphores = 200112
> kern.posix_barriers = 200112
> kern.posix_timers = 200112
> kern.posix_spin_locks = 200112
> kern.posix_reader_writer_locks = 200112
> kern.dump_on_panic = 1
> kern.somaxkva = 16777216
> kern.root_partition = 0
> kern.drivers = [160 -1 crypto], [161 -1 pf], [163 163 fss], [164 -1
> pps], [165 -1 ptm], [166 -1 atabus], [167 -1 drvctl], [168 168 dk],
> [169 -1 tap], [170 -1 veriexec], [171 -1 fw], [172 -1 ucycom], [173
> -1 gpio], [174 -1 utoppy], [175 -1 bthub], [176 -1 amr], [177 -1
> lockstat], [178 -1 putter], [179 -1 srt], [180 -1 drm], [181 -1 bio],
> [182 182 altmem], [187 -1 twa], [188 -1 cpuctl], [189 -1 pad], [190
> 190 zfs], [191 -1 tprof], [192 -1 isv], [193 -1 video], [194 169 dm],
> [195 -1 hdaudio], [196 -1 uhso], [197 197 rumpblk], [198 -1 npf],
> [199 199 flash], [200 -1 dtv], [201 -1 iic], [203 -1 iscsi], [204 -1
> tpm], [205 -1 mfi], [206 -1 seeprom], [207 -1 dtrace], [208 208
> spiflash], [209 -1 lua], [240 -1 spkr], [340 -1 hdmicec], [341 -1
> nvme], [342 -1 qemufwcfg], [343 -1 autofs], [344 -1 gpiopps], [345 -1
> nvmm], [346 -1 kcov], [347 -1 spi], [354 -1 ipmi], [355 -1 vhci],
> [356 -1 vio9p], [357 -1 fault], [358 -1 wwanc], [359 -1 acpi], [360
> -1 smbios], [361 -1 efi], [362 -1 sht3xtemp], [363 - 1 scmd], [364 -1
> viocon], [365 -1 gpioirq], [0 -1 cons], [1 -1 ctty], [2 -1 mem], [3 0
> wd], [4 1 swap], [5 -1 pts], [6 -1 ptc], [7 -1 log], [8 -1 com], [9 2
> fd], [10 3 wt], [12 -1 pc], [13 4 sd], [14 5 st], [15 6 cd], [16 -1
> lpt], [17 -1 ch], [18 16 ccd], [19 -1 ss], [20 -1 uk], [21 -1 apm],
> [22 -1 filedesc], [23 -1 bpf], [24 17 md], [26 -1 joy], [38 -1 cy],
> [39 7 mcd], [40 -1 tun], [41 14 vnd], [42 -1 audio], [44 -1 ipl], [46
> -1 rnd], [47 -1 wsdisplay], [48 -1 wskbd], [49 -1 wsmouse], [55 -1
> usb], [56 -1 uhid], [57 -1 ulpt], [58 -1 midi], [59 -1 sequencer],
> [60 -1 vcoda], [61 -1 scsibus], [62 18 raid], [63 -1 esh], [64 -1
> ugen], [65 -1 wsmux], [66 -1 ucom], [67 -1 sysmon], [69 19 ld], [71
> -1 bktr], [73 -1 cz], [74 -1 ses], [76 -1 iop], [77 -1 altq], [78 -1
> mlx], [79 20 ed], [80 -1 mly], [81 -1 wsfont], [82 -1 agp], [83 -1
> pci], [84 -1 dpti], [85 -1 irframe], [86 -1 cir], [87 -1 radio], [88
> -1 cmos], [89 -1 clockctl], [91 -1 kttcp], [92 -1 dmoverio], [93 21
> cgd], [96 -1 dpt], [97 - 1 twe], [99 -1 vmmon], [100 -1 vmnet], [101
> -1 ksyms], [102 -1 icp], [103 -1 gpib], [104 -1 ppi], [105 22 rd],
> [106 23 ct], [107 24 mt], [109 -1 vboxguest], [141 -1 xenevt], [142
> 142 xbd], [143 -1 xencons] kern.cp_id: 0 = 0, 1 = 1
> kern.hardclock_ticks = 23499 kern.arandom = -675471238
> kern.ipc.sysvmsg = 1 kern.ipc.sysvsem = 1 kern.ipc.sysvshm = 1
> kern.ipc.shmmax = 266153984 kern.ipc.shmmni = 128 kern.ipc.shmseg =
> 128 kern.ipc.shmmaxpgs = 64979 kern.ipc.shm_use_phys = 0
> kern.ipc.msgmni = 40 kern.ipc.msgseg = 2048 kern.ipc.semmni = 10
> kern.ipc.semmns = 60 kern.ipc.semmnu = 30 kern.boottime = Fri Feb 13
> 16:28:13 2026 kern.sofixedbuf = 1 kern.veriexec.verbose = 0
> kern.veriexec.strict = 0 kern.veriexec.algorithms = SHA256 SHA384
> SHA512 kern.crypto.aes.selected = Intel SSSE3 vpaes
> kern.crypto.chacha.selected = x86 SSE2 ChaCha kern.boothowto = 0
> kern.labelusesmbr = 1 kern.coredump.setid.dump = 0
> kern.coredump.setid.path = /var/crash/%n.core
> kern.coredump.setid.owner = 0 kern.coredump.setid.group = 0
> kern.coredump.setid.mode = 0600 (rw------- ) kern.no_sa_support = 1
> kern.configname = GENERIC kern.buildinfo = kern.messages = 2
> kern.pmf.debug.event = 0 kern.pmf.debug.suspend = 0
> kern.pmf.debug.suspensor = 0 kern.pmf.debug.idle = 0
> kern.pmf.debug.transition = 0 kern.sched.cacheht_time = 10
> kern.sched.skim_interval = 10 kern.sched.min_catch = 1
> kern.sched.timesoftints = 0 kern.sched.kpreempt_pri = 128
> kern.sched.name = 4.4BSD kern.sched.rtts = 100 kern.sched.pri_min = 0
> kern.sched.pri_max = 63 kern.timecounter.choice = TSC(q=-100,
> f=1597400400 Hz) clockinterrupt(q=0, f=100 Hz) lapic(q=-100,
> f=133117000 Hz) ichlpcib0(q=1000, f=3579545 Hz) ACPI-Fast(q=1000,
> f=3579545 Hz) i8254(q=100, f=1193182 Hz) dummy(q=-1000000, f=1000000
> Hz) kern.timecounter.hardware = ACPI-Fast
> kern.timecounter.timestepwarnings = 0 kern.threadpool.idle_ms = 30000
> kern.posix_aio = 200112 kern.aio_listio_max = 512 kern.aio_max = 8192
> kern.posix_msg = 200112 kern.mqueue.mq_open_max = 512
> kern.mqueue.mq_prio_max = 32
> kern.mqueue.mq_max_msgsize = 16384
> kern.mqueue.mq_def_maxmsg = 32
> kern.mqueue.mq_max_maxmsg = 512
> kern.pset.psets_max = 32
> kern.pset.list = 0:1
> kern.direct_select = 0
> kern.module.autoload = 1
> kern.module.autounload_unsafe = 0
> kern.module.verbose = 0
> kern.module.path = /stand/i386/10.1/modules
> kern.module.autotime = 10
> kern.sooptions = 0
> kern.entropy.collection = 1
> kern.entropy.depletion = 0
> kern.entropy.consolidate = 0
> kern.entropy.gather = 0
> kern.entropy.epoch = 4
> kern.maxlwp = 4096
> kern.uidinfo.proccnt = 12
> kern.uidinfo.lwpcnt = 14
> kern.uidinfo.lockcnt = 0
> kern.uidinfo.semcnt = 2
> kern.uidinfo.sbsize = 979072
> kern.posix_sched = 200112
> kern.detachall = 0
> kern.tty.qsize = 1024
> kern.bufq.strategies = priocscan fcfs disksort
> kern.expose_address = 1
> kern.posix.semmax = 128
> kern.posix.semcnt = 0
> kern.usercrypto = 1
> kern.userasymcrypto = 1
> kern.cryptodevallowsoft = 1
> vm.loadavg: 0.17 0.10 0.04
> vm.maxslp = 20
> vm.uspace = 8192
> vm.minaddress = 0
> vm.maxaddress = -1074794496
> vm.guard_size = 1048576
> vm.thread_guard_size = 65536
> vm.user_va0_disable = 1
> vm.anonmin = 10
> vm.filemin = 10
> vm.execmin = 5
> vm.anonmax = 80
> vm.filemax = 50
> vm.execmax = 30
> vm.inactivepct = 33
> vm.swap_encrypt = 1
> vm.bufcache = 15
> vm.bufmem = 12599296
> vm.bufmem_lowater = 19961344
> vm.bufmem_hiwater = 159690752
> vfs.generic.maxtypenum = 10
> vfs.generic.usermount = 0
> vfs.generic.magiclinks = 0
> vfs.generic.timestamp_precision = 3
> vfs.generic.fstypes = mfs lfs ffs ext2fs nfs umap procfs overlay
> null kernfs fdesc union tmpfs puffs ptyfs ntfs msdos efs cd9660 coda
> vfs.generic.dirhash.memused = 0 vfs.generic.dirhash.maxmem = 1048576
> vfs.ffs.log_changeopt = 0
> vfs.ffs.extattr_autocreate = 1024
> vfs.nfs.iothreads = -1
> vfs.lfs.flushindir = 1
> vfs.lfs.clean_vnhead = 0
> vfs.lfs.dostats = 1
> vfs.lfs.pagetrip = 0
> vfs.lfs.stats.segsused = 0
> vfs.lfs.stats.psegwrites = 0
> vfs.lfs.stats.psyncwrites = 0
> vfs.lfs.stats.pcleanwrites = 0
> vfs.lfs.stats.blocktot = 0
> vfs.lfs.stats.cleanblocks = 0
> vfs.lfs.stats.ncheckpoints = 0
> vfs.lfs.stats.nwrites = 0
> vfs.lfs.stats.nsync_writes = 0
> vfs.lfs.stats.wait_exceeded = 0
> vfs.lfs.stats.write_exceeded = 0
> vfs.lfs.stats.flush_invoked = 0
> vfs.lfs.stats.vflush_invoked = 0
> vfs.lfs.stats.clean_inlocked = 0
> vfs.lfs.stats.clean_vnlocked = 0
> vfs.lfs.stats.segs_reclaimed = 0
> vfs.lfs.ignore_lazy_sync = 1
> vfs.cd9660.utf8_joliet = 1
> vfs.ufs.dirhash.minblocks = 5
> vfs.ufs.dirhash.maxmem = 16634816
> vfs.ufs.dirhash.memused = 402196
> vfs.ufs.dirhash.docheck = 0
> vfs.wapbl.flush_disk_cache = 1
> vfs.wapbl.verbose_commit = 0
> vfs.wapbl.allow_dpofua = 0
> vfs.wapbl.journal_iobufs = 4
> vfs.sync.delay = 30
> vfs.sync.filedelay = 30
> vfs.sync.dirdelay = 15
> vfs.sync.metadelay = 10
> vfs.ulfs.dirhash.minblocks = 5
> vfs.ulfs.dirhash.maxmem = 16634816
> vfs.ulfs.dirhash.memused = 0
> vfs.ulfs.dirhash.docheck = 0
> net.local.stream.sendspace = 8192
> net.local.stream.recvspace = 8192
> net.local.dgram.sendspace = 2048
> net.local.dgram.recvspace = 16384
> net.local.inflight = 0
> net.local.deferred = 0
> net.inet.ip.forwarding = 0
> net.inet.ip.redirect = 1
> net.inet.ip.ttl = 64
> net.inet.ip.forwsrcrt = 0
> net.inet.ip.directed-broadcast = 0
> net.inet.ip.allowsrcrt = 0
> net.inet.ip.subnetsarelocal = 1
> net.inet.ip.mtudisc = 1
> net.inet.ip.anonportmin = 49152
> net.inet.ip.anonportmax = 65535
> net.inet.ip.mtudisctimeout = 600
> net.inet.ip.hostzerobroadcast = 0
> net.inet.ip.gifttl = 30
> net.inet.ip.lowportmin = 600
> net.inet.ip.lowportmax = 1023
> net.inet.ip.maxfragpackets = 200
> net.inet.ip.grettl = 30
> net.inet.ip.checkinterface = 0
> net.inet.ip.ifq.len = 0
> net.inet.ip.ifq.maxlen = 256
> net.inet.ip.ifq.drops = 0
> net.inet.ip.random_id = 1
> net.inet.ip.do_loopback_cksum = 0
> net.inet.ip.dad_count = 3
> net.inet.ip.anonportalgo.available = bsd random_start random_pick
> hash doublehash randinc net.inet.ip.anonportalgo.selected = bsd
> net.inet.ip.anonportalgo.reserve =
> net.inet.icmp.maskrepl = 0
> net.inet.icmp.returndatabytes = 8
> net.inet.icmp.errppslimit = 100
> net.inet.icmp.rediraccept = 1
> net.inet.icmp.redirtimeout = 600
> net.inet.icmp.bmcastecho = 0
> net.inet.icmp.dynamic_rt_msg = 0
> net.inet.tcp.rfc1323 = 1
> net.inet.tcp.sendspace = 32768
> net.inet.tcp.recvspace = 32768
> net.inet.tcp.mssdflt = 536
> net.inet.tcp.syn_cache_limit = 10255
> net.inet.tcp.syn_bucket_limit = 105
> net.inet.tcp.init_win = 4
> net.inet.tcp.mss_ifmtu = 0
> net.inet.tcp.sack.enable = 1
> net.inet.tcp.sack.maxholes = 32
> net.inet.tcp.sack.globalmaxholes = 1024
> net.inet.tcp.sack.globalholes = 0
> net.inet.tcp.win_scale = 1
> net.inet.tcp.timestamps = 1
> net.inet.tcp.cwm = 0
> net.inet.tcp.cwm_burstsize = 4
> net.inet.tcp.ack_on_push = 0
> net.inet.tcp.keepidle = 14400
> net.inet.tcp.keepintvl = 150
> net.inet.tcp.keepcnt = 8
> net.inet.tcp.slowhz = 2
> net.inet.tcp.log_refused = 0
> net.inet.tcp.rstppslimit = 100
> net.inet.tcp.delack_ticks = 20
> net.inet.tcp.init_win_local = 4
> net.inet.tcp.do_loopback_cksum = 0
> net.inet.tcp.msl = 30
> net.inet.tcp.minmss = 216
> net.inet.tcp.congctl.available = reno newreno cubic
> net.inet.tcp.congctl.selected = newreno
> net.inet.tcp.keepinit = 150
> net.inet.tcp.recvbuf_auto = 1
> net.inet.tcp.recvbuf_inc = 16384
> net.inet.tcp.recvbuf_max = 262144
> net.inet.tcp.sendbuf_auto = 1
> net.inet.tcp.sendbuf_inc = 8192
> net.inet.tcp.sendbuf_max = 262144
> net.inet.tcp.ecn.enable = 0
> net.inet.tcp.ecn.maxretries = 1
> net.inet.tcp.local_by_rtt = 0
> net.inet.tcp.iss_hash = 0
> net.inet.tcp.abc.enable = 1
> net.inet.tcp.abc.aggressive = 1
> net.inet.tcp.mslt.enable = 1
> net.inet.tcp.mslt.loopback = 2
> net.inet.tcp.mslt.local = 10
> net.inet.tcp.mslt.remote = 60
> net.inet.tcp.mslt.remote_threshold = 6
> net.inet.tcp.vtw.enable = 0
> net.inet.tcp.vtw.entries = 16
> net.inet.udp.checksum = 1
> net.inet.udp.sendspace = 9216
> net.inet.udp.recvspace = 41600
> net.inet.udp.do_loopback_cksum = 0
> net.inet.carp.preempt = 0
> net.inet.carp.arpbalance = 0
> net.inet.carp.allow = 1
> net.inet.carp.log = 0
> net.inet.ipsec.def_policy = 1
> net.inet.ipsec.esp_trans_deflev = 1
> net.inet.ipsec.esp_net_deflev = 1
> net.inet.ipsec.ah_trans_deflev = 1
> net.inet.ipsec.ah_net_deflev = 1
> net.inet.ipsec.ah_cleartos = 1
> net.inet.ipsec.ah_offsetmask = 0
> net.inet.ipsec.dfbit = 2
> net.inet.ipsec.ecn = 0
> net.inet.ipsec.debug = 0
> net.inet.ipsec.ipip_spoofcheck = 1
> net.inet.ipsec.enabled = 1
> net.inet.ipsec.used = 0
> net.inet.ipsec.ah_enable = 1
> net.inet.ipsec.esp_enable = 1
> net.inet.ipsec.ipcomp_enable = 1
> net.inet.ipsec.crypto_support = 0
> net.inet.arp.nd_delay = 5
> net.inet.arp.nd_bmaxtries = 3
> net.inet.arp.nd_umaxtries = 3
> net.inet.arp.nd_reachable = 30000
> net.inet.arp.nd_retrans = 1000
> net.inet.arp.nd_nud = 1
> net.inet.arp.nd_maxnudhint = 0
> net.inet.arp.maxqueuelen = 1
> net.inet.arp.log_movements = 0
> net.inet.arp.log_permanent_modify = 1
> net.inet.arp.log_wrong_iface = 1
> net.inet.arp.debug = 0
> net.inet.accf.http.parsehttpversion = 1
> net.link.ieee80211.debug = 0
> net.link.ieee80211.rssadapt.debug = 0
> net.link.ieee80211.vap0.parent = athn0
> net.link.ieee80211.vap0.debug = 0
> net.link.ieee80211.vap0.inact_run = 300
> net.link.ieee80211.vap0.inact_probe = 30
> net.link.ieee80211.vap0.inact_auth = 180
> net.link.ieee80211.vap0.inact_init = 30
> net.link.ieee80211.vap0.driver_caps = 25282048
> net.link.ieee80211.vap0.bmiss_max = 2
> net.inet6.tcp6.rfc1323 = 1
> net.inet6.tcp6.sendspace = 32768
> net.inet6.tcp6.recvspace = 32768
> net.inet6.tcp6.mssdflt = 536
> net.inet6.tcp6.syn_cache_limit = 10255
> net.inet6.tcp6.syn_bucket_limit = 105
> net.inet6.tcp6.init_win = 4
> net.inet6.tcp6.mss_ifmtu = 0
> net.inet6.tcp6.sack.enable = 1
> net.inet6.tcp6.sack.maxholes = 32
> net.inet6.tcp6.sack.globalmaxholes = 1024
> net.inet6.tcp6.sack.globalholes = 0
> net.inet6.tcp6.win_scale = 1
> net.inet6.tcp6.timestamps = 1
> net.inet6.tcp6.cwm = 0
> net.inet6.tcp6.cwm_burstsize = 4
> net.inet6.tcp6.ack_on_push = 0
> net.inet6.tcp6.keepidle = 14400
> net.inet6.tcp6.keepintvl = 150
> net.inet6.tcp6.keepcnt = 8
> net.inet6.tcp6.slowhz = 2
> net.inet6.tcp6.log_refused = 0
> net.inet6.tcp6.rstppslimit = 100
> net.inet6.tcp6.delack_ticks = 20
> net.inet6.tcp6.init_win_local = 4
> net.inet6.tcp6.do_loopback_cksum = 0
> net.inet6.tcp6.msl = 30
> net.inet6.tcp6.minmss = 216
> net.inet6.tcp6.congctl.available = reno newreno cubic
> net.inet6.tcp6.congctl.selected = newreno
> net.inet6.tcp6.keepinit = 150
> net.inet6.tcp6.recvbuf_auto = 1
> net.inet6.tcp6.recvbuf_inc = 16384
> net.inet6.tcp6.recvbuf_max = 262144
> net.inet6.tcp6.sendbuf_auto = 1
> net.inet6.tcp6.sendbuf_inc = 8192
> net.inet6.tcp6.sendbuf_max = 262144
> net.inet6.tcp6.ecn.enable = 0
> net.inet6.tcp6.ecn.maxretries = 1
> net.inet6.tcp6.local_by_rtt = 0
> net.inet6.tcp6.iss_hash = 0
> net.inet6.tcp6.abc.enable = 1
> net.inet6.tcp6.abc.aggressive = 1
> net.inet6.tcp6.mslt.enable = 1
> net.inet6.tcp6.mslt.loopback = 2
> net.inet6.tcp6.mslt.local = 10
> net.inet6.tcp6.mslt.remote = 60
> net.inet6.tcp6.mslt.remote_threshold = 6
> net.inet6.tcp6.vtw.enable = 0
> net.inet6.tcp6.vtw.entries = 16
> net.inet6.udp6.sendspace = 9216
> net.inet6.udp6.recvspace = 42080
> net.inet6.udp6.do_loopback_cksum = 0
> net.inet6.ip6.forwarding = 0
> net.inet6.ip6.redirect = 1
> net.inet6.ip6.hlim = 64
> net.inet6.ip6.maxfragpackets = 200
> net.inet6.ip6.keepfaith = 0
> net.inet6.ip6.log_interval = 5
> net.inet6.ip6.hdrnestlimit = 15
> net.inet6.ip6.dad_count = 1
> net.inet6.ip6.auto_flowlabel = 1
> net.inet6.ip6.defmcasthlim = 1
> net.inet6.ip6.gifhlim = 30
> net.inet6.ip6.kame_version = NetBSD-current
> net.inet6.ip6.use_deprecated = 1
> net.inet6.ip6.v6only = 1
> net.inet6.ip6.anonportmin = 49152
> net.inet6.ip6.anonportmax = 65535
> net.inet6.ip6.lowportmin = 600
> net.inet6.ip6.lowportmax = 1023
> net.inet6.ip6.auto_linklocal = 1
> net.inet6.ip6.use_defaultzone = 0
> net.inet6.ip6.maxfrags = 200
> net.inet6.ip6.ifq.len = 0
> net.inet6.ip6.ifq.maxlen = 256
> net.inet6.ip6.ifq.drops = 0
> net.inet6.ip6.gifpmtu = 0
> net.inet6.ip6.prefer_tempaddr = 0
> net.inet6.ip6.mcast_pmtu = 0
> net.inet6.ip6.anonportalgo.available = bsd random_start random_pick
> hash doublehash randinc net.inet6.ip6.anonportalgo.selected = bsd
> net.inet6.ip6.anonportalgo.reserve =
> net.inet6.ip6.neighborgcthresh = 2048
> net.inet6.ip6.maxdynroutes = 4096
> net.inet6.ip6.param_rt_msg = 1
> net.inet6.ipsec6.def_policy = 1
> net.inet6.ipsec6.esp_trans_deflev = 1
> net.inet6.ipsec6.esp_net_deflev = 1
> net.inet6.ipsec6.ah_trans_deflev = 1
> net.inet6.ipsec6.ah_net_deflev = 1
> net.inet6.ipsec6.ecn = 0
> net.inet6.ipsec6.debug = 0
> net.inet6.ipsec6.enabled = 1
> net.inet6.ipsec6.used = 0
> net.inet6.icmp6.rediraccept = 1
> net.inet6.icmp6.redirtimeout = 600
> net.inet6.icmp6.nd6_prune = 1
> net.inet6.icmp6.nd6_delay = 5
> net.inet6.icmp6.nd6_umaxtries = 3
> net.inet6.icmp6.nd6_mmaxtries = 3
> net.inet6.icmp6.nd6_useloopback = 1
> net.inet6.icmp6.nodeinfo = 1
> net.inet6.icmp6.errppslimit = 100
> net.inet6.icmp6.nd6_maxnudhint = 0
> net.inet6.icmp6.mtudisc_hiwat = 1280
> net.inet6.icmp6.mtudisc_lowat = 256
> net.inet6.icmp6.nd6_debug = 0
> net.inet6.icmp6.maxqueuelen = 1
> net.inet6.icmp6.reflect_pmtu = 0
> net.inet6.icmp6.dynamic_rt_msg = 0
> net.key.debug = 0
> net.key.spi_try = 1000
> net.key.spi_min_value = 256
> net.key.spi_max_value = 268435455
> net.key.random_int = 60
> net.key.larval_lifetime = 30
> net.key.blockacq_count = 10
> net.key.blockacq_lifetime = 20
> net.key.esp_keymin = 256
> net.key.esp_auth = 0
> net.key.ah_keymin = 128
> net.key.prefered_oldsa = 0
> net.key.allow_different_idtype = 0
> net.bluetooth.hci.sendspace = 259
> net.bluetooth.hci.recvspace = 4096
> net.bluetooth.hci.acl_expiry = 10
> net.bluetooth.hci.memo_expiry = 600
> net.bluetooth.hci.eventq_max = 20
> net.bluetooth.hci.aclrxq_max = 50
> net.bluetooth.hci.scorxq_max = 50
> net.bluetooth.l2cap.sendspace = 4096
> net.bluetooth.l2cap.recvspace = 4096
> net.bluetooth.l2cap.rtx = 30
> net.bluetooth.l2cap.ertx = 180
> net.bluetooth.rfcomm.sendspace = 4096
> net.bluetooth.rfcomm.recvspace = 4096
> net.bluetooth.rfcomm.mtu_default = 127
> net.bluetooth.rfcomm.ack_timeout = 20
> net.bluetooth.rfcomm.mcc_timeout = 20
> net.bluetooth.sco.sendspace = 4096
> net.bluetooth.sco.recvspace = 4096
> net.bpf.jit = 0
> net.bpf.maxbufsize = 1048576
> net.ether.rps_hash = zero
> net.gif.rps_hash = zero
> net.pppoe.term_unknown = 0
> net.pppoe.rps_hash = zero
> net.interfaces.athn0.rcvq.drops = 0
> net.interfaces.athn0.sndq.len = 0
> net.interfaces.athn0.sndq.maxlen = 256
> net.interfaces.athn0.sndq.drops = 0
> net.interfaces.athn0.watchdog.trigger = 0
> net.interfaces.msk0.rcvq.drops = 0
> net.interfaces.msk0.sndq.len = 0
> net.interfaces.msk0.sndq.maxlen = 511
> net.interfaces.msk0.sndq.drops = 0
> net.interfaces.msk0.watchdog.trigger = 0
> net.interfaces.lo0.sndq.len = 0
> net.interfaces.lo0.sndq.maxlen = 256
> net.interfaces.lo0.sndq.drops = 0
> net.wqinput.icmp.inputq.drops = 0
> net.wqinput.carp.inputq.drops = 0
> net.wqinput.carp6.inputq.drops = 0
> net.wqinput.icmp6.inputq.drops = 0
> debug.crashme.panic = 0
> debug.crashme.null_deref = 0
> debug.crashme.null_jump = 0
> debug.crashme.ddb = 0
> debug.crashme.mutex_recursion = 0
> debug.crashme_enable = 0
> hw.machine = i386
> hw.model = Intel 686-class
> hw.ncpu = 2
> hw.byteorder = 1234
> hw.physmem = 1064628224
> hw.usermem = 1033375744
> hw.pagesize = 4096
> hw.disknames = wd0 sd0
> hw.machine_arch = i386
> hw.alignbytes = 3
> hw.cnmagic =
> hw.physmem64 = 1064628224
> hw.usermem64 = 1033375744
> hw.iostatnames = wd0 sd0
> hw.ncpuonline = 2
> hw.ubsec.maxbatch = 1
> hw.ubsec.maxaggr = 1
> hw.ipw.accept_eula = 0
> hw.iwi.accept_eula = 0
> hw.msk.mskc0.int_mod = 1000
> hw.uhso.autoswitch = 1
> hw.fwohci.nocyclemaster = 0
> hw.fwohci.phydma_enable = 1
> hw.ieee1394if.try_bmr = 1
> hw.ieee1394if.hold_count = 0
> hw.ieee1394if.ieee1394_debug = 0
> hw.fwmem.eui64_hi = 0
> hw.fwmem.eui64_lo = 0
> hw.fwmem.speed = 2
> hw.fwmem.fwmem_debug = 0
> hw.fwip.rx_queue_len = 256
> hw.fwip.if_fwip_debug = 0
> hw.sbp.auto_login = 1
> hw.sbp.max_speed = -1
> hw.sbp.exclusive_login = 1
> hw.sbp.login_delay = 1000
> hw.sbp.scan_delay = 500
> hw.sbp.use_doorbell = 0
> hw.sbp.tags = 0
> hw.sbp.sbp_debug = 0
> hw.acpi.root = 1023056
> hw.acpi.sleep.state = 0
> hw.acpi.sleep.states = S0 S3 S4 S5
> hw.acpi.sleep.beep = 0
> hw.acpi.sleep.vbios = 0
> hw.acpi.stat.gpe = 636
> hw.acpi.stat.sci = 636
> hw.acpi.stat.fixed = 0
> hw.acpi.stat.method = 765
> hw.acpi.wake.ppb2 = 0
> hw.acpi.wake.uhci0 = 0
> hw.acpi.wake.uhci1 = 0
> hw.acpi.wake.uhci2 = 0
> hw.acpi.wake.uhci3 = 0
> hw.acpi.wake.ehci0 = 0
> hw.acpi.wake.ppb0 = 0
> hw.acpi.wake.ppb1 = 0
> hw.acpi.cpu.dynamic = 1
> hw.acpi.cpu.passive = 1
> hw.acpi.acpivga0.bios_switch = 1
> hw.hvn.udp_csum_fixup_mtu = 1420
> hw.hvn.chimney_size = 0
> hw.hvn.channel_count = 0
> hw.hvn.tx_ring_count = 0
> hw.ath.dwell = 200
> hw.ath.calibrate = 30
> hw.ath.outdoor = 1
> hw.ath.countrycode = 0
> hw.ath.regdomain = 0
> hw.ath.debug = 0
> hw.ath.rxbuf = 40
> hw.ath.txbuf = 200
> hw.ath.hal.dma_brt = 2
> hw.ath.hal.sw_brt = 10
> hw.ath.hal.swba_backoff = 0
> hw.rtw.rfprog_fallback = 0
> hw.rtw.host_rfio = 0
> hw.swwdog.reboot = 0
> hw.wsevent.default_version = 1
> hw.firmware.path =
> /libdata/firmware:/usr/libdata/firmware:/usr/pkg/libdata/firmware:/usr/pkg/libdata
> hw.drm2.i915_modparams.enable_dpcd_backlight = 0
> hw.drm2.i915_modparams.inject_probe_failure = 0
> hw.drm2.i915_modparams.enable_dp_mst = 1
> hw.drm2.i915_modparams.dmc_firmware_path =
> hw.drm2.i915_modparams.huc_firmware_path =
> hw.drm2.i915_modparams.guc_firmware_path =
> hw.drm2.i915_modparams.guc_log_level = -1
> hw.drm2.i915_modparams.enable_guc = 0
> hw.drm2.i915_modparams.edp_vswing = 0
> hw.drm2.i915_modparams.nuclear_pageflip = 0
> hw.drm2.i915_modparams.verbose_state_checks = 1
> hw.drm2.i915_modparams.mmio_debug = -1
> hw.drm2.i915_modparams.disable_display = 0
> hw.drm2.i915_modparams.invert_brightness = 0
> hw.drm2.i915_modparams.force_reset_modeset_test = 0
> hw.drm2.i915_modparams.load_detect_test = 0
> hw.drm2.i915_modparams.prefault_disable = 0
> hw.drm2.i915_modparams.fastboot = -1
> hw.drm2.i915_modparams.enable_ips = 1
> hw.drm2.i915_modparams.disable_power_well = 1
> hw.drm2.i915_modparams.alpha_support = 0
> hw.drm2.i915_modparams.force_probe =
> hw.drm2.i915_modparams.enable_psr = -1
> hw.drm2.i915_modparams.enable_hangcheck = 1
> hw.drm2.i915_modparams.vbt_firmware = hw.drm2.i915_modparams.reset = 3
> hw.drm2.i915_modparams.vbt_sdvo_panel_type = -1
> hw.drm2.i915_modparams.panel_use_ssc = -1
> hw.drm2.i915_modparams.lvds_channel_mode = 0
> hw.drm2.i915_modparams.enable_fbc = 0
> hw.drm2.i915_modparams.enable_dc = -1
> hw.drm2.i915_modparams.modeset = -1
> hw.drm2.radeon_cik_support = 1
> hw.drm2.radeon_si_support = 1
> hw.drm2.radeon_vce = 1
> hw.drm2.radeon_uvd = 1
> hw.drm2.radeon_mst = 0
> hw.drm2.radeon_auxch = -1
> hw.drm2.radeon_backlight = -1
> hw.drm2.radeon_bapm = -1
> hw.drm2.radeon_use_pflipirq = 2
> hw.drm2.radeon_deep_color = 0
> hw.drm2.radeon_vm_block_size = -1
> hw.drm2.radeon_vm_size = 8
> hw.drm2.radeon_hard_reset = 0
> hw.drm2.radeon_runtime_pm = -1
> hw.drm2.radeon_aspm = -1
> hw.drm2.radeon_dpm = -1
> hw.drm2.radeon_fastfb = 0
> hw.drm2.radeon_lockup_timeout = 10000
> hw.drm2.radeon_msi = -1
> hw.drm2.radeon_pcie_gen2 = -1
> hw.drm2.radeon_hw_i2c = 0
> hw.drm2.radeon_disp_priority = 0
> hw.drm2.radeon_audio = -1
> hw.drm2.radeon_tv = 1
> hw.drm2.radeon_connector_table = 0
> hw.drm2.radeon_testing = 0
> hw.drm2.radeon_benchmarking = 0
> hw.drm2.radeon_gart_size = -1
> hw.drm2.radeon_agpmode = 0
> hw.drm2.radeon_vram_limit = 0
> hw.drm2.radeon_r4xx_atom = 0
> hw.drm2.radeon_dynclks = -1
> hw.drm2.radeon_modeset = -1
> hw.drm2.radeon_no_wb = 0
> hw.drm2.nouveau_tv_norm =
> hw.drm2.nouveau_vram_pushbuf = 0
> hw.drm2.nouveau_hdmimhz = 0
> hw.drm2.nouveau_duallink = 1
> hw.drm2.nouveau_tv_disable = 0
> hw.drm2.nouveau_mst = 1
> hw.drm2.nouveau_runtime_pm = -1
> hw.drm2.nouveau_atomic = 0
> hw.drm2.nouveau_modeset = -1
> hw.drm2.nouveau_noaccel = 0
> hw.drm2.nouveau_debug =
> hw.drm2.nouveau_config =
> hw.drm2.nouveau_fbcon_bpp = 0
> hw.drm2.dp_aux_i2c_transfer_size = 16
> hw.drm2.dp_aux_i2c_speed_khz = 10
> hw.drm2.edid_fixup = 6
> hw.drm2.drm_fbdev_overalloc = 100
> hw.drm2.drm_fbdev_emulation = 1
> hw.drm2.__drm_debug = 0
> hw.drm2.drm_kms_helper_poll = 1
> hw.drm2.drm_timestamp_precision = 20
> hw.drm2.drm_vblank_offdelay = 5000
> hw.synaptics.up_down_emulation = 3
> hw.synaptics.up_down_motion_delta = 1
> hw.synaptics.gesture_move = 200
> hw.synaptics.gesture_length = 20
> hw.synaptics.edge_left = 1632
> hw.synaptics.edge_right = 5856
> hw.synaptics.edge_top = 4890
> hw.synaptics.edge_bottom = 1568
> hw.synaptics.edge_motion_delta = 32
> hw.synaptics.finger_high = 35
> hw.synaptics.finger_low = 20
> hw.synaptics.two_fingers_emulation = 0
> hw.synaptics.scale_x = 8
> hw.synaptics.scale_y = 8
> hw.synaptics.scale_z = 32
> hw.synaptics.max_speed_x = 32
> hw.synaptics.max_speed_y = 32
> hw.synaptics.max_speed_z = 2
> hw.synaptics.movement_threshold = 4
> hw.synaptics.movement_enable = 1
> hw.synaptics.button_region_movement_enable = 1
> hw.synaptics.button_boundary = 1568
> hw.synaptics.button2_edge = 3040
> hw.synaptics.button3_edge = 4448
> hw.synaptics.aux_mid_button_scroll = 1
> hw.synaptics.vert_scroll_percent = 0
> hw.synaptics.horizontal_scroll_percent = 0
> hw.synaptics.button_region_percent = 0
> hw.synaptics.debug = 0
> hw.audio0.blk_ms = 10
> hw.audio0.multiuser = 0
> hw.ubt0.config = 0
> hw.ubt0.alt_config = 6
> hw.ubt0.sco_rxsize = 0
> hw.ubt0.sco_txsize = 0
> hw.wd0.use_ncq = 1
> hw.wd0.use_ncq_prio = 0
> machdep.biosbasemem = 639
> machdep.biosextmem = 1039040
> machdep.booted_kernel = netbsd
> machdep.diskinfo: 80:500118192(1024/255/63),2 wd0:80
> machdep.fpu_present = 1
> machdep.osfxsr = 1
> machdep.sse = 1
> machdep.sse2 = 1
> machdep.fpu_save = 1
> machdep.fpu_save_size = 512
> machdep.xsave_features = 0
> machdep.acpiapm.standby = 1
> machdep.acpiapm.suspend = 3
> machdep.dmi.system-vendor = Hewlett-Packard
> machdep.dmi.system-product = Compaq Mini
> machdep.dmi.system-version = F.05
> machdep.dmi.bios-vendor = Hewlett-Packard
> machdep.dmi.bios-version = 361A0 Ver. F.16
> machdep.dmi.bios-date = 20100430
> machdep.dmi.board-vendor = Hewlett-Packard
> machdep.dmi.board-product = 361A
> machdep.dmi.board-version = KBC Version 02.12
> machdep.dmi.board-asset-tag =
> machdep.dmi.chassis-vendor = Hewlett-Packard
> machdep.dmi.chassis-version =
> machdep.dmi.chassis-asset-tag = CNU90634NW
> machdep.dmi.processor-vendor = Intel
> machdep.dmi.processor-version = Intel(R) Atom(TM) CPU N270 @
> 1.60GHz machdep.dmi.processor-frequency = 1600 MHz
> machdep.bootmethod = BIOS
> machdep.cpu_brand = Intel(R) Atom(TM) CPU N270 @ 1.60GHz
> machdep.sparse_dump = 1
> machdep.tsc_freq = 1597400400
> machdep.pae = 0
> machdep.tsc_user_enable = 1
> machdep.hypervisor = none
> machdep.user_ldt = 0
> machdep.spectre_v1.mitigated = 0
> machdep.spectre_v2.hwmitigated = 0
> machdep.spectre_v2.swmitigated = 1
> machdep.spectre_v2.method = [GCC retpoline]
> machdep.spectre_v4.mitigated = 0
> machdep.spectre_v4.method = (none)
> machdep.mds.mitigated = 0
> machdep.mds.method = (none)
> machdep.taa.mitigated = 1
> machdep.taa.method = [TAA_NO]
> machdep.idle-mechanism = acpi
> machdep.smbios = 0xface0
> machdep.cpu.frequency.target = 1600
> machdep.cpu.frequency.current = 1600
> machdep.cpu.frequency.available = 1600 1333 1067 800
> user.cs_path =
> /usr/bin:/bin:/usr/sbin:/sbin:/usr/pkg/bin:/usr/pkg/sbin:/usr/local/bin:/usr/local/sbin
> user.bc_base_max = 2147483647 user.bc_dim_max = 65535
> user.bc_scale_max = 2147483647
> user.bc_string_max = 2147483647
> user.coll_weights_max = 2
> user.expr_nest_max = 32
> user.line_max = 2048
> user.re_dup_max = 255
> user.posix2_version = 200112
> user.posix2_c_bind = 1
> user.posix2_c_dev = 0
> user.posix2_char_term = 0
> user.posix2_fort_dev = 0
> user.posix2_fort_run = 0
> user.posix2_localedef = 0
> user.posix2_sw_dev = 0
> user.posix2_upe = 0
> user.stream_max = 20
> user.tzname_max = 511
> user.atexit_max = -1
> ddb.radix = 16
> ddb.maxoff = 1048576
> ddb.maxwidth = 80
> ddb.lines = 24
> ddb.tabstops = 8
> ddb.onpanic = 0
> ddb.fromconsole = 1
> ddb.tee_msgbuf = 0
> ddb.commandonenter =
> ddb.panicstackframes = 65535
> ddb.dumpstack = 1
> proc.curproc.corename = %n.core
> proc.curproc.rlimit.cputime.soft = unlimited
> proc.curproc.rlimit.cputime.hard = unlimited
> proc.curproc.rlimit.filesize.soft = unlimited
> proc.curproc.rlimit.filesize.hard = unlimited
> proc.curproc.rlimit.datasize.soft = 268435456
> proc.curproc.rlimit.datasize.hard = 3221225472
> proc.curproc.rlimit.stacksize.soft = 2097152
> proc.curproc.rlimit.stacksize.hard = 67108864
> proc.curproc.rlimit.coredumpsize.soft = unlimited
> proc.curproc.rlimit.coredumpsize.hard = unlimited
> proc.curproc.rlimit.memoryuse.soft = 1019363328
> proc.curproc.rlimit.memoryuse.hard = 1019363328
> proc.curproc.rlimit.memorylocked.soft = 339787776
> proc.curproc.rlimit.memorylocked.hard = 1019363328
> proc.curproc.rlimit.maxproc.soft = 1024
> proc.curproc.rlimit.maxproc.hard = 1044
> proc.curproc.rlimit.descriptors.soft = 1024
> proc.curproc.rlimit.descriptors.hard = 3404
> proc.curproc.rlimit.sbsize.soft = unlimited
> proc.curproc.rlimit.sbsize.hard = unlimited
> proc.curproc.rlimit.vmemoryuse.soft = unlimited
> proc.curproc.rlimit.vmemoryuse.hard = unlimited
> proc.curproc.rlimit.maxlwp.soft = 2048
> proc.curproc.rlimit.maxlwp.hard = 4096
> proc.curproc.stopfork = 0
> proc.curproc.stopexec = 0
> proc.curproc.stopexit = 0
> proc.curproc.paxflags = 3
> security.pax.mprotect.enabled = 1
> security.pax.mprotect.global = 1
> security.pax.mprotect.ptrace = 1
> security.pax.mprotect.debug = 0
> security.pax.segvguard.enabled = 1
> security.pax.segvguard.global = 0
> security.pax.segvguard.expiry_timeout = 120
> security.pax.segvguard.suspend_timeout = 600
> security.pax.segvguard.max_crashes = 5
> security.pax.aslr.enabled = 1
> security.pax.aslr.global = 1
> security.pax.aslr.debug = 0
> security.pax.aslr.flags = 0
> security.pax.aslr.rand = 0
> security.pax.aslr.mmap_len = 16
> security.pax.aslr.stack_len = 8
> security.pax.aslr.exec_len = 12
> security.models.suser.name = Traditional NetBSD: Superuser
> security.models.bsd44.securelevel = -1
> security.models.bsd44.curtain = 0
> security.models.bsd44.name = Traditional NetBSD: 4.4BSD
> security.models.securelevel.name = Traditional NetBSD: Securelevel
> security.models.securelevel.securelevel = -1
> security.models.extensions.name = Traditional NetBSD: Extensions
> security.models.extensions.usermount = 0
> security.models.extensions.curtain = 0
> security.models.extensions.user_set_cpu_affinity = 0
> security.models.extensions.user_set_dbregs = 0
> security.models.extensions.hardlink_check_uid = 0
> security.models.extensions.hardlink_check_gid = 0
> security.curtain = 0
> opencrypto.crypto_ret_q.len = 0
> opencrypto.crypto_ret_q.drops = 0
> opencrypto.crypto_ret_q.maxlen = 0
> opencrypto.crypto_ret_kq.len = 0
> opencrypto.crypto_ret_kq.drops = 0
> opencrypto.crypto_ret_kq.maxlen = 0
> 000:00:0: Intel 82945GME Host Bridge (host bridge, revision 0x03)
> [pchb0] 000:02:0: Intel 82945GME Integrated Graphics Device (VGA
> display, revision 0x03) [i915drmkms0] 000:02:1: Intel 82945GM/PM/GMS
> Integrated Graphics Device (miscellaneous display, revision 0x03)
> 000:27:0: Intel 82801GB/GR High Definition Audio Controller (mixed
> mode multimedia, HD Audio 1.0, revision 0x02) [hdaudio0] 000:28:0:
> Intel 82801GB/GR PCI Express Port #1 (PCI bridge, revision 0x02)
> [ppb0] 000:28:1: Intel 82801GB/GR PCI Express Port #2 (PCI bridge,
> revision 0x02) [ppb1] 000:29:0: Intel 82801GB/GR USB UHCI Controller
> (USB serial bus, UHCI, revision 0x02) [uhci0] 000:29:1: Intel
> 82801GB/GR USB UHCI Controller (USB serial bus, UHCI, revision 0x02)
> [uhci1] 000:29:2: Intel 82801GB/GR USB UHCI Controller (USB serial
> bus, UHCI, revision 0x02) [uhci2] 000:29:3: Intel 82801GB/GR USB UHCI
> Controller (USB serial bus, UHCI, revision 0x02) [uhci3] 000:29:7:
> Intel 82801GB/GR USB EHCI Controller (USB serial bus, EHCI, revision
> 0x02) [ehci0] 000:30:0: Intel 82801BAM Hub-PCI Bridge (PCI bridge,
> subtractive decode, revision 0xe2) [ppb2] 000:31:0: Intel 82801GBM
> LPC Interface Bridge (ISA bridge, revision 0x02) [ichlpcib0]
> 000:31:1: Intel 82801GB/GR IDE Controller (IDE mass storage,
> interface 0x8a, revision 0x02) [piixide0] 000:31:3: Intel 82801GB/GR
> SMBus Controller (SMBus serial bus, revision 0x02) [ichsmb0]
> 001:00:0: Atheros Communications AR9281 (miscellaneous network,
> revision 0x01) [athn0] 002:00:0: Marvell Yukon 88E8040 (ethernet
> network) [mskc0] --MP_/=AqH6GaA0+Un68Q7y46V_tI Content-Type:
> text/x-log Content-Transfer-Encoding: 7bit Content-Disposition:
> attachment; filename=wpa_supplicant_2026-02-13-3-athn0.log
> wpa_supplicant v2.11 Successfully initialized wpa_supplicant
> Initializing interface 'athn0' conf '/etc/wpa_supplicant.conf' driver
> 'bsd' ctrl_interface 'N/A' bridge 'N/A' Configuration file
> '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' Reading
> configuration file '/etc/wpa_supplicant.conf'
> ctrl_interface='/var/run/wpa_supplicant' ctrl_interface_group='wheel'
> update_config=1 Line: 11 - start of a new network block
> ssid - hexdump_ascii(len=16):
> XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d MY_WIFI_NETWORK
> PSK (ASCII passphrase) - hexdump_ascii(len=28): [REMOVED]
> scan_ssid=1 (0x1)
> PSK (from passphrase) - hexdump(len=32): [REMOVED]
> Priority group 0
> id=0 ssid='MY_WIFI_NETWORK'
> Add interface athn0 to a new radio N/A
> athn0: Failed to attach pkt_type filter
> athn0: Own MAC address: xx:xx:xx:xx:a9:b1
> bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> bsd_del_key: key_idx=0
> bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> bsd_del_key: key_idx=1
> bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> bsd_del_key: key_idx=2
> bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> bsd_del_key: key_idx=3
> bsd_set_key: alg=0 addr=0x0 key_idx=4 set_tx=0 seq_len=0 key_len=0
> bsd_del_key: key_idx=4
> ioctl[SIOCS80211, op=20, val=0, arg_len=7]: Invalid argument
> bsd_set_key: alg=0 addr=0x0 key_idx=5 set_tx=0 seq_len=0 key_len=0
> bsd_del_key: key_idx=5
> ioctl[SIOCS80211, op=20, val=0, arg_len=7]: Invalid argument
> wpa_driver_bsd_set_countermeasures: enabled=0
> athn0: RSN: flushing PMKID list in the driver
> athn0: Setting scan request: 0.100000 sec
> ENGINE: Loading builtin engines
> ENGINE: Loading builtin engines
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: Supplicant port status: Unauthorized
> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> ctrl_interface_group=0 (from group name 'wheel')
> athn0: Added interface athn0
> athn0: State: DISCONNECTED -> DISCONNECTED
> athn0: State: DISCONNECTED -> SCANNING
> Scan SSID - hexdump_ascii(len=16):
> XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d MY_WIFI_NETWORK
> athn0: Starting AP scan for wildcard SSID (Interleave with specific)
> athn0: Add radio work 'scan'@0xb3528f40
> athn0: First radio work item in the queue - schedule start
> immediately athn0: Starting radio work 'scan'@0xb3528f40 after
> 0.000140 second wait wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> EAPOL: disable timer tick
> athn0: Event SCAN_RESULTS (3) received
> Received 2012 bytes of scan results (25 BSSes)
> athn0: BSS: Start scan result update 1
> athn0: BSS: Add new id 0 BSSID XX:XX:XX:XX:3b:44 SSID '' freq 2412
> athn0: BSS: Add new id 1 BSSID XX:XX:XX:XX:3b:46 SSID
> 'MY_WIFI_NETWORK' freq 2412 athn0: BSS: Add new id 2 BSSID
> XX:XX:XX:XX:3b:43 SSID '' freq 5180 athn0: BSS: Add new id 3 BSSID
> XX:XX:XX:XX:3b:45 SSID 'MY_WIFI_NETWORK' freq 5180 athn0: BSS: Add
> new id 4 BSSID XX:XX:XX:XX:a4:a6 SSID 'MY_WIFI_NETWORK' freq 2412
> athn0: BSS: Add new id 5 BSSID XX:XX:XX:XX:a4:a4 SSID '' freq 2412
> athn0: BSS: Add new id 6 BSSID XX:XX:XX:XX:a4:a5 SSID
> 'MY_WIFI_NETWORK' freq 5180 athn0: BSS: Add new id 7 BSSID
> XX:XX:XX:XX:a4:a3 SSID '' freq 5180 athn0: BSS: Add new id 8 BSSID
> XX:XX:XX:XX:a5:26 SSID 'MY_WIFI_NETWORK' freq 2412 athn0: BSS: Add
> new id 9 BSSID XX:XX:XX:XX:a5:24 SSID '' freq 2412 athn0: BSS: Add
> new id 10 BSSID XX:XX:XX:XX:23:64 SSID '' freq 2412 athn0: BSS: Add
> new id 11 BSSID XX:XX:XX:XX:23:66 SSID 'MY_WIFI_NETWORK' freq 2412
> athn0: BSS: Add new id 12 BSSID XX:XX:XX:XX:a5:25 SSID
> 'MY_WIFI_NETWORK' freq 5180 athn0: BSS: Add new id 13 BSSID
> XX:XX:XX:XX:a5:23 SSID '' freq 5180 athn0: BSS: Add new id 14 BSSID
> XX:XX:XX:XX:23:65 SSID 'MY_WIFI_NETWORK' freq 5180 athn0: BSS: Add
> new id 15 BSSID XX:XX:XX:XX:23:63 SSID '' freq 5180 athn0: BSS: Add
> new id 16 BSSID XX:XX:XX:XX:05:63 SSID '' freq 5180 athn0: BSS: Add
> new id 17 BSSID XX:XX:XX:XX:3b:48 SSID '' freq 2412 athn0: BSS: Add
> new id 18 BSSID XX:XX:XX:XX:3b:47 SSID '' freq 5180 athn0: BSS: Add
> new id 19 BSSID XX:XX:XX:XX:a4:a8 SSID '' freq 2412 athn0: BSS: Add
> new id 20 BSSID XX:XX:XX:XX:a4:a7 SSID '' freq 5180 athn0: BSS: Add
> new id 21 BSSID XX:XX:XX:XX:a5:28 SSID '' freq 2412 athn0: BSS: Add
> new id 22 BSSID XX:XX:XX:XX:23:68 SSID '' freq 2412 athn0: BSS: Add
> new id 23 BSSID XX:XX:XX:XX:a5:27 SSID '' freq 5180 athn0: BSS: Add
> new id 24 BSSID XX:XX:XX:XX:23:67 SSID '' freq 5180 BSS:
> last_scan_res_used=25/32 athn0: New scan results available (own=0
> ext=0) athn0: Radio work 'scan'@0xb3528f40 done in 7.629141 seconds
> athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
> athn0: Selecting BSS from priority group 0 athn0: 0:
> XX:XX:XX:XX:3b:44 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x10
> level=75 freq=2412 athn0: skip - SSID not known athn0: 1:
> XX:XX:XX:XX:3b:46 ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24
> caps=0x31 level=75 freq=2412 athn0: selected based on RSN IE
> athn0: MLD: No Multi-Link element athn0: selected BSS
> XX:XX:XX:XX:3b:46 ssid='MY_WIFI_NETWORK' athn0: Considering connect
> request: reassociate: 0 selected: XX:XX:XX:XX:3b:46 bssid:
> 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
> ssid=0xb36b7000 current_ssid=0x0 athn0: Request association with
> XX:XX:XX:XX:3b:46 athn0: No ongoing scan/p2p-scan found to abort
> athn0: Add radio work 'connect'@0xb3528f40 athn0: First radio work
> item in the queue - schedule start immediately athn0: Starting radio
> work 'connect'@0xb3528f40 after 0.000171 second wait athn0: WPA:
> clearing own WPA/RSN IE athn0: RSN: clearing own RSNXE RSN: PMKSA
> cache search - network_ctx=0xb36b7000 try_opportunistic=0 akmp=0x0
> RSN: Search for BSSID XX:XX:XX:XX:3b:46 RSN: No PMKSA cache entry
> found athn0: RSN: using IEEE 802.11i/D9.0 athn0: WPA: Selected cipher
> suites: group 16 pairwise 16 key_mgmt 2 proto 2 athn0: WPA: Selected
> mgmt group cipher 32 athn0: WPA: clearing AP WPA IE
> WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
> athn0: WPA: clearing AP RSNXE
> athn0: WPA: AP group 0x10 network profile group 0x18; available
> group 0x10 athn0: WPA: using GTK CCMP
> athn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
> available pairwise 0x10 athn0: WPA: using PTK CCMP
> athn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
> key_mgmt 0x2 athn0: WPA: using KEY_MGMT WPA-PSK
> athn0: WPA: AP mgmt_group_cipher 0x20 network profile
> mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 athn0: WPA:
> not using MGMT group cipher WPA: Set own WPA IE default -
> hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
> hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
> WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
> athn0: Automatic auth_alg selection: 0x1
> No supported operating classes IE to add
> athn0: Trying to associate with XX:XX:XX:XX:3b:46
> (SSID='MY_WIFI_NETWORK' freq=2412 MHz) athn0: Cancelling scan request
> athn0: State: SCANNING -> ASSOCIATING
> Limit connection to BSSID XX:XX:XX:XX:3b:46 freq=2412 MHz based on
> scan results (bssid_set=0 wps=0) PSK (set in config) -
> hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
> 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
> wpa_driver_bsd_set_drop_unencrypted: enabled=1
> wpa_driver_bsd_associate: set PRIVACY 1 athn0: Setting authentication
> timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> athn0: Event ASSOC (0) received
> athn0: State: ASSOCIATING -> ASSOCIATED
> athn0: Associated to a new BSS: BSSID=XX:XX:XX:XX:3b:46
> athn0: Associated with XX:XX:XX:XX:3b:46
> athn0: WPA: Association event - clear replay counter
> athn0: WPA: Clear old PTK
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: enable timer tick
> EAPOL: SUPP_BE entering state IDLE
> athn0: Setting authentication timeout: 10 sec 0 usec
> athn0: Cancelling scan request
> athn0: RX EAPOL from XX:XX:XX:XX:3b:46 (encrypted=-1)
> RX EAPOL - hexdump(len=99): [...REDACTED...]
> athn0: Setting authentication timeout: 10 sec 0 usec
> athn0: IEEE 802.1X RX: version=2 type=3 length=95
> WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
> athn0: EAPOL-Key type=2
> athn0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> athn0: key_length=16 key_data_length=0
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> athn0: WPA: RX message 1 of 4-Way Handshake from XX:XX:XX:XX:3b:46
> (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
> athn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
> Get randomness: len=32 entropy=11
> WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
> WPA: PTK derivation using PRF(SHA1)
> WPA: PTK derivation - A1=xx:xx:xx:xx:a9:b1 A2=XX:XX:XX:XX:3b:46
> WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
> WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=48): [REMOVED]
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: KEK - hexdump(len=16): [REMOVED]
> WPA: TK - hexdump(len=16): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
> WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
> athn0: WPA: Sending EAPOL-Key 2/4
> WPA: Send EAPOL-Key frame to XX:XX:XX:XX:3b:46 ver=2 mic_len=16
> key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
> WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
> athn0: RX EAPOL from XX:XX:XX:XX:3b:46 (encrypted=-1)
> RX EAPOL - hexdump(len=163): [...REDACTED...]
> athn0: IEEE 802.1X RX: version=2 type=3 length=159
> WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
> athn0: EAPOL-Key type=2
> athn0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
> MIC Secure Encr) athn0: key_length=16 key_data_length=64
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> WPA: EAPOL-Key MIC using HMAC-SHA1
> RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
> WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
> WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
> athn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> athn0: RSN: RX message 3 of 4-Way Handshake from XX:XX:XX:XX:3b:46
> (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
> WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
> WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
> WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
> athn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
> msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
> RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
> athn0: Request to deauthenticate - bssid=XX:XX:XX:XX:3b:46
> pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
> state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> bsd_send_mlme_param: op=3 reason=17 addr=XX:XX:XX:XX:3b:46 athn0:
> Event DEAUTH (11) received athn0: Deauthentication notification
> athn0: * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
> Deauthentication frame IE(s) - hexdump(len=0): [NULL] athn0:
> CTRL-EVENT-DISCONNECTED bssid=XX:XX:XX:XX:3b:46 reason=17
> locally_generated=1 athn0: Auto connect enabled: try to reconnect
> (wps=0/0 wpa_state=7) athn0: Setting scan request: 0.100000 sec
> athn0: Radio work 'connect'@0xb3528f40 done in 0.075831 seconds
> athn0: radio_work_free('connect'@0xb3528f40): num_active_works --> 0
> athn0: Added BSSID XX:XX:XX:XX:3b:46 into ignore list, ignoring for
> 10 seconds athn0: Another BSS in this ESS has been seen; try it next
> athn0: BSSID XX:XX:XX:XX:3b:46 ignore list count incremented to 2,
> ignoring for 10 seconds athn0: Consecutive connection failures: 1 -->
> request scan in 100 ms athn0: Ignore new scan request for 0.100000
> sec since an earlier request is scheduled to trigger sooner athn0:
> WPA: Clear old PMK and PTK athn0: Disconnect event - remove keys
> athn0: State: 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External
> notification - portEnabled=0 EAPOL: SUPP_PAE entering state
> DISCONNECTED EAPOL: Supplicant port status: Unauthorized
> EAPOL: SUPP_BE entering state INITIALIZE
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> athn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> QM: Clear all active DSCP policies
> athn0: CTRL-EVENT-DSCP-POLICY clear_all
> athn0: Ignore new scan request for 5.000000 sec since an earlier
> request is scheduled to trigger sooner athn0: Request to
> deauthenticate - bssid=00:00:00:00:00:00
> pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
> state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> athn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
> notification - portEnabled=0 EAPOL: External notification -
> portValid=0 QM: Clear all active DSCP policies athn0:
> CTRL-EVENT-DSCP-POLICY clear_all athn0: Ignore new scan request for
> 5.000000 sec since an earlier request is scheduled to trigger sooner
> athn0: Event DISASSOC (1) received athn0: Disassociation notification
> athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
> athn0: Do not request new immediate scan athn0: WPA: Clear old PMK
> and PTK athn0: Disconnect event - remove keys
> athn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> athn0: State: DISCONNECTED -> SCANNING
> Scan SSID - hexdump_ascii(len=16):
> XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d MY_WIFI_NETWORK
> athn0: Starting AP scan for specific SSID: MY_WIFI_NETWORK
> athn0: Optimize scan based on previously generated frequency list
> athn0: Add radio work 'scan'@0xb3528f40
> athn0: First radio work item in the queue - schedule start
> immediately athn0: Starting radio work 'scan'@0xb3528f40 after
> 0.000136 second wait wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> EAPOL: startWhen --> 0
> EAPOL: disable timer tick
> athn0: Event SCAN_RESULTS (3) received
> Received 2100 bytes of scan results (26 BSSes)
> athn0: BSS: Start scan result update 2
> athn0: BSS: Add new id 25 BSSID XX:XX:XX:XX:05:62 SSID '' freq 2412
> BSS: last_scan_res_used=26/32
> athn0: New scan results available (own=0 ext=0)
> athn0: Radio work 'scan'@0xb3528f40 done in 7.745645 seconds
> athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
> athn0: Selecting BSS from priority group 0
> athn0: 0: XX:XX:XX:XX:3b:45 ssid='MY_WIFI_NETWORK' wpa_ie_len=0
> rsn_ie_len=24 caps=0x11 level=63 freq=5180 athn0: selected based
> on RSN IE athn0: MLD: No Multi-Link element
> athn0: selected BSS XX:XX:XX:XX:3b:45 ssid='MY_WIFI_NETWORK'
> athn0: Considering connect request: reassociate: 0 selected:
> XX:XX:XX:XX:3b:45 bssid: 00:00:00:00:00:00 pending:
> 00:00:00:00:00:00 wpa_state: SCANNING ssid=0xb36b7000
> current_ssid=0x0 athn0: Request association with XX:XX:XX:XX:3b:45
> athn0: Re-association to the same ESS athn0: No ongoing scan/p2p-scan
> found to abort athn0: Add radio work 'connect'@0xb3528f40 athn0:
> First radio work item in the queue - schedule start immediately
> athn0: Starting radio work 'connect'@0xb3528f40 after 0.000059 second
> wait athn0: WPA: clearing own WPA/RSN IE athn0: RSN: clearing own
> RSNXE RSN: PMKSA cache search - network_ctx=0xb36b7000
> try_opportunistic=0 akmp=0x0 RSN: Search for BSSID XX:XX:XX:XX:3b:45
> RSN: No PMKSA cache entry found
> athn0: RSN: using IEEE 802.11i/D9.0
> athn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
> proto 2 athn0: WPA: Selected mgmt group cipher 32
> athn0: WPA: clearing AP WPA IE
> WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
> athn0: WPA: clearing AP RSNXE
> athn0: WPA: AP group 0x10 network profile group 0x18; available
> group 0x10 athn0: WPA: using GTK CCMP
> athn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
> available pairwise 0x10 athn0: WPA: using PTK CCMP
> athn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
> key_mgmt 0x2 athn0: WPA: using KEY_MGMT WPA-PSK
> athn0: WPA: AP mgmt_group_cipher 0x20 network profile
> mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 athn0: WPA:
> not using MGMT group cipher WPA: Set own WPA IE default -
> hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
> hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
> WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
> athn0: Automatic auth_alg selection: 0x1
> No supported operating classes IE to add
> athn0: Trying to associate with XX:XX:XX:XX:3b:45
> (SSID='MY_WIFI_NETWORK' freq=5180 MHz) athn0: Cancelling scan request
> athn0: State: SCANNING -> ASSOCIATING
> Limit connection to BSSID XX:XX:XX:XX:3b:45 freq=5180 MHz based on
> scan results (bssid_set=0 wps=0) PSK (set in config) -
> hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
> 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
> wpa_driver_bsd_set_drop_unencrypted: enabled=1
> wpa_driver_bsd_associate: set PRIVACY 1 athn0: Setting authentication
> timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> athn0: Event ASSOC (0) received
> athn0: State: ASSOCIATING -> ASSOCIATED
> athn0: Associated to a new BSS: BSSID=XX:XX:XX:XX:3b:45
> athn0: Associated with XX:XX:XX:XX:3b:45
> athn0: WPA: Association event - clear replay counter
> athn0: WPA: Clear old PTK
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: enable timer tick
> EAPOL: SUPP_BE entering state IDLE
> athn0: Setting authentication timeout: 10 sec 0 usec
> athn0: Cancelling scan request
> athn0: RX EAPOL from XX:XX:XX:XX:3b:45 (encrypted=-1)
> RX EAPOL - hexdump(len=99): [...REDACTED...]
> athn0: Setting authentication timeout: 10 sec 0 usec
> athn0: IEEE 802.1X RX: version=2 type=3 length=95
> WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
> athn0: EAPOL-Key type=2
> athn0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> athn0: key_length=16 key_data_length=0
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> athn0: WPA: RX message 1 of 4-Way Handshake from XX:XX:XX:XX:3b:45
> (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
> athn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
> Get randomness: len=32 entropy=11
> WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
> WPA: PTK derivation using PRF(SHA1)
> WPA: PTK derivation - A1=xx:xx:xx:xx:a9:b1 A2=XX:XX:XX:XX:3b:45
> WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
> WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=48): [REMOVED]
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: KEK - hexdump(len=16): [REMOVED]
> WPA: TK - hexdump(len=16): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
> WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
> athn0: WPA: Sending EAPOL-Key 2/4
> WPA: Send EAPOL-Key frame to XX:XX:XX:XX:3b:45 ver=2 mic_len=16
> key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
> WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
> athn0: RX EAPOL from XX:XX:XX:XX:3b:45 (encrypted=-1)
> RX EAPOL - hexdump(len=163): [...REDACTED...]
> athn0: IEEE 802.1X RX: version=2 type=3 length=159
> WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
> athn0: EAPOL-Key type=2
> athn0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
> MIC Secure Encr) athn0: key_length=16 key_data_length=64
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> WPA: EAPOL-Key MIC using HMAC-SHA1
> RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
> WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
> WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
> athn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> athn0: RSN: RX message 3 of 4-Way Handshake from XX:XX:XX:XX:3b:45
> (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
> WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
> WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
> WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
> athn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
> msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
> RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
> athn0: Request to deauthenticate - bssid=XX:XX:XX:XX:3b:45
> pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
> state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> bsd_send_mlme_param: op=3 reason=17 addr=XX:XX:XX:XX:3b:45 athn0:
> Event DEAUTH (11) received athn0: Deauthentication notification
> athn0: * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
> Deauthentication frame IE(s) - hexdump(len=0): [NULL] athn0:
> CTRL-EVENT-DISCONNECTED bssid=XX:XX:XX:XX:3b:45 reason=17
> locally_generated=1 athn0: Auto connect enabled: try to reconnect
> (wps=0/0 wpa_state=7) athn0: Setting scan request: 0.100000 sec
> athn0: Radio work 'connect'@0xb3528f40 done in 0.060213 seconds
> athn0: radio_work_free('connect'@0xb3528f40): num_active_works --> 0
> athn0: Added BSSID XX:XX:XX:XX:3b:45 into ignore list, ignoring for
> 10 seconds athn0: Another BSS in this ESS has been seen; try it next
> athn0: BSSID XX:XX:XX:XX:3b:45 ignore list count incremented to 2,
> ignoring for 10 seconds athn0: Consecutive connection failures: 2 -->
> request scan in 500 ms athn0: Ignore new scan request for 0.500000
> sec since an earlier request is scheduled to trigger sooner athn0:
> WPA: Clear old PMK and PTK athn0: Disconnect event - remove keys
> athn0: State: 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External
> notification - portEnabled=0 EAPOL: SUPP_PAE entering state
> DISCONNECTED EAPOL: Supplicant port status: Unauthorized
> EAPOL: SUPP_BE entering state INITIALIZE
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> athn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> QM: Clear all active DSCP policies
> athn0: CTRL-EVENT-DSCP-POLICY clear_all
> athn0: Ignore new scan request for 5.000000 sec since an earlier
> request is scheduled to trigger sooner athn0: Request to
> deauthenticate - bssid=00:00:00:00:00:00
> pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
> state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> athn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
> notification - portEnabled=0 EAPOL: External notification -
> portValid=0 QM: Clear all active DSCP policies athn0:
> CTRL-EVENT-DSCP-POLICY clear_all athn0: Ignore new scan request for
> 5.000000 sec since an earlier request is scheduled to trigger sooner
> athn0: Event DISASSOC (1) received athn0: Disassociation notification
> athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
> athn0: Do not request new immediate scan athn0: WPA: Clear old PMK
> and PTK athn0: Disconnect event - remove keys
> athn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> athn0: State: DISCONNECTED -> SCANNING
> athn0: Starting AP scan for wildcard SSID
> athn0: Optimize scan based on previously generated frequency list
> athn0: Add radio work 'scan'@0xb3528f40
> athn0: First radio work item in the queue - schedule start
> immediately athn0: Starting radio work 'scan'@0xb3528f40 after
> 0.009627 second wait wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> EAPOL: startWhen --> 0
> EAPOL: disable timer tick
> athn0: Event SCAN_RESULTS (3) received
> Received 2100 bytes of scan results (26 BSSes)
> athn0: BSS: Start scan result update 3
> BSS: last_scan_res_used=26/32
> athn0: New scan results available (own=0 ext=0)
> athn0: Radio work 'scan'@0xb3528f40 done in 7.745969 seconds
> athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
> athn0: Selecting BSS from priority group 0
> athn0: 0: XX:XX:XX:XX:3b:43 ssid='' wpa_ie_len=0 rsn_ie_len=20
> caps=0x10 level=63 freq=5180 athn0: skip - SSID not known
> athn0: 1: XX:XX:XX:XX:3b:45 ssid='MY_WIFI_NETWORK' wpa_ie_len=0
> rsn_ie_len=24 caps=0x11 level=59 freq=5180 athn0: skip - BSSID
> ignored (count=2 limit=0) athn0: 2: XX:XX:XX:XX:3b:44 ssid=''
> wpa_ie_len=0 rsn_ie_len=20 caps=0x10 level=55 freq=2412 athn0:
> skip - SSID not known athn0: 3: XX:XX:XX:XX:3b:46
> ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24 caps=0x31 level=51
> freq=2412 athn0: selected based on RSN IE athn0: MLD: No
> Multi-Link element athn0: selected BSS XX:XX:XX:XX:3b:46
> ssid='MY_WIFI_NETWORK' athn0: Considering connect request:
> reassociate: 0 selected: XX:XX:XX:XX:3b:46 bssid: 00:00:00:00:00:00
> pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0xb36b7000
> current_ssid=0x0 athn0: Request association with XX:XX:XX:XX:3b:46
> athn0: Re-association to the same ESS athn0: No ongoing scan/p2p-scan
> found to abort athn0: Add radio work 'connect'@0xb3528f40 athn0:
> First radio work item in the queue - schedule start immediately
> athn0: Starting radio work 'connect'@0xb3528f40 after 0.000055 second
> wait athn0: WPA: clearing own WPA/RSN IE athn0: RSN: clearing own
> RSNXE RSN: PMKSA cache search - network_ctx=0xb36b7000
> try_opportunistic=0 akmp=0x0 RSN: Search for BSSID XX:XX:XX:XX:3b:46
> RSN: No PMKSA cache entry found
> athn0: RSN: using IEEE 802.11i/D9.0
> athn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
> proto 2 athn0: WPA: Selected mgmt group cipher 32
> athn0: WPA: clearing AP WPA IE
> WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
> athn0: WPA: clearing AP RSNXE
> athn0: WPA: AP group 0x10 network profile group 0x18; available
> group 0x10 athn0: WPA: using GTK CCMP
> athn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
> available pairwise 0x10 athn0: WPA: using PTK CCMP
> athn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
> key_mgmt 0x2 athn0: WPA: using KEY_MGMT WPA-PSK
> athn0: WPA: AP mgmt_group_cipher 0x20 network profile
> mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 athn0: WPA:
> not using MGMT group cipher WPA: Set own WPA IE default -
> hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
> hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
> WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
> athn0: Automatic auth_alg selection: 0x1
> No supported operating classes IE to add
> athn0: Trying to associate with XX:XX:XX:XX:3b:46
> (SSID='MY_WIFI_NETWORK' freq=2412 MHz) athn0: Cancelling scan request
> athn0: State: SCANNING -> ASSOCIATING
> Limit connection to BSSID XX:XX:XX:XX:3b:46 freq=2412 MHz based on
> scan results (bssid_set=0 wps=0) PSK (set in config) -
> hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
> 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
> wpa_driver_bsd_set_drop_unencrypted: enabled=1
> wpa_driver_bsd_associate: set PRIVACY 1 athn0: Setting authentication
> timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> athn0: Event ASSOC (0) received
> athn0: State: ASSOCIATING -> ASSOCIATED
> athn0: Associated to a new BSS: BSSID=XX:XX:XX:XX:3b:46
> athn0: Associated with XX:XX:XX:XX:3b:46
> athn0: WPA: Association event - clear replay counter
> athn0: WPA: Clear old PTK
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: enable timer tick
> EAPOL: SUPP_BE entering state IDLE
> athn0: Setting authentication timeout: 10 sec 0 usec
> athn0: Cancelling scan request
> athn0: RX EAPOL from XX:XX:XX:XX:3b:46 (encrypted=-1)
> RX EAPOL - hexdump(len=99): [...REDACTED...]
> athn0: Setting authentication timeout: 10 sec 0 usec
> athn0: IEEE 802.1X RX: version=2 type=3 length=95
> WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
> athn0: EAPOL-Key type=2
> athn0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> athn0: key_length=16 key_data_length=0
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> athn0: WPA: RX message 1 of 4-Way Handshake from XX:XX:XX:XX:3b:46
> (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
> athn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
> Get randomness: len=32 entropy=11
> WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
> WPA: PTK derivation using PRF(SHA1)
> WPA: PTK derivation - A1=xx:xx:xx:xx:a9:b1 A2=XX:XX:XX:XX:3b:46
> WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
> WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=48): [REMOVED]
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: KEK - hexdump(len=16): [REMOVED]
> WPA: TK - hexdump(len=16): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
> WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
> athn0: WPA: Sending EAPOL-Key 2/4
> WPA: Send EAPOL-Key frame to XX:XX:XX:XX:3b:46 ver=2 mic_len=16
> key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
> WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
> athn0: RX EAPOL from XX:XX:XX:XX:3b:46 (encrypted=-1)
> RX EAPOL - hexdump(len=163): [...REDACTED...]
> athn0: IEEE 802.1X RX: version=2 type=3 length=159
> WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
> athn0: EAPOL-Key type=2
> athn0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
> MIC Secure Encr) athn0: key_length=16 key_data_length=64
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> WPA: EAPOL-Key MIC using HMAC-SHA1
> RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
> WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
> WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
> athn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> athn0: RSN: RX message 3 of 4-Way Handshake from XX:XX:XX:XX:3b:46
> (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
> WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
> WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
> WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
> athn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
> msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
> RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
> athn0: Request to deauthenticate - bssid=XX:XX:XX:XX:3b:46
> pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
> state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> bsd_send_mlme_param: op=3 reason=17 addr=XX:XX:XX:XX:3b:46 athn0:
> Event DEAUTH (11) received athn0: Deauthentication notification
> athn0: * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
> Deauthentication frame IE(s) - hexdump(len=0): [NULL] athn0:
> CTRL-EVENT-DISCONNECTED bssid=XX:XX:XX:XX:3b:46 reason=17
> locally_generated=1 athn0: Auto connect enabled: try to reconnect
> (wps=0/0 wpa_state=7) athn0: Setting scan request: 0.100000 sec
> athn0: Radio work 'connect'@0xb3528f40 done in 0.056304 seconds
> athn0: radio_work_free('connect'@0xb3528f40): num_active_works --> 0
> athn0: BSSID XX:XX:XX:XX:3b:46 ignore list count incremented to 3,
> ignoring for 60 seconds athn0: Consecutive connection failures: 3 -->
> request scan in 1000 ms athn0: Ignore new scan request for 1.000000
> sec since an earlier request is scheduled to trigger sooner athn0:
> WPA: Clear old PMK and PTK athn0: Disconnect event - remove keys
> athn0: State: 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External
> notification - portEnabled=0 EAPOL: SUPP_PAE entering state
> DISCONNECTED EAPOL: Supplicant port status: Unauthorized
> EAPOL: SUPP_BE entering state INITIALIZE
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> athn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> QM: Clear all active DSCP policies
> athn0: CTRL-EVENT-DSCP-POLICY clear_all
> athn0: Ignore new scan request for 5.000000 sec since an earlier
> request is scheduled to trigger sooner athn0: Request to
> deauthenticate - bssid=00:00:00:00:00:00
> pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
> state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> athn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
> notification - portEnabled=0 EAPOL: External notification -
> portValid=0 QM: Clear all active DSCP policies athn0:
> CTRL-EVENT-DSCP-POLICY clear_all athn0: Ignore new scan request for
> 5.000000 sec since an earlier request is scheduled to trigger sooner
> athn0: Event DISASSOC (1) received athn0: Disassociation notification
> athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
> athn0: Do not request new immediate scan athn0: WPA: Clear old PMK
> and PTK athn0: Disconnect event - remove keys
> athn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> athn0: State: DISCONNECTED -> SCANNING
> Scan SSID - hexdump_ascii(len=16):
> XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d MY_WIFI_NETWORK
> athn0: Starting AP scan for wildcard SSID (Interleave with specific)
> athn0: Add radio work 'scan'@0xb3528f40
> athn0: First radio work item in the queue - schedule start
> immediately athn0: Starting radio work 'scan'@0xb3528f40 after
> 0.000138 second wait wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> EAPOL: startWhen --> 0
> EAPOL: disable timer tick
> athn0: Event SCAN_RESULTS (3) received
> Received 2012 bytes of scan results (25 BSSes)
> athn0: BSS: Start scan result update 4
> BSS: last_scan_res_used=25/32
> athn0: New scan results available (own=0 ext=0)
> athn0: Radio work 'scan'@0xb3528f40 done in 7.745189 seconds
> athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
> athn0: Selecting BSS from priority group 0
> athn0: 0: XX:XX:XX:XX:3b:43 ssid='' wpa_ie_len=0 rsn_ie_len=20
> caps=0x10 level=64 freq=5180 athn0: skip - SSID not known
> athn0: 1: XX:XX:XX:XX:3b:45 ssid='MY_WIFI_NETWORK' wpa_ie_len=0
> rsn_ie_len=24 caps=0x11 level=63 freq=5180 athn0: selected based
> on RSN IE athn0: MLD: No Multi-Link element
> athn0: selected BSS XX:XX:XX:XX:3b:45 ssid='MY_WIFI_NETWORK'
> athn0: Considering connect request: reassociate: 0 selected:
> XX:XX:XX:XX:3b:45 bssid: 00:00:00:00:00:00 pending:
> 00:00:00:00:00:00 wpa_state: SCANNING ssid=0xb36b7000
> current_ssid=0x0 athn0: Request association with XX:XX:XX:XX:3b:45
> athn0: Re-association to the same ESS athn0: No ongoing scan/p2p-scan
> found to abort athn0: Add radio work 'connect'@0xb3528f40 athn0:
> First radio work item in the queue - schedule start immediately
> athn0: Starting radio work 'connect'@0xb3528f40 after 0.000154 second
> wait athn0: WPA: clearing own WPA/RSN IE athn0: RSN: clearing own
> RSNXE RSN: PMKSA cache search - network_ctx=0xb36b7000
> try_opportunistic=0 akmp=0x0 RSN: Search for BSSID XX:XX:XX:XX:3b:45
> RSN: No PMKSA cache entry found
> athn0: RSN: using IEEE 802.11i/D9.0
> athn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
> proto 2 athn0: WPA: Selected mgmt group cipher 32
> athn0: WPA: clearing AP WPA IE
> WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
> athn0: WPA: clearing AP RSNXE
> athn0: WPA: AP group 0x10 network profile group 0x18; available
> group 0x10 athn0: WPA: using GTK CCMP
> athn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
> available pairwise 0x10 athn0: WPA: using PTK CCMP
> athn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
> key_mgmt 0x2 athn0: WPA: using KEY_MGMT WPA-PSK
> athn0: WPA: AP mgmt_group_cipher 0x20 network profile
> mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 athn0: WPA:
> not using MGMT group cipher WPA: Set own WPA IE default -
> hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
> hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
> WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
> athn0: Automatic auth_alg selection: 0x1
> No supported operating classes IE to add
> athn0: Trying to associate with XX:XX:XX:XX:3b:45
> (SSID='MY_WIFI_NETWORK' freq=5180 MHz) athn0: Cancelling scan request
> athn0: State: SCANNING -> ASSOCIATING
> Limit connection to BSSID XX:XX:XX:XX:3b:45 freq=5180 MHz based on
> scan results (bssid_set=0 wps=0) PSK (set in config) -
> hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
> 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
> wpa_driver_bsd_set_drop_unencrypted: enabled=1
> wpa_driver_bsd_associate: set PRIVACY 1 athn0: Setting authentication
> timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> athn0: Event ASSOC (0) received
> athn0: State: ASSOCIATING -> ASSOCIATED
> athn0: Associated to a new BSS: BSSID=XX:XX:XX:XX:3b:45
> athn0: Associated with XX:XX:XX:XX:3b:45
> athn0: WPA: Association event - clear replay counter
> athn0: WPA: Clear old PTK
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: enable timer tick
> EAPOL: SUPP_BE entering state IDLE
> athn0: Setting authentication timeout: 10 sec 0 usec
> athn0: Cancelling scan request
> athn0: RX EAPOL from XX:XX:XX:XX:3b:45 (encrypted=-1)
> RX EAPOL - hexdump(len=99): [...REDACTED...]
> athn0: Setting authentication timeout: 10 sec 0 usec
> athn0: IEEE 802.1X RX: version=2 type=3 length=95
> WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
> athn0: EAPOL-Key type=2
> athn0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> athn0: key_length=16 key_data_length=0
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> athn0: WPA: RX message 1 of 4-Way Handshake from XX:XX:XX:XX:3b:45
> (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
> athn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
> Get randomness: len=32 entropy=11
> WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
> WPA: PTK derivation using PRF(SHA1)
> WPA: PTK derivation - A1=xx:xx:xx:xx:a9:b1 A2=XX:XX:XX:XX:3b:45
> WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
> WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=48): [REMOVED]
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: KEK - hexdump(len=16): [REMOVED]
> WPA: TK - hexdump(len=16): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
> WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
> athn0: WPA: Sending EAPOL-Key 2/4
> WPA: Send EAPOL-Key frame to XX:XX:XX:XX:3b:45 ver=2 mic_len=16
> key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
> WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
> athn0: RX EAPOL from XX:XX:XX:XX:3b:45 (encrypted=-1)
> RX EAPOL - hexdump(len=163): [...REDACTED...]
> athn0: IEEE 802.1X RX: version=2 type=3 length=159
> WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
> athn0: EAPOL-Key type=2
> athn0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
> MIC Secure Encr) athn0: key_length=16 key_data_length=64
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> WPA: EAPOL-Key MIC using HMAC-SHA1
> RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
> WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
> WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
> athn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> athn0: RSN: RX message 3 of 4-Way Handshake from XX:XX:XX:XX:3b:45
> (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
> WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
> WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
> WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
> athn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
> msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
> RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
> athn0: Request to deauthenticate - bssid=XX:XX:XX:XX:3b:45
> pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
> state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> bsd_send_mlme_param: op=3 reason=17 addr=XX:XX:XX:XX:3b:45 athn0:
> Event DEAUTH (11) received athn0: Deauthentication notification
> athn0: * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
> Deauthentication frame IE(s) - hexdump(len=0): [NULL] athn0:
> CTRL-EVENT-DISCONNECTED bssid=XX:XX:XX:XX:3b:45 reason=17
> locally_generated=1 athn0: Auto connect enabled: try to reconnect
> (wps=0/0 wpa_state=7) athn0: Setting scan request: 0.100000 sec
> athn0: Radio work 'connect'@0xb3528f40 done in 0.054246 seconds
> athn0: radio_work_free('connect'@0xb3528f40): num_active_works --> 0
> athn0: BSSID XX:XX:XX:XX:3b:45 ignore list count incremented to 3,
> ignoring for 60 seconds Continuous association failures - consider
> temporary network disabling athn0: CTRL-EVENT-SSID-TEMP-DISABLED id=0
> ssid="MY_WIFI_NETWORK" auth_failures=1 duration=10 reason=CONN_FAILED
> athn0: Consecutive connection failures: 4 --> request scan in 5000 ms
> athn0: Ignore new scan request for 5.000000 sec since an earlier
> request is scheduled to trigger sooner athn0: WPA: Clear old PMK and
> PTK athn0: Disconnect event - remove keys athn0: State:
> 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External notification -
> portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL:
> Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state
> INITIALIZE EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> athn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> QM: Clear all active DSCP policies
> athn0: CTRL-EVENT-DSCP-POLICY clear_all
> athn0: Ignore new scan request for 5.000000 sec since an earlier
> request is scheduled to trigger sooner athn0: Request to
> deauthenticate - bssid=00:00:00:00:00:00
> pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
> state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> athn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
> notification - portEnabled=0 EAPOL: External notification -
> portValid=0 QM: Clear all active DSCP policies athn0:
> CTRL-EVENT-DSCP-POLICY clear_all athn0: Ignore new scan request for
> 5.000000 sec since an earlier request is scheduled to trigger sooner
> athn0: Event DISASSOC (1) received athn0: Disassociation notification
> athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
> athn0: Do not request new immediate scan athn0: WPA: Clear old PMK
> and PTK athn0: Disconnect event - remove keys
> athn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> athn0: State: DISCONNECTED -> SCANNING
> Scan SSID - hexdump_ascii(len=16):
> XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d MY_WIFI_NETWORK
> athn0: Starting AP scan for specific SSID: MY_WIFI_NETWORK
> athn0: Add radio work 'scan'@0xb3528f40
> athn0: First radio work item in the queue - schedule start
> immediately athn0: Starting radio work 'scan'@0xb3528f40 after
> 0.000138 second wait wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> EAPOL: startWhen --> 0
> EAPOL: disable timer tick
> athn0: Event SCAN_RESULTS (3) received
> Received 1948 bytes of scan results (24 BSSes)
> athn0: BSS: Start scan result update 5
> athn0: BSS: Remove id 25 BSSID XX:XX:XX:XX:05:62 SSID '' due to no
> match in scan BSS: last_scan_res_used=24/32
> athn0: New scan results available (own=0 ext=0)
> athn0: Radio work 'scan'@0xb3528f40 done in 7.745460 seconds
> athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
> athn0: Postpone network selection by 3 seconds since all networks
> are disabled athn0: Try to associate due to network getting re-enabled
> athn0: CTRL-EVENT-SSID-REENABLED id=0 ssid="MY_WIFI_NETWORK"
> Mark BSSID XX:XX:XX:XX:3b:45 ignored to allow a lower priority BSS,
> if any, to be tried next athn0: BSSID XX:XX:XX:XX:3b:45 ignore list
> count incremented to 4, ignoring for 120 seconds athn0: Selecting BSS
> from priority group 0 athn0: 0: XX:XX:XX:XX:3b:43 ssid=''
> wpa_ie_len=0 rsn_ie_len=20 caps=0x10 level=65 freq=5180 athn0:
> skip - SSID not known athn0: 1: XX:XX:XX:XX:3b:45
> ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=64
> freq=5180 athn0: skip - BSSID ignored (count=4 limit=0) athn0: 2:
> XX:XX:XX:XX:3b:44 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x10
> level=56 freq=2412 athn0: skip - SSID not known athn0: 3:
> XX:XX:XX:XX:3b:46 ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24
> caps=0x31 level=54 freq=2412 athn0: skip - BSSID ignored (count=3
> limit=0) athn0: 4: XX:XX:XX:XX:a4:a5 ssid='MY_WIFI_NETWORK'
> wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=37 freq=5180 athn0:
> selected based on RSN IE athn0: MLD: No Multi-Link element athn0:
> selected BSS XX:XX:XX:XX:a4:a5 ssid='MY_WIFI_NETWORK' athn0:
> Considering connect request: reassociate: 0 selected:
> XX:XX:XX:XX:a4:a5 bssid: 00:00:00:00:00:00 pending:
> 00:00:00:00:00:00 wpa_state: SCANNING ssid=0xb36b7000
> current_ssid=0x0 athn0: Request association with XX:XX:XX:XX:a4:a5
> athn0: Re-association to the same ESS athn0: No ongoing scan/p2p-scan
> found to abort athn0: Add radio work 'connect'@0xb3528f40 athn0:
> First radio work item in the queue - schedule start immediately
> athn0: Starting radio work 'connect'@0xb3528f40 after 0.000136 second
> wait athn0: WPA: clearing own WPA/RSN IE athn0: RSN: clearing own
> RSNXE RSN: PMKSA cache search - network_ctx=0xb36b7000
> try_opportunistic=0 akmp=0x0 RSN: Search for BSSID XX:XX:XX:XX:a4:a5
> RSN: No PMKSA cache entry found athn0: RSN: using IEEE 802.11i/D9.0
> athn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
> proto 2 athn0: WPA: Selected mgmt group cipher 32
> athn0: WPA: clearing AP WPA IE
> WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
> athn0: WPA: clearing AP RSNXE
> athn0: WPA: AP group 0x10 network profile group 0x18; available
> group 0x10 athn0: WPA: using GTK CCMP
> athn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
> available pairwise 0x10 athn0: WPA: using PTK CCMP
> athn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
> key_mgmt 0x2 athn0: WPA: using KEY_MGMT WPA-PSK
> athn0: WPA: AP mgmt_group_cipher 0x20 network profile
> mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 athn0: WPA:
> not using MGMT group cipher WPA: Set own WPA IE default -
> hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
> hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
> WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
> athn0: Automatic auth_alg selection: 0x1
> No supported operating classes IE to add
> athn0: Trying to associate with XX:XX:XX:XX:a4:a5
> (SSID='MY_WIFI_NETWORK' freq=5180 MHz) athn0: Cancelling scan request
> athn0: State: SCANNING -> ASSOCIATING
> Limit connection to BSSID XX:XX:XX:XX:a4:a5 freq=5180 MHz based on
> scan results (bssid_set=0 wps=0) PSK (set in config) -
> hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
> 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
> wpa_driver_bsd_set_drop_unencrypted: enabled=1
> wpa_driver_bsd_associate: set PRIVACY 1 athn0: Setting authentication
> timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> athn0: Event ASSOC (0) received
> athn0: State: ASSOCIATING -> ASSOCIATED
> athn0: Associated to a new BSS: BSSID=XX:XX:XX:XX:a4:a5
> athn0: Associated with XX:XX:XX:XX:a4:a5
> athn0: WPA: Association event - clear replay counter
> athn0: WPA: Clear old PTK
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: enable timer tick
> EAPOL: SUPP_BE entering state IDLE
> athn0: Setting authentication timeout: 10 sec 0 usec
> athn0: Cancelling scan request
> athn0: RX EAPOL from XX:XX:XX:XX:a4:a5 (encrypted=-1)
> RX EAPOL - hexdump(len=99): [...REDACTED...]
> athn0: Setting authentication timeout: 10 sec 0 usec
> athn0: IEEE 802.1X RX: version=2 type=3 length=95
> WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
> athn0: EAPOL-Key type=2
> athn0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> athn0: key_length=16 key_data_length=0
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> athn0: WPA: RX message 1 of 4-Way Handshake from XX:XX:XX:XX:a4:a5
> (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
> athn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
> Get randomness: len=32 entropy=11
> WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
> WPA: PTK derivation using PRF(SHA1)
> WPA: PTK derivation - A1=xx:xx:xx:xx:a9:b1 A2=XX:XX:XX:XX:a4:a5
> WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
> WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=48): [REMOVED]
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: KEK - hexdump(len=16): [REMOVED]
> WPA: TK - hexdump(len=16): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
> WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
> athn0: WPA: Sending EAPOL-Key 2/4
> WPA: Send EAPOL-Key frame to XX:XX:XX:XX:a4:a5 ver=2 mic_len=16
> key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
> WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
> athn0: RX EAPOL from XX:XX:XX:XX:a4:a5 (encrypted=-1)
> RX EAPOL - hexdump(len=163): [...REDACTED...]
> athn0: IEEE 802.1X RX: version=2 type=3 length=159
> WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
> athn0: EAPOL-Key type=2
> athn0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
> MIC Secure Encr) athn0: key_length=16 key_data_length=64
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> WPA: EAPOL-Key MIC using HMAC-SHA1
> RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
> WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
> WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
> athn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> athn0: RSN: RX message 3 of 4-Way Handshake from XX:XX:XX:XX:a4:a5
> (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
> WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
> WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
> WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
> athn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
> msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
> RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
> athn0: Request to deauthenticate - bssid=XX:XX:XX:XX:a4:a5
> pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
> state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> bsd_send_mlme_param: op=3 reason=17 addr=XX:XX:XX:XX:a4:a5 athn0:
> Event DEAUTH (11) received athn0: Deauthentication notification
> athn0: * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
> Deauthentication frame IE(s) - hexdump(len=0): [NULL] athn0:
> CTRL-EVENT-DISCONNECTED bssid=XX:XX:XX:XX:a4:a5 reason=17
> locally_generated=1 athn0: Auto connect enabled: try to reconnect
> (wps=0/0 wpa_state=7) athn0: Setting scan request: 0.100000 sec
> athn0: Radio work 'connect'@0xb3528f40 done in 0.073545 seconds
> athn0: radio_work_free('connect'@0xb3528f40): num_active_works --> 0
> athn0: Added BSSID XX:XX:XX:XX:a4:a5 into ignore list, ignoring for
> 10 seconds athn0: Another BSS in this ESS has been seen; try it next
> athn0: BSSID XX:XX:XX:XX:a4:a5 ignore list count incremented to 2,
> ignoring for 10 seconds Continuous association failures - consider
> temporary network disabling athn0: CTRL-EVENT-SSID-TEMP-DISABLED id=0
> ssid="MY_WIFI_NETWORK" auth_failures=2 duration=31 reason=CONN_FAILED
> athn0: Consecutive connection failures: 5 --> request scan in 10000
> ms athn0: Ignore new scan request for 10.000000 sec since an earlier
> request is scheduled to trigger sooner athn0: WPA: Clear old PMK and
> PTK athn0: Disconnect event - remove keys athn0: State:
> 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External notification -
> portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL:
> Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state
> INITIALIZE EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> athn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> QM: Clear all active DSCP policies
> athn0: CTRL-EVENT-DSCP-POLICY clear_all
> athn0: Ignore new scan request for 5.000000 sec since an earlier
> request is scheduled to trigger sooner athn0: Request to
> deauthenticate - bssid=00:00:00:00:00:00
> pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
> state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> athn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
> notification - portEnabled=0 EAPOL: External notification -
> portValid=0 QM: Clear all active DSCP policies athn0:
> CTRL-EVENT-DSCP-POLICY clear_all athn0: Ignore new scan request for
> 5.000000 sec since an earlier request is scheduled to trigger sooner
> athn0: Event DISASSOC (1) received athn0: Disassociation notification
> athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
> athn0: Do not request new immediate scan athn0: WPA: Clear old PMK
> and PTK athn0: Disconnect event - remove keys
> athn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> athn0: State: DISCONNECTED -> SCANNING
> athn0: Starting AP scan for wildcard SSID
> athn0: Optimize scan based on previously generated frequency list
> athn0: Add radio work 'scan'@0xb3528f40
> athn0: First radio work item in the queue - schedule start
> immediately athn0: Starting radio work 'scan'@0xb3528f40 after
> 0.000137 second wait wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> EAPOL: startWhen --> 0
> EAPOL: disable timer tick
> athn0: Event SCAN_RESULTS (3) received
> Received 1860 bytes of scan results (23 BSSes)
> athn0: BSS: Start scan result update 6
> athn0: BSS: Add new id 26 BSSID XX:XX:XX:XX:05:62 SSID '' freq 2412
> BSS: last_scan_res_used=23/32
> athn0: New scan results available (own=0 ext=0)
> athn0: Radio work 'scan'@0xb3528f40 done in 7.754577 seconds
> athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
> athn0: Postpone network selection by 23 seconds since all networks
> are disabled athn0: Try to associate due to network getting re-enabled
> Fast associate: Old scan results
> athn0: Setting scan request: 0.000000 sec
> Scan SSID - hexdump_ascii(len=16):
> XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d MY_WIFI_NETWORK
> athn0: Starting AP scan for wildcard SSID (Interleave with specific)
> athn0: Add radio work 'scan'@0xb3528f40
> athn0: First radio work item in the queue - schedule start
> immediately athn0: Starting radio work 'scan'@0xb3528f40 after
> 0.000137 second wait wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> athn0: Event SCAN_RESULTS (3) received
> Received 2100 bytes of scan results (26 BSSes)
> athn0: BSS: Start scan result update 7
> BSS: last_scan_res_used=26/32
> athn0: New scan results available (own=0 ext=0)
> athn0: Radio work 'scan'@0xb3528f40 done in 7.624621 seconds
> athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
> athn0: CTRL-EVENT-SSID-REENABLED id=0 ssid="MY_WIFI_NETWORK"
> Mark BSSID XX:XX:XX:XX:a4:a5 ignored to allow a lower priority BSS,
> if any, to be tried next athn0: BSSID XX:XX:XX:XX:a4:a5 ignore list
> count incremented to 3, ignoring for 60 seconds athn0: Selecting BSS
> from priority group 0 athn0: 0: XX:XX:XX:XX:3b:43 ssid=''
> wpa_ie_len=0 rsn_ie_len=20 caps=0x10 level=65 freq=5180 athn0:
> skip - SSID not known athn0: 1: XX:XX:XX:XX:3b:45
> ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=60
> freq=5180 athn0: skip - BSSID ignored (count=4 limit=0) athn0: 2:
> XX:XX:XX:XX:3b:44 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x10
> level=56 freq=2412 athn0: skip - SSID not known athn0: 3:
> XX:XX:XX:XX:3b:46 ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24
> caps=0x31 level=52 freq=2412 athn0: skip - BSSID ignored (count=3
> limit=0) athn0: 4: XX:XX:XX:XX:a4:a3 ssid='' wpa_ie_len=0
> rsn_ie_len=20 caps=0x10 level=38 freq=5180 athn0: skip - SSID not
> known athn0: 5: XX:XX:XX:XX:a4:a5 ssid='MY_WIFI_NETWORK' wpa_ie_len=0
> rsn_ie_len=24 caps=0x11 level=37 freq=5180 athn0: skip - BSSID
> ignored (count=3 limit=0) athn0: 6: XX:XX:XX:XX:a4:a4 ssid=''
> wpa_ie_len=0 rsn_ie_len=20 caps=0x10 level=38 freq=2412 athn0:
> skip - SSID not known athn0: 7: XX:XX:XX:XX:a4:a6
> ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24 caps=0x31 level=38
> freq=2412 athn0: selected based on RSN IE athn0: MLD: No
> Multi-Link element athn0: selected BSS XX:XX:XX:XX:a4:a6
> ssid='MY_WIFI_NETWORK' athn0: Considering connect request:
> reassociate: 0 selected: XX:XX:XX:XX:a4:a6 bssid: 00:00:00:00:00:00
> pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0xb36b7000
> current_ssid=0x0 athn0: Request association with XX:XX:XX:XX:a4:a6
> athn0: Re-association to the same ESS athn0: No ongoing scan/p2p-scan
> found to abort athn0: Add radio work 'connect'@0xb3528f40 athn0:
> First radio work item in the queue - schedule start immediately
> athn0: Starting radio work 'connect'@0xb3528f40 after 0.000054 second
> wait athn0: WPA: clearing own WPA/RSN IE athn0: RSN: clearing own
> RSNXE RSN: PMKSA cache search - network_ctx=0xb36b7000
> try_opportunistic=0 akmp=0x0 RSN: Search for BSSID XX:XX:XX:XX:a4:a6
> RSN: No PMKSA cache entry found athn0: RSN: using IEEE 802.11i/D9.0
> athn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
> proto 2 athn0: WPA: Selected mgmt group cipher 32
> athn0: WPA: clearing AP WPA IE
> WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
> athn0: WPA: clearing AP RSNXE
> athn0: WPA: AP group 0x10 network profile group 0x18; available
> group 0x10 athn0: WPA: using GTK CCMP
> athn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
> available pairwise 0x10 athn0: WPA: using PTK CCMP
> athn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
> key_mgmt 0x2 athn0: WPA: using KEY_MGMT WPA-PSK
> athn0: WPA: AP mgmt_group_cipher 0x20 network profile
> mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 athn0: WPA:
> not using MGMT group cipher WPA: Set own WPA IE default -
> hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
> hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
> WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
> athn0: Automatic auth_alg selection: 0x1
> No supported operating classes IE to add
> athn0: Trying to associate with XX:XX:XX:XX:a4:a6
> (SSID='MY_WIFI_NETWORK' freq=2412 MHz) athn0: Cancelling scan request
> athn0: State: SCANNING -> ASSOCIATING
> Limit connection to BSSID XX:XX:XX:XX:a4:a6 freq=2412 MHz based on
> scan results (bssid_set=0 wps=0) PSK (set in config) -
> hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
> 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
> wpa_driver_bsd_set_drop_unencrypted: enabled=1
> wpa_driver_bsd_associate: set PRIVACY 1 athn0: Setting authentication
> timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> athn0: Event ASSOC (0) received
> athn0: State: ASSOCIATING -> ASSOCIATED
> athn0: Associated to a new BSS: BSSID=XX:XX:XX:XX:a4:a6
> athn0: Associated with XX:XX:XX:XX:a4:a6
> athn0: WPA: Association event - clear replay counter
> athn0: WPA: Clear old PTK
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: enable timer tick
> EAPOL: SUPP_BE entering state IDLE
> athn0: Setting authentication timeout: 10 sec 0 usec
> athn0: Cancelling scan request
> athn0: RX EAPOL from XX:XX:XX:XX:a4:a6 (encrypted=-1)
> RX EAPOL - hexdump(len=99): [...REDACTED...]
> athn0: Setting authentication timeout: 10 sec 0 usec
> athn0: IEEE 802.1X RX: version=2 type=3 length=95
> WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
> athn0: EAPOL-Key type=2
> athn0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> athn0: key_length=16 key_data_length=0
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> athn0: WPA: RX message 1 of 4-Way Handshake from XX:XX:XX:XX:a4:a6
> (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
> athn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
> Get randomness: len=32 entropy=21
> WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
> WPA: PTK derivation using PRF(SHA1)
> WPA: PTK derivation - A1=xx:xx:xx:xx:a9:b1 A2=XX:XX:XX:XX:a4:a6
> WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
> WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=48): [REMOVED]
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: KEK - hexdump(len=16): [REMOVED]
> WPA: TK - hexdump(len=16): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
> WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
> athn0: WPA: Sending EAPOL-Key 2/4
> WPA: Send EAPOL-Key frame to XX:XX:XX:XX:a4:a6 ver=2 mic_len=16
> key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
> WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
> athn0: RX EAPOL from XX:XX:XX:XX:a4:a6 (encrypted=-1)
> RX EAPOL - hexdump(len=163): [...REDACTED...]
> athn0: IEEE 802.1X RX: version=2 type=3 length=159
> WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
> athn0: EAPOL-Key type=2
> athn0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
> MIC Secure Encr) athn0: key_length=16 key_data_length=64
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> WPA: EAPOL-Key MIC using HMAC-SHA1
> RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
> WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
> WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
> athn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> athn0: RSN: RX message 3 of 4-Way Handshake from XX:XX:XX:XX:a4:a6
> (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
> WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
> WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
> WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
> athn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
> msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
> RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
> athn0: Request to deauthenticate - bssid=XX:XX:XX:XX:a4:a6
> pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
> state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> bsd_send_mlme_param: op=3 reason=17 addr=XX:XX:XX:XX:a4:a6 athn0:
> Event DEAUTH (11) received athn0: Deauthentication notification
> athn0: * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
> Deauthentication frame IE(s) - hexdump(len=0): [NULL] athn0:
> CTRL-EVENT-DISCONNECTED bssid=XX:XX:XX:XX:a4:a6 reason=17
> locally_generated=1 athn0: Auto connect enabled: try to reconnect
> (wps=0/0 wpa_state=7) athn0: Setting scan request: 0.100000 sec
> athn0: Radio work 'connect'@0xb3528f40 done in 0.056066 seconds
> athn0: radio_work_free('connect'@0xb3528f40): num_active_works --> 0
> athn0: Added BSSID XX:XX:XX:XX:a4:a6 into ignore list, ignoring for
> 10 seconds athn0: Another BSS in this ESS has been seen; try it next
> athn0: BSSID XX:XX:XX:XX:a4:a6 ignore list count incremented to 2,
> ignoring for 10 seconds Continuous association failures - consider
> temporary network disabling athn0: CTRL-EVENT-SSID-TEMP-DISABLED id=0
> ssid="MY_WIFI_NETWORK" auth_failures=3 duration=56 reason=CONN_FAILED
> athn0: Consecutive connection failures: 6 --> request scan in 10000
> ms athn0: Ignore new scan request for 10.000000 sec since an earlier
> request is scheduled to trigger sooner athn0: WPA: Clear old PMK and
> PTK athn0: Disconnect event - remove keys athn0: State:
> 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External notification -
> portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL:
> Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state
> INITIALIZE EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> athn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> QM: Clear all active DSCP policies
> athn0: CTRL-EVENT-DSCP-POLICY clear_all
> athn0: Ignore new scan request for 5.000000 sec since an earlier
> request is scheduled to trigger sooner athn0: Request to
> deauthenticate - bssid=00:00:00:00:00:00
> pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
> state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> athn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
> notification - portEnabled=0 EAPOL: External notification -
> portValid=0 QM: Clear all active DSCP policies athn0:
> CTRL-EVENT-DSCP-POLICY clear_all athn0: Ignore new scan request for
> 5.000000 sec since an earlier request is scheduled to trigger sooner
> athn0: Event DISASSOC (1) received athn0: Disassociation notification
> athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
> athn0: Do not request new immediate scan athn0: WPA: Clear old PMK
> and PTK athn0: Disconnect event - remove keys
> athn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> athn0: State: DISCONNECTED -> SCANNING
> Scan SSID - hexdump_ascii(len=16):
> XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d MY_WIFI_NETWORK
> athn0: Starting AP scan for specific SSID: MY_WIFI_NETWORK
> athn0: Optimize scan based on previously generated frequency list
> athn0: Add radio work 'scan'@0xb3528f40
> athn0: First radio work item in the queue - schedule start
> immediately athn0: Starting radio work 'scan'@0xb3528f40 after
> 0.000137 second wait wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> EAPOL: startWhen --> 0
> EAPOL: disable timer tick
> athn0: Event SCAN_RESULTS (3) received
> Received 2012 bytes of scan results (25 BSSes)
> athn0: BSS: Start scan result update 8
> BSS: last_scan_res_used=25/32
> athn0: New scan results available (own=0 ext=0)
> athn0: Radio work 'scan'@0xb3528f40 done in 7.745099 seconds
> athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
> athn0: Postpone network selection by 48 seconds since all networks
> are disabled athn0: Try to associate due to network getting re-enabled
> Fast associate: Old scan results
> athn0: Setting scan request: 0.000000 sec
> athn0: Starting AP scan for wildcard SSID
> athn0: Add radio work 'scan'@0xb3528f40
> athn0: First radio work item in the queue - schedule start
> immediately athn0: Starting radio work 'scan'@0xb3528f40 after
> 0.000036 second wait wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> athn0: Event SCAN_RESULTS (3) received
> Received 2200 bytes of scan results (27 BSSes)
> athn0: BSS: Start scan result update 9
> athn0: BSS: Add new id 27 BSSID XX:XX:XX:XX:ed:90 SSID
> 'OTHERNETWORK' freq 2442 BSS: last_scan_res_used=27/32
> athn0: New scan results available (own=0 ext=0)
> athn0: Radio work 'scan'@0xb3528f40 done in 7.625546 seconds
> athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
> athn0: CTRL-EVENT-SSID-REENABLED id=0 ssid="MY_WIFI_NETWORK"
> Mark BSSID XX:XX:XX:XX:a4:a6 ignored to allow a lower priority BSS,
> if any, to be tried next athn0: BSSID XX:XX:XX:XX:a4:a6 ignore list
> count incremented to 3, ignoring for 60 seconds athn0: Selecting BSS
> from priority group 0 athn0: 0: XX:XX:XX:XX:3b:45
> ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=65
> freq=5180 athn0: skip - BSSID ignored (count=4 limit=0) athn0: 1:
> XX:XX:XX:XX:3b:43 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x10
> level=64 freq=5180 athn0: skip - SSID not known athn0: 2:
> XX:XX:XX:XX:3b:46 ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24
> caps=0x31 level=65 freq=2412 athn0: selected based on RSN IE
> athn0: MLD: No Multi-Link element athn0: selected BSS
> XX:XX:XX:XX:3b:46 ssid='MY_WIFI_NETWORK' athn0: Considering connect
> request: reassociate: 0 selected: XX:XX:XX:XX:3b:46 bssid:
> 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
> ssid=0xb36b7000 current_ssid=0x0 athn0: Request association with
> XX:XX:XX:XX:3b:46 athn0: Re-association to the same ESS athn0: No
> ongoing scan/p2p-scan found to abort athn0: Add radio work
> 'connect'@0xb3528f40 athn0: First radio work item in the queue -
> schedule start immediately athn0: Starting radio work
> 'connect'@0xb3528f40 after 0.000055 second wait athn0: WPA: clearing
> own WPA/RSN IE athn0: RSN: clearing own RSNXE RSN: PMKSA cache search
> - network_ctx=0xb36b7000 try_opportunistic=0 akmp=0x0 RSN: Search for
> BSSID XX:XX:XX:XX:3b:46 RSN: No PMKSA cache entry found
> athn0: RSN: using IEEE 802.11i/D9.0
> athn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
> proto 2 athn0: WPA: Selected mgmt group cipher 32
> athn0: WPA: clearing AP WPA IE
> WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
> athn0: WPA: clearing AP RSNXE
> athn0: WPA: AP group 0x10 network profile group 0x18; available
> group 0x10 athn0: WPA: using GTK CCMP
> athn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
> available pairwise 0x10 athn0: WPA: using PTK CCMP
> athn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
> key_mgmt 0x2 athn0: WPA: using KEY_MGMT WPA-PSK
> athn0: WPA: AP mgmt_group_cipher 0x20 network profile
> mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 athn0: WPA:
> not using MGMT group cipher WPA: Set own WPA IE default -
> hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
> hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
> WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
> athn0: Automatic auth_alg selection: 0x1
> No supported operating classes IE to add
> athn0: Trying to associate with XX:XX:XX:XX:3b:46
> (SSID='MY_WIFI_NETWORK' freq=2412 MHz) athn0: Cancelling scan request
> athn0: State: SCANNING -> ASSOCIATING
> Limit connection to BSSID XX:XX:XX:XX:3b:46 freq=2412 MHz based on
> scan results (bssid_set=0 wps=0) PSK (set in config) -
> hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
> 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
> wpa_driver_bsd_set_drop_unencrypted: enabled=1
> wpa_driver_bsd_associate: set PRIVACY 1 athn0: Setting authentication
> timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> athn0: Event ASSOC (0) received
> athn0: State: ASSOCIATING -> ASSOCIATED
> athn0: Associated to a new BSS: BSSID=XX:XX:XX:XX:3b:46
> athn0: Associated with XX:XX:XX:XX:3b:46
> athn0: WPA: Association event - clear replay counter
> athn0: WPA: Clear old PTK
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: enable timer tick
> EAPOL: SUPP_BE entering state IDLE
> athn0: Setting authentication timeout: 10 sec 0 usec
> athn0: Cancelling scan request
> athn0: RX EAPOL from XX:XX:XX:XX:3b:46 (encrypted=-1)
> RX EAPOL - hexdump(len=99): [...REDACTED...]
> athn0: Setting authentication timeout: 10 sec 0 usec
> athn0: IEEE 802.1X RX: version=2 type=3 length=95
> WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
> athn0: EAPOL-Key type=2
> athn0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> athn0: key_length=16 key_data_length=0
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> athn0: WPA: RX message 1 of 4-Way Handshake from XX:XX:XX:XX:3b:46
> (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
> athn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
> Get randomness: len=32 entropy=21
> WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
> WPA: PTK derivation using PRF(SHA1)
> WPA: PTK derivation - A1=xx:xx:xx:xx:a9:b1 A2=XX:XX:XX:XX:3b:46
> WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
> WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=48): [REMOVED]
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: KEK - hexdump(len=16): [REMOVED]
> WPA: TK - hexdump(len=16): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
> WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
> athn0: WPA: Sending EAPOL-Key 2/4
> WPA: Send EAPOL-Key frame to XX:XX:XX:XX:3b:46 ver=2 mic_len=16
> key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
> WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
> athn0: RX EAPOL from XX:XX:XX:XX:3b:46 (encrypted=-1)
> RX EAPOL - hexdump(len=163): [...REDACTED...]
> athn0: IEEE 802.1X RX: version=2 type=3 length=159
> WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
> athn0: EAPOL-Key type=2
> athn0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
> MIC Secure Encr) athn0: key_length=16 key_data_length=64
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> WPA: EAPOL-Key MIC using HMAC-SHA1
> RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
> WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
> WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
> athn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> athn0: RSN: RX message 3 of 4-Way Handshake from XX:XX:XX:XX:3b:46
> (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
> WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
> WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
> WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
> athn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
> msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
> RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
> athn0: Request to deauthenticate - bssid=XX:XX:XX:XX:3b:46
> pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
> state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> bsd_send_mlme_param: op=3 reason=17 addr=XX:XX:XX:XX:3b:46 athn0:
> Event DEAUTH (11) received athn0: Deauthentication notification
> athn0: * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
> Deauthentication frame IE(s) - hexdump(len=0): [NULL] athn0:
> CTRL-EVENT-DISCONNECTED bssid=XX:XX:XX:XX:3b:46 reason=17
> locally_generated=1 athn0: Auto connect enabled: try to reconnect
> (wps=0/0 wpa_state=7) athn0: Setting scan request: 0.100000 sec
> athn0: Radio work 'connect'@0xb3528f40 done in 0.056098 seconds
> athn0: radio_work_free('connect'@0xb3528f40): num_active_works --> 0
> athn0: BSSID XX:XX:XX:XX:3b:46 ignore list count incremented to 4,
> ignoring for 120 seconds Continuous association failures - consider
> temporary network disabling athn0: CTRL-EVENT-SSID-TEMP-DISABLED id=0
> ssid="MY_WIFI_NETWORK" auth_failures=4 duration=86 reason=CONN_FAILED
> athn0: Consecutive connection failures: 7 --> request scan in 10000
> ms athn0: Ignore new scan request for 10.000000 sec since an earlier
> request is scheduled to trigger sooner athn0: WPA: Clear old PMK and
> PTK athn0: Disconnect event - remove keys athn0: State:
> 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External notification -
> portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL:
> Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state
> INITIALIZE EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> athn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> QM: Clear all active DSCP policies
> athn0: CTRL-EVENT-DSCP-POLICY clear_all
> athn0: Ignore new scan request for 5.000000 sec since an earlier
> request is scheduled to trigger sooner athn0: Request to
> deauthenticate - bssid=00:00:00:00:00:00
> pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
> state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> athn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
> notification - portEnabled=0 EAPOL: External notification -
> portValid=0 QM: Clear all active DSCP policies athn0:
> CTRL-EVENT-DSCP-POLICY clear_all athn0: Ignore new scan request for
> 5.000000 sec since an earlier request is scheduled to trigger sooner
> athn0: Event DISASSOC (1) received athn0: Disassociation notification
> athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
> athn0: Do not request new immediate scan athn0: WPA: Clear old PMK
> and PTK athn0: Disconnect event - remove keys
> athn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> athn0: State: DISCONNECTED -> SCANNING
> Scan SSID - hexdump_ascii(len=16):
> XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d MY_WIFI_NETWORK
> athn0: Starting AP scan for wildcard SSID (Interleave with specific)
> athn0: Add radio work 'scan'@0xb3528f40
> athn0: First radio work item in the queue - schedule start
> immediately athn0: Starting radio work 'scan'@0xb3528f40 after
> 0.000138 second wait wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> EAPOL: startWhen --> 0
> EAPOL: disable timer tick
> athn0: Event SCAN_RESULTS (3) received
> Received 2200 bytes of scan results (27 BSSes)
> athn0: BSS: Start scan result update 10
> BSS: last_scan_res_used=27/32
> athn0: New scan results available (own=0 ext=0)
> athn0: Radio work 'scan'@0xb3528f40 done in 7.745269 seconds
> athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
> athn0: Postpone network selection by 79 seconds since all networks
> are disabled athn0: Try to associate due to network getting re-enabled
> Fast associate: Old scan results
> athn0: Setting scan request: 0.000000 sec
> Scan SSID - hexdump_ascii(len=16):
> XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d MY_WIFI_NETWORK
> athn0: Starting AP scan for specific SSID: MY_WIFI_NETWORK
> athn0: Add radio work 'scan'@0xb3528f40
> athn0: First radio work item in the queue - schedule start
> immediately athn0: Starting radio work 'scan'@0xb3528f40 after
> 0.000137 second wait wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> athn0: Event SCAN_RESULTS (3) received
> Received 2100 bytes of scan results (26 BSSes)
> athn0: BSS: Start scan result update 11
> BSS: last_scan_res_used=26/32
> athn0: New scan results available (own=0 ext=0)
> athn0: Radio work 'scan'@0xb3528f40 done in 7.624696 seconds
> athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
> athn0: CTRL-EVENT-SSID-REENABLED id=0 ssid="MY_WIFI_NETWORK"
> Mark BSSID XX:XX:XX:XX:3b:46 ignored to allow a lower priority BSS,
> if any, to be tried next athn0: BSSID XX:XX:XX:XX:3b:46 ignore list
> count incremented to 5, ignoring for 600 seconds athn0: Selecting BSS
> from priority group 0 athn0: 0: XX:XX:XX:XX:3b:43 ssid=''
> wpa_ie_len=0 rsn_ie_len=20 caps=0x10 level=65 freq=5180 athn0:
> skip - SSID not known athn0: 1: XX:XX:XX:XX:3b:45
> ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=61
> freq=5180 athn0: selected based on RSN IE athn0: MLD: No
> Multi-Link element athn0: selected BSS XX:XX:XX:XX:3b:45
> ssid='MY_WIFI_NETWORK' athn0: Considering connect request:
> reassociate: 0 selected: XX:XX:XX:XX:3b:45 bssid: 00:00:00:00:00:00
> pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0xb36b7000
> current_ssid=0x0 athn0: Request association with XX:XX:XX:XX:3b:45
> athn0: Re-association to the same ESS athn0: No ongoing scan/p2p-scan
> found to abort athn0: Add radio work 'connect'@0xb3528f40 athn0:
> First radio work item in the queue - schedule start immediately
> athn0: Starting radio work 'connect'@0xb3528f40 after 0.000056 second
> wait athn0: WPA: clearing own WPA/RSN IE athn0: RSN: clearing own
> RSNXE RSN: PMKSA cache search - network_ctx=0xb36b7000
> try_opportunistic=0 akmp=0x0 RSN: Search for BSSID XX:XX:XX:XX:3b:45
> RSN: No PMKSA cache entry found
> athn0: RSN: using IEEE 802.11i/D9.0
> athn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
> proto 2 athn0: WPA: Selected mgmt group cipher 32
> athn0: WPA: clearing AP WPA IE
> WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
> athn0: WPA: clearing AP RSNXE
> athn0: WPA: AP group 0x10 network profile group 0x18; available
> group 0x10 athn0: WPA: using GTK CCMP
> athn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
> available pairwise 0x10 athn0: WPA: using PTK CCMP
> athn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
> key_mgmt 0x2 athn0: WPA: using KEY_MGMT WPA-PSK
> athn0: WPA: AP mgmt_group_cipher 0x20 network profile
> mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 athn0: WPA:
> not using MGMT group cipher WPA: Set own WPA IE default -
> hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
> hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
> WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
> athn0: Automatic auth_alg selection: 0x1
> No supported operating classes IE to add
> athn0: Trying to associate with XX:XX:XX:XX:3b:45
> (SSID='MY_WIFI_NETWORK' freq=5180 MHz) athn0: Cancelling scan request
> athn0: State: SCANNING -> ASSOCIATING
> Limit connection to BSSID XX:XX:XX:XX:3b:45 freq=5180 MHz based on
> scan results (bssid_set=0 wps=0) PSK (set in config) -
> hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
> 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
> wpa_driver_bsd_set_drop_unencrypted: enabled=1
> wpa_driver_bsd_associate: set PRIVACY 1 athn0: Setting authentication
> timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> athn0: Event ASSOC (0) received
> athn0: State: ASSOCIATING -> ASSOCIATED
> athn0: Associated to a new BSS: BSSID=XX:XX:XX:XX:3b:45
> athn0: Associated with XX:XX:XX:XX:3b:45
> athn0: WPA: Association event - clear replay counter
> athn0: WPA: Clear old PTK
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: enable timer tick
> EAPOL: SUPP_BE entering state IDLE
> athn0: Setting authentication timeout: 10 sec 0 usec
> athn0: Cancelling scan request
> athn0: RX EAPOL from XX:XX:XX:XX:3b:45 (encrypted=-1)
> RX EAPOL - hexdump(len=99): [...REDACTED...]
> athn0: Setting authentication timeout: 10 sec 0 usec
> athn0: IEEE 802.1X RX: version=2 type=3 length=95
> WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
> athn0: EAPOL-Key type=2
> athn0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> athn0: key_length=16 key_data_length=0
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> athn0: WPA: RX message 1 of 4-Way Handshake from XX:XX:XX:XX:3b:45
> (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
> athn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
> Get randomness: len=32 entropy=21
> WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
> WPA: PTK derivation using PRF(SHA1)
> WPA: PTK derivation - A1=xx:xx:xx:xx:a9:b1 A2=XX:XX:XX:XX:3b:45
> WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
> WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=48): [REMOVED]
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: KEK - hexdump(len=16): [REMOVED]
> WPA: TK - hexdump(len=16): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
> WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
> athn0: WPA: Sending EAPOL-Key 2/4
> WPA: Send EAPOL-Key frame to XX:XX:XX:XX:3b:45 ver=2 mic_len=16
> key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
> WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
> athn0: RX EAPOL from XX:XX:XX:XX:3b:45 (encrypted=-1)
> RX EAPOL - hexdump(len=163): [...REDACTED...]
> athn0: IEEE 802.1X RX: version=2 type=3 length=159
> WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
> athn0: EAPOL-Key type=2
> athn0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
> MIC Secure Encr) athn0: key_length=16 key_data_length=64
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> WPA: EAPOL-Key MIC using HMAC-SHA1
> RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
> WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
> WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
> athn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> athn0: RSN: RX message 3 of 4-Way Handshake from XX:XX:XX:XX:3b:45
> (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
> WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
> WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
> WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
> athn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
> msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
> RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
> athn0: Request to deauthenticate - bssid=XX:XX:XX:XX:3b:45
> pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
> state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> bsd_send_mlme_param: op=3 reason=17 addr=XX:XX:XX:XX:3b:45 athn0:
> Event DEAUTH (11) received athn0: Deauthentication notification
> athn0: * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
> Deauthentication frame IE(s) - hexdump(len=0): [NULL] athn0:
> CTRL-EVENT-DISCONNECTED bssid=XX:XX:XX:XX:3b:45 reason=17
> locally_generated=1 athn0: Auto connect enabled: try to reconnect
> (wps=0/0 wpa_state=7) athn0: Setting scan request: 0.100000 sec
> athn0: Radio work 'connect'@0xb3528f40 done in 0.078452 seconds
> athn0: radio_work_free('connect'@0xb3528f40): num_active_works --> 0
> athn0: BSSID XX:XX:XX:XX:3b:45 ignore list count incremented to 5,
> ignoring for 600 seconds Continuous association failures - consider
> temporary network disabling athn0: CTRL-EVENT-SSID-TEMP-DISABLED id=0
> ssid="MY_WIFI_NETWORK" auth_failures=5 duration=77 reason=CONN_FAILED
> athn0: Consecutive connection failures: 8 --> request scan in 10000
> ms athn0: Ignore new scan request for 10.000000 sec since an earlier
> request is scheduled to trigger sooner athn0: WPA: Clear old PMK and
> PTK athn0: Disconnect event - remove keys athn0: State:
> 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External notification -
> portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL:
> Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state
> INITIALIZE EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> athn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> QM: Clear all active DSCP policies
> athn0: CTRL-EVENT-DSCP-POLICY clear_all
> athn0: Ignore new scan request for 5.000000 sec since an earlier
> request is scheduled to trigger sooner athn0: Request to
> deauthenticate - bssid=00:00:00:00:00:00
> pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
> state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> athn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
> notification - portEnabled=0 EAPOL: External notification -
> portValid=0 QM: Clear all active DSCP policies athn0:
> CTRL-EVENT-DSCP-POLICY clear_all athn0: Ignore new scan request for
> 5.000000 sec since an earlier request is scheduled to trigger sooner
> athn0: Event DISASSOC (1) received athn0: Disassociation notification
> athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
> athn0: Do not request new immediate scan athn0: WPA: Clear old PMK
> and PTK athn0: Disconnect event - remove keys
> athn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> athn0: State: DISCONNECTED -> SCANNING
> athn0: Starting AP scan for wildcard SSID
> athn0: Add radio work 'scan'@0xb3528f40
> athn0: First radio work item in the queue - schedule start
> immediately athn0: Starting radio work 'scan'@0xb3528f40 after
> 0.000138 second wait wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> EAPOL: startWhen --> 0
> EAPOL: disable timer tick
> athn0: Event SCAN_RESULTS (3) received
> Received 1992 bytes of scan results (25 BSSes)
> athn0: BSS: Start scan result update 12
> athn0: BSS: Remove id 27 BSSID XX:XX:XX:XX:ed:90 SSID 'OTHERNETWORK'
> due to no match in scan BSS: last_scan_res_used=25/32
> athn0: New scan results available (own=0 ext=0)
> athn0: Radio work 'scan'@0xb3528f40 done in 7.755612 seconds
> athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
> athn0: Postpone network selection by 69 seconds since all networks
> are disabled
> -----------
>
> # cat /etc/wpa_supplicant.conf
>
> # $NetBSD: wpa_supplicant.conf,v 1.1 2019/01/12 16:51:54 roy Exp $
>
> # Allow wpa_cli(8) to configure wpa_supplicant
> ctrl_interface=/var/run/wpa_supplicant
> ctrl_interface_group=wheel
> update_config=1
>
> #
> # Added by NetBSD sysinst
> #
> network={
> ssid="MY_WIFI_NETWORK"
> psk="PASSWORD"
> scan_ssid=1
> }
> athn0: flags=0x8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500
> ssid "" nwkey 65536:"","","",""
> powersave off
> address: xx:xx:xx:xx:a9:b1
> media: IEEE802.11 autoselect (OFDM6)
> status: no network
> inet6 fe80::76e5:43ff:fe19:a9b1%athn0/64 flags 0x8<DETACHED>
> scopeid 0x1
> --MP_/=AqH6GaA0+Un68Q7y46V_tI
> Content-Type: text/x-log
> Content-Transfer-Encoding: 7bit
> Content-Disposition: attachment;
> filename=wpa_supplicant_2026-02-13-rtwn0.log
> wpa_supplicant v2.11
> Successfully initialized wpa_supplicant
> Initializing interface 'rtwn0' conf '/etc/wpa_supplicant.conf'
> driver 'bsd' ctrl_interface 'N/A' bridge 'N/A' Configuration file
> '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' Reading
> configuration file '/etc/wpa_supplicant.conf'
> ctrl_interface='/var/run/wpa_supplicant' ctrl_interface_group='wheel'
> update_config=1
> Line: 11 - start of a new network block
> ssid - hexdump_ascii(len=16):
> XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d MY_WIFI_NETWORK
> PSK (ASCII passphrase) - hexdump_ascii(len=28): [REMOVED]
> scan_ssid=1 (0x1)
> PSK (from passphrase) - hexdump(len=32): [REMOVED]
> Priority group 0
> id=0 ssid='MY_WIFI_NETWORK'
> Add interface rtwn0 to a new radio N/A
> rtwn0: Failed to attach pkt_type filter
> rtwn0: Own MAC address: 74:de:2b:c1:f1:62
> bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> bsd_del_key: key_idx=0
> bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> bsd_del_key: key_idx=1
> bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> bsd_del_key: key_idx=2
> bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> bsd_del_key: key_idx=3
> bsd_set_key: alg=0 addr=0x0 key_idx=4 set_tx=0 seq_len=0 key_len=0
> bsd_del_key: key_idx=4
> ioctl[SIOCS80211, op=20, val=0, arg_len=7]: Invalid argument
> bsd_set_key: alg=0 addr=0x0 key_idx=5 set_tx=0 seq_len=0 key_len=0
> bsd_del_key: key_idx=5
> ioctl[SIOCS80211, op=20, val=0, arg_len=7]: Invalid argument
> wpa_driver_bsd_set_countermeasures: enabled=0
> rtwn0: RSN: flushing PMKID list in the driver
> rtwn0: Setting scan request: 0.100000 sec
> ENGINE: Loading builtin engines
> ENGINE: Loading builtin engines
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: Supplicant port status: Unauthorized
> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> Using existing control interface directory.
> ctrl_interface_group=0 (from group name 'wheel')
> ctrl_iface bind(PF_UNIX) failed: Address already in use
> ctrl_iface exists, but does not allow connections - assuming it was
> leftover from forced program termination Successfully replaced
> leftover ctrl_iface socket '/var/run/wpa_supplicant/rtwn0' rtwn0:
> Added interface rtwn0 rtwn0: State: DISCONNECTED -> DISCONNECTED
> rtwn0: State: DISCONNECTED -> SCANNING
> Scan SSID - hexdump_ascii(len=16):
> XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d MY_WIFI_NETWORK
> rtwn0: Starting AP scan for wildcard SSID (Interleave with specific)
> rtwn0: Add radio work 'scan'@0xb3661f40
> rtwn0: First radio work item in the queue - schedule start
> immediately rtwn0: Starting radio work 'scan'@0xb3661f40 after
> 0.000138 second wait wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> EAPOL: disable timer tick
> rtwn0: Event SCAN_RESULTS (3) received
> Received 808 bytes of scan results (10 BSSes)
> rtwn0: BSS: Start scan result update 1
> rtwn0: BSS: Add new id 0 BSSID xx:xx:xx:xx:3b:44 SSID '' freq 2412
> rtwn0: BSS: Add new id 1 BSSID xx:xx:xx:xx:3b:46 SSID
> 'MY_WIFI_NETWORK' freq 2412 rtwn0: BSS: Add new id 2 BSSID
> xx:xx:xx:xx:a4:a4 SSID '' freq 2412 rtwn0: BSS: Add new id 3 BSSID
> xx:xx:xx:xx:a4:a6 SSID 'MY_WIFI_NETWORK' freq 2412 rtwn0: BSS: Add
> new id 4 BSSID xx:xx:xx:xx:05:62 SSID '' freq 2412 rtwn0: BSS: Add
> new id 5 BSSID xx:xx:xx:xx:a5:24 SSID '' freq 2412 rtwn0: BSS: Add
> new id 6 BSSID xx:xx:xx:xx:a5:26 SSID 'MY_WIFI_NETWORK' freq 2412
> rtwn0: BSS: Add new id 7 BSSID xx:xx:xx:xx:3b:48 SSID '' freq 2412
> rtwn0: BSS: Add new id 8 BSSID xx:xx:xx:xx:a4:a8 SSID '' freq 2412
> rtwn0: BSS: Add new id 9 BSSID xx:xx:xx:xx:a5:28 SSID '' freq 2412
> BSS: last_scan_res_used=10/32 rtwn0: New scan results available
> (own=0 ext=0) rtwn0: Radio work 'scan'@0xb3661f40 done in 4.835237
> seconds rtwn0: radio_work_free('scan'@0xb3661f40): num_active_works
> --> 0 rtwn0: Selecting BSS from priority group 0
> rtwn0: 0: xx:xx:xx:xx:3b:44 ssid='' wpa_ie_len=0 rsn_ie_len=20
> caps=0x10 level=216 freq=2412 rtwn0: skip - SSID not known
> rtwn0: 1: xx:xx:xx:xx:3b:46 ssid='MY_WIFI_NETWORK' wpa_ie_len=0
> rsn_ie_len=24 caps=0x31 level=216 freq=2412 rtwn0: selected based
> on RSN IE rtwn0: MLD: No Multi-Link element
> rtwn0: selected BSS xx:xx:xx:xx:3b:46 ssid='MY_WIFI_NETWORK'
> rtwn0: Considering connect request: reassociate: 0 selected:
> xx:xx:xx:xx:3b:46 bssid: 00:00:00:00:00:00 pending:
> 00:00:00:00:00:00 wpa_state: SCANNING ssid=0xb37f0000
> current_ssid=0x0 rtwn0: Request association with xx:xx:xx:xx:3b:46
> rtwn0: No ongoing scan/p2p-scan found to abort rtwn0: Add radio work
> 'connect'@0xb3661f40 rtwn0: First radio work item in the queue -
> schedule start immediately rtwn0: Starting radio work
> 'connect'@0xb3661f40 after 0.000163 second wait rtwn0: WPA: clearing
> own WPA/RSN IE rtwn0: RSN: clearing own RSNXE RSN: PMKSA cache search
> - network_ctx=0xb37f0000 try_opportunistic=0 akmp=0x0 RSN: Search for
> BSSID xx:xx:xx:xx:3b:46 RSN: No PMKSA cache entry found
> rtwn0: RSN: using IEEE 802.11i/D9.0
> rtwn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
> proto 2 rtwn0: WPA: Selected mgmt group cipher 32
> rtwn0: WPA: clearing AP WPA IE
> WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
> rtwn0: WPA: clearing AP RSNXE
> rtwn0: WPA: AP group 0x10 network profile group 0x18; available
> group 0x10 rtwn0: WPA: using GTK CCMP
> rtwn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
> available pairwise 0x10 rtwn0: WPA: using PTK CCMP
> rtwn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
> key_mgmt 0x2 rtwn0: WPA: using KEY_MGMT WPA-PSK
> rtwn0: WPA: AP mgmt_group_cipher 0x20 network profile
> mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 rtwn0: WPA:
> not using MGMT group cipher WPA: Set own WPA IE default -
> hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
> hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
> WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
> rtwn0: Automatic auth_alg selection: 0x1
> No supported operating classes IE to add
> rtwn0: Trying to associate with xx:xx:xx:xx:3b:46
> (SSID='MY_WIFI_NETWORK' freq=2412 MHz) rtwn0: Cancelling scan request
> rtwn0: State: SCANNING -> ASSOCIATING
> Limit connection to BSSID xx:xx:xx:xx:3b:46 freq=2412 MHz based on
> scan results (bssid_set=0 wps=0) PSK (set in config) -
> hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
> 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
> wpa_driver_bsd_set_drop_unencrypted: enabled=1
> wpa_driver_bsd_associate: set PRIVACY 1 rtwn0: Setting authentication
> timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> rtwn0: Event ASSOC (0) received
> rtwn0: State: ASSOCIATING -> ASSOCIATED
> rtwn0: Associated to a new BSS: BSSID=xx:xx:xx:xx:3b:46
> rtwn0: Associated with xx:xx:xx:xx:3b:46
> rtwn0: WPA: Association event - clear replay counter
> rtwn0: WPA: Clear old PTK
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: enable timer tick
> EAPOL: SUPP_BE entering state IDLE
> rtwn0: Setting authentication timeout: 10 sec 0 usec
> rtwn0: Cancelling scan request
> rtwn0: Event DISASSOC (1) received
> rtwn0: Disassociation notification
> rtwn0: CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:xx:3b:46 reason=0
> rtwn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6)
> rtwn0: Setting scan request: 0.100000 sec
> rtwn0: Radio work 'connect'@0xb3661f40 done in 0.033964 seconds
> rtwn0: radio_work_free('connect'@0xb3661f40): num_active_works --> 0
> rtwn0: Added BSSID xx:xx:xx:xx:3b:46 into ignore list, ignoring for
> 10 seconds rtwn0: Another BSS in this ESS has been seen; try it next
> rtwn0: BSSID xx:xx:xx:xx:3b:46 ignore list count incremented to 2,
> ignoring for 10 seconds rtwn0: Consecutive connection failures: 1 -->
> request scan in 100 ms rtwn0: Ignore new scan request for 0.100000
> sec since an earlier request is scheduled to trigger sooner rtwn0:
> WPA: Clear old PMK and PTK rtwn0: Disconnect event - remove keys
> rtwn0: State: ASSOCIATED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: Supplicant port status: Unauthorized
> EAPOL: SUPP_BE entering state INITIALIZE
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> rtwn0: State: DISCONNECTED -> SCANNING
> Scan SSID - hexdump_ascii(len=16):
> XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d MY_WIFI_NETWORK
> rtwn0: Starting AP scan for specific SSID: MY_WIFI_NETWORK
> rtwn0: Optimize scan based on previously generated frequency list
> rtwn0: Add radio work 'scan'@0xb3661f40
> rtwn0: First radio work item in the queue - schedule start
> immediately rtwn0: Starting radio work 'scan'@0xb3661f40 after
> 0.000136 second wait wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> EAPOL: startWhen --> 0
> EAPOL: disable timer tick
> rtwn0: Event SCAN_RESULTS (3) received
> Received 808 bytes of scan results (10 BSSes)
> rtwn0: BSS: Start scan result update 2
> BSS: last_scan_res_used=10/32
> rtwn0: New scan results available (own=0 ext=0)
> rtwn0: Radio work 'scan'@0xb3661f40 done in 4.874728 seconds
> rtwn0: radio_work_free('scan'@0xb3661f40): num_active_works --> 0
> rtwn0: Selecting BSS from priority group 0
> rtwn0: 0: xx:xx:xx:xx:3b:46 ssid='MY_WIFI_NETWORK' wpa_ie_len=0
> rsn_ie_len=24 caps=0x31 level=216 freq=2412 rtwn0: skip - BSSID
> ignored (count=2 limit=0) rtwn0: 1: xx:xx:xx:xx:3b:44 ssid=''
> wpa_ie_len=0 rsn_ie_len=20 caps=0x10 level=216 freq=2412 rtwn0:
> skip - SSID not known rtwn0: 2: xx:xx:xx:xx:a4:a6
> ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24 caps=0x31 level=188
> freq=2412 rtwn0: selected based on RSN IE rtwn0: MLD: No
> Multi-Link element rtwn0: selected BSS xx:xx:xx:xx:a4:a6
> ssid='MY_WIFI_NETWORK' rtwn0: Considering connect request:
> reassociate: 0 selected: xx:xx:xx:xx:a4:a6 bssid: 00:00:00:00:00:00
> pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0xb37f0000
> current_ssid=0x0 rtwn0: Request association with xx:xx:xx:xx:a4:a6
> rtwn0: Re-association to the same ESS rtwn0: No ongoing scan/p2p-scan
> found to abort rtwn0: Add radio work 'connect'@0xb3661f40 rtwn0:
> First radio work item in the queue - schedule start immediately
> rtwn0: Starting radio work 'connect'@0xb3661f40 after 0.000046 second
> wait rtwn0: WPA: clearing own WPA/RSN IE rtwn0: RSN: clearing own
> RSNXE RSN: PMKSA cache search - network_ctx=0xb37f0000
> try_opportunistic=0 akmp=0x0 RSN: Search for BSSID xx:xx:xx:xx:a4:a6
> RSN: No PMKSA cache entry found
> rtwn0: RSN: using IEEE 802.11i/D9.0
> rtwn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
> proto 2 rtwn0: WPA: Selected mgmt group cipher 32
> rtwn0: WPA: clearing AP WPA IE
> WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
> rtwn0: WPA: clearing AP RSNXE
> rtwn0: WPA: AP group 0x10 network profile group 0x18; available
> group 0x10 rtwn0: WPA: using GTK CCMP
> rtwn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
> available pairwise 0x10 rtwn0: WPA: using PTK CCMP
> rtwn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
> key_mgmt 0x2 rtwn0: WPA: using KEY_MGMT WPA-PSK
> rtwn0: WPA: AP mgmt_group_cipher 0x20 network profile
> mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 rtwn0: WPA:
> not using MGMT group cipher WPA: Set own WPA IE default -
> hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
> hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
> WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
> rtwn0: Automatic auth_alg selection: 0x1
> No supported operating classes IE to add
> rtwn0: Trying to associate with xx:xx:xx:xx:a4:a6
> (SSID='MY_WIFI_NETWORK' freq=2412 MHz) rtwn0: Cancelling scan request
> rtwn0: State: SCANNING -> ASSOCIATING
> Limit connection to BSSID xx:xx:xx:xx:a4:a6 freq=2412 MHz based on
> scan results (bssid_set=0 wps=0) PSK (set in config) -
> hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
> 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
> wpa_driver_bsd_set_drop_unencrypted: enabled=1
> wpa_driver_bsd_associate: set PRIVACY 1 rtwn0: Setting authentication
> timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> rtwn0: Event ASSOC (0) received
> rtwn0: State: ASSOCIATING -> ASSOCIATED
> rtwn0: Associated to a new BSS: BSSID=xx:xx:xx:xx:a4:a6
> rtwn0: Associated with xx:xx:xx:xx:a4:a6
> rtwn0: WPA: Association event - clear replay counter
> rtwn0: WPA: Clear old PTK
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: enable timer tick
> EAPOL: SUPP_BE entering state IDLE
> rtwn0: Setting authentication timeout: 10 sec 0 usec
> rtwn0: Cancelling scan request
> rtwn0: RX EAPOL from xx:xx:xx:xx:a4:a6 (encrypted=-1)
> RX EAPOL - hexdump(len=99): [...REDACTED...]
> rtwn0: Setting authentication timeout: 10 sec 0 usec
> rtwn0: IEEE 802.1X RX: version=2 type=3 length=95
> WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
> rtwn0: EAPOL-Key type=2
> rtwn0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> rtwn0: key_length=16 key_data_length=0
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> rtwn0: WPA: RX message 1 of 4-Way Handshake from xx:xx:xx:xx:a4:a6
> (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
> rtwn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
> Get randomness: len=32 entropy=22
> WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
> WPA: PTK derivation using PRF(SHA1)
> WPA: PTK derivation - A1=74:de:2b:c1:f1:62 A2=xx:xx:xx:xx:a4:a6
> WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
> WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=48): [REMOVED]
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: KEK - hexdump(len=16): [REMOVED]
> WPA: TK - hexdump(len=16): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
> WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
> rtwn0: WPA: Sending EAPOL-Key 2/4
> WPA: Send EAPOL-Key frame to xx:xx:xx:xx:a4:a6 ver=2 mic_len=16
> key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
> WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
> rtwn0: RX EAPOL from xx:xx:xx:xx:a4:a6 (encrypted=-1)
> RX EAPOL - hexdump(len=163): [...REDACTED...]
> rtwn0: IEEE 802.1X RX: version=2 type=3 length=159
> WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
> rtwn0: EAPOL-Key type=2
> rtwn0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
> MIC Secure Encr) rtwn0: key_length=16 key_data_length=64
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> WPA: EAPOL-Key MIC using HMAC-SHA1
> RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
> WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
> WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
> rtwn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> rtwn0: RSN: RX message 3 of 4-Way Handshake from xx:xx:xx:xx:a4:a6
> (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
> WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
> WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
> WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
> rtwn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
> msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
> RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
> rtwn0: Request to deauthenticate - bssid=xx:xx:xx:xx:a4:a6
> pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
> state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> bsd_send_mlme_param: op=3 reason=17 addr=xx:xx:xx:xx:a4:a6 rtwn0:
> Event DEAUTH (11) received rtwn0: Deauthentication notification
> rtwn0: * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
> Deauthentication frame IE(s) - hexdump(len=0): [NULL] rtwn0:
> CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:xx:a4:a6 reason=17
> locally_generated=1 rtwn0: Auto connect enabled: try to reconnect
> (wps=0/0 wpa_state=7) rtwn0: Setting scan request: 0.100000 sec
> rtwn0: Radio work 'connect'@0xb3661f40 done in 0.076267 seconds
> rtwn0: radio_work_free('connect'@0xb3661f40): num_active_works --> 0
> rtwn0: Added BSSID xx:xx:xx:xx:a4:a6 into ignore list, ignoring for
> 10 seconds rtwn0: Another BSS in this ESS has been seen; try it next
> rtwn0: BSSID xx:xx:xx:xx:a4:a6 ignore list count incremented to 2,
> ignoring for 10 seconds rtwn0: Consecutive connection failures: 2 -->
> request scan in 500 ms rtwn0: Ignore new scan request for 0.500000
> sec since an earlier request is scheduled to trigger sooner rtwn0:
> WPA: Clear old PMK and PTK rtwn0: Disconnect event - remove keys
> rtwn0: State: 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External
> notification - portEnabled=0 EAPOL: SUPP_PAE entering state
> DISCONNECTED EAPOL: Supplicant port status: Unauthorized
> EAPOL: SUPP_BE entering state INITIALIZE
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> rtwn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> QM: Clear all active DSCP policies
> rtwn0: CTRL-EVENT-DSCP-POLICY clear_all
> rtwn0: Ignore new scan request for 5.000000 sec since an earlier
> request is scheduled to trigger sooner rtwn0: Request to
> deauthenticate - bssid=00:00:00:00:00:00
> pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
> state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> rtwn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
> notification - portEnabled=0 EAPOL: External notification -
> portValid=0 QM: Clear all active DSCP policies rtwn0:
> CTRL-EVENT-DSCP-POLICY clear_all rtwn0: Ignore new scan request for
> 5.000000 sec since an earlier request is scheduled to trigger sooner
> rtwn0: Event DISASSOC (1) received rtwn0: Disassociation notification
> rtwn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
> rtwn0: Do not request new immediate scan rtwn0: WPA: Clear old PMK
> and PTK rtwn0: Disconnect event - remove keys
> rtwn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> rtwn0: State: DISCONNECTED -> SCANNING
> rtwn0: Starting AP scan for wildcard SSID
> rtwn0: Optimize scan based on previously generated frequency list
> rtwn0: Add radio work 'scan'@0xb3661f40
> rtwn0: First radio work item in the queue - schedule start
> immediately rtwn0: Starting radio work 'scan'@0xb3661f40 after
> 0.000136 second wait wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> EAPOL: startWhen --> 0
> EAPOL: disable timer tick
> rtwn0: Event SCAN_RESULTS (3) received
> Received 808 bytes of scan results (10 BSSes)
> rtwn0: BSS: Start scan result update 3
> BSS: last_scan_res_used=10/32
> rtwn0: New scan results available (own=0 ext=0)
> rtwn0: Radio work 'scan'@0xb3661f40 done in 4.874954 seconds
> rtwn0: radio_work_free('scan'@0xb3661f40): num_active_works --> 0
> rtwn0: Selecting BSS from priority group 0
> rtwn0: 0: xx:xx:xx:xx:3b:46 ssid='MY_WIFI_NETWORK' wpa_ie_len=0
> rsn_ie_len=24 caps=0x31 level=216 freq=2412 rtwn0: selected based
> on RSN IE rtwn0: MLD: No Multi-Link element
> rtwn0: selected BSS xx:xx:xx:xx:3b:46 ssid='MY_WIFI_NETWORK'
> rtwn0: Considering connect request: reassociate: 0 selected:
> xx:xx:xx:xx:3b:46 bssid: 00:00:00:00:00:00 pending:
> 00:00:00:00:00:00 wpa_state: SCANNING ssid=0xb37f0000
> current_ssid=0x0 rtwn0: Request association with xx:xx:xx:xx:3b:46
> rtwn0: Re-association to the same ESS rtwn0: No ongoing scan/p2p-scan
> found to abort rtwn0: Add radio work 'connect'@0xb3661f40 rtwn0:
> First radio work item in the queue - schedule start immediately
> rtwn0: Starting radio work 'connect'@0xb3661f40 after 0.000151 second
> wait rtwn0: WPA: clearing own WPA/RSN IE rtwn0: RSN: clearing own
> RSNXE RSN: PMKSA cache search - network_ctx=0xb37f0000
> try_opportunistic=0 akmp=0x0 RSN: Search for BSSID xx:xx:xx:xx:3b:46
> RSN: No PMKSA cache entry found
> rtwn0: RSN: using IEEE 802.11i/D9.0
> rtwn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
> proto 2 rtwn0: WPA: Selected mgmt group cipher 32
> rtwn0: WPA: clearing AP WPA IE
> WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
> rtwn0: WPA: clearing AP RSNXE
> rtwn0: WPA: AP group 0x10 network profile group 0x18; available
> group 0x10 rtwn0: WPA: using GTK CCMP
> rtwn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
> available pairwise 0x10 rtwn0: WPA: using PTK CCMP
> rtwn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
> key_mgmt 0x2 rtwn0: WPA: using KEY_MGMT WPA-PSK
> rtwn0: WPA: AP mgmt_group_cipher 0x20 network profile
> mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 rtwn0: WPA:
> not using MGMT group cipher WPA: Set own WPA IE default -
> hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
> hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
> WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
> rtwn0: Automatic auth_alg selection: 0x1
> No supported operating classes IE to add
> rtwn0: Trying to associate with xx:xx:xx:xx:3b:46
> (SSID='MY_WIFI_NETWORK' freq=2412 MHz) rtwn0: Cancelling scan request
> rtwn0: State: SCANNING -> ASSOCIATING
> Limit connection to BSSID xx:xx:xx:xx:3b:46 freq=2412 MHz based on
> scan results (bssid_set=0 wps=0) PSK (set in config) -
> hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
> 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
> wpa_driver_bsd_set_drop_unencrypted: enabled=1
> wpa_driver_bsd_associate: set PRIVACY 1 rtwn0: Setting authentication
> timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> rtwn0: Event ASSOC (0) received
> rtwn0: State: ASSOCIATING -> ASSOCIATED
> rtwn0: Associated to a new BSS: BSSID=xx:xx:xx:xx:3b:46
> rtwn0: Associated with xx:xx:xx:xx:3b:46
> rtwn0: WPA: Association event - clear replay counter
> rtwn0: WPA: Clear old PTK
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: enable timer tick
> EAPOL: SUPP_BE entering state IDLE
> rtwn0: Setting authentication timeout: 10 sec 0 usec
> rtwn0: Cancelling scan request
> rtwn0: RX EAPOL from xx:xx:xx:xx:3b:46 (encrypted=-1)
> RX EAPOL - hexdump(len=99): [...REDACTED...]
> rtwn0: Setting authentication timeout: 10 sec 0 usec
> rtwn0: IEEE 802.1X RX: version=2 type=3 length=95
> WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
> rtwn0: EAPOL-Key type=2
> rtwn0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> rtwn0: key_length=16 key_data_length=0
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> rtwn0: WPA: RX message 1 of 4-Way Handshake from xx:xx:xx:xx:3b:46
> (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
> rtwn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
> Get randomness: len=32 entropy=11
> WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
> WPA: PTK derivation using PRF(SHA1)
> WPA: PTK derivation - A1=74:de:2b:c1:f1:62 A2=xx:xx:xx:xx:3b:46
> WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
> WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=48): [REMOVED]
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: KEK - hexdump(len=16): [REMOVED]
> WPA: TK - hexdump(len=16): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
> WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
> rtwn0: WPA: Sending EAPOL-Key 2/4
> WPA: Send EAPOL-Key frame to xx:xx:xx:xx:3b:46 ver=2 mic_len=16
> key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
> WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
> rtwn0: RX EAPOL from xx:xx:xx:xx:3b:46 (encrypted=-1)
> RX EAPOL - hexdump(len=163): [...REDACTED...]
> rtwn0: IEEE 802.1X RX: version=2 type=3 length=159
> WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
> rtwn0: EAPOL-Key type=2
> rtwn0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
> MIC Secure Encr) rtwn0: key_length=16 key_data_length=64
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> WPA: EAPOL-Key MIC using HMAC-SHA1
> RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
> WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
> WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
> rtwn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> rtwn0: RSN: RX message 3 of 4-Way Handshake from xx:xx:xx:xx:3b:46
> (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
> WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
> WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
> WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
> rtwn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
> msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
> RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
> rtwn0: Request to deauthenticate - bssid=xx:xx:xx:xx:3b:46
> pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
> state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> bsd_send_mlme_param: op=3 reason=17 addr=xx:xx:xx:xx:3b:46 rtwn0:
> Event DEAUTH (11) received rtwn0: Deauthentication notification
> rtwn0: * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
> Deauthentication frame IE(s) - hexdump(len=0): [NULL] rtwn0:
> CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:xx:3b:46 reason=17
> locally_generated=1 rtwn0: Auto connect enabled: try to reconnect
> (wps=0/0 wpa_state=7) rtwn0: Setting scan request: 0.100000 sec
> rtwn0: Radio work 'connect'@0xb3661f40 done in 0.052810 seconds
> rtwn0: radio_work_free('connect'@0xb3661f40): num_active_works --> 0
> rtwn0: BSSID xx:xx:xx:xx:3b:46 ignore list count incremented to 3,
> ignoring for 60 seconds rtwn0: Consecutive connection failures: 3 -->
> request scan in 1000 ms rtwn0: Ignore new scan request for 1.000000
> sec since an earlier request is scheduled to trigger sooner rtwn0:
> WPA: Clear old PMK and PTK rtwn0: Disconnect event - remove keys
> rtwn0: State: 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External
> notification - portEnabled=0 EAPOL: SUPP_PAE entering state
> DISCONNECTED EAPOL: Supplicant port status: Unauthorized
> EAPOL: SUPP_BE entering state INITIALIZE
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> rtwn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> QM: Clear all active DSCP policies
> rtwn0: CTRL-EVENT-DSCP-POLICY clear_all
> rtwn0: Ignore new scan request for 5.000000 sec since an earlier
> request is scheduled to trigger sooner rtwn0: Request to
> deauthenticate - bssid=00:00:00:00:00:00
> pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
> state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> rtwn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
> notification - portEnabled=0 EAPOL: External notification -
> portValid=0 QM: Clear all active DSCP policies rtwn0:
> CTRL-EVENT-DSCP-POLICY clear_all rtwn0: Ignore new scan request for
> 5.000000 sec since an earlier request is scheduled to trigger sooner
> rtwn0: Event DISASSOC (1) received rtwn0: Disassociation notification
> rtwn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
> rtwn0: Do not request new immediate scan rtwn0: WPA: Clear old PMK
> and PTK rtwn0: Disconnect event - remove keys
> rtwn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> rtwn0: State: DISCONNECTED -> SCANNING
> Scan SSID - hexdump_ascii(len=16):
> XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d MY_WIFI_NETWORK
> rtwn0: Starting AP scan for wildcard SSID (Interleave with specific)
> rtwn0: Add radio work 'scan'@0xb3661f40
> rtwn0: First radio work item in the queue - schedule start
> immediately rtwn0: Starting radio work 'scan'@0xb3661f40 after
> 0.000037 second wait wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> EAPOL: startWhen --> 0
> EAPOL: disable timer tick
> rtwn0: Event SCAN_RESULTS (3) received
> Received 808 bytes of scan results (10 BSSes)
> rtwn0: BSS: Start scan result update 4
> BSS: last_scan_res_used=10/32
> rtwn0: New scan results available (own=0 ext=0)
> rtwn0: Radio work 'scan'@0xb3661f40 done in 6.875083 seconds
> rtwn0: radio_work_free('scan'@0xb3661f40): num_active_works --> 0
> rtwn0: Selecting BSS from priority group 0
> rtwn0: 0: xx:xx:xx:xx:3b:44 ssid='' wpa_ie_len=0 rsn_ie_len=20
> caps=0x10 level=216 freq=2412 rtwn0: skip - SSID not known
> rtwn0: 1: xx:xx:xx:xx:3b:46 ssid='MY_WIFI_NETWORK' wpa_ie_len=0
> rsn_ie_len=24 caps=0x31 level=216 freq=2412 rtwn0: skip - BSSID
> ignored (count=3 limit=0) rtwn0: 2: xx:xx:xx:xx:a4:a6
> ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24 caps=0x31 level=188
> freq=2412 rtwn0: selected based on RSN IE rtwn0: MLD: No
> Multi-Link element rtwn0: selected BSS xx:xx:xx:xx:a4:a6
> ssid='MY_WIFI_NETWORK' rtwn0: Considering connect request:
> reassociate: 0 selected: xx:xx:xx:xx:a4:a6 bssid: 00:00:00:00:00:00
> pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0xb37f0000
> current_ssid=0x0 rtwn0: Request association with xx:xx:xx:xx:a4:a6
> rtwn0: Re-association to the same ESS rtwn0: No ongoing scan/p2p-scan
> found to abort rtwn0: Add radio work 'connect'@0xb3661f40 rtwn0:
> First radio work item in the queue - schedule start immediately
> rtwn0: Starting radio work 'connect'@0xb3661f40 after 0.000046 second
> wait rtwn0: WPA: clearing own WPA/RSN IE rtwn0: RSN: clearing own
> RSNXE RSN: PMKSA cache search - network_ctx=0xb37f0000
> try_opportunistic=0 akmp=0x0 RSN: Search for BSSID xx:xx:xx:xx:a4:a6
> RSN: No PMKSA cache entry found
> rtwn0: RSN: using IEEE 802.11i/D9.0
> rtwn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
> proto 2 rtwn0: WPA: Selected mgmt group cipher 32
> rtwn0: WPA: clearing AP WPA IE
> WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
> rtwn0: WPA: clearing AP RSNXE
> rtwn0: WPA: AP group 0x10 network profile group 0x18; available
> group 0x10 rtwn0: WPA: using GTK CCMP
> rtwn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
> available pairwise 0x10 rtwn0: WPA: using PTK CCMP
> rtwn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
> key_mgmt 0x2 rtwn0: WPA: using KEY_MGMT WPA-PSK
> rtwn0: WPA: AP mgmt_group_cipher 0x20 network profile
> mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 rtwn0: WPA:
> not using MGMT group cipher WPA: Set own WPA IE default -
> hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
> hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
> WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
> rtwn0: Automatic auth_alg selection: 0x1
> No supported operating classes IE to add
> rtwn0: Trying to associate with xx:xx:xx:xx:a4:a6
> (SSID='MY_WIFI_NETWORK' freq=2412 MHz) rtwn0: Cancelling scan request
> rtwn0: State: SCANNING -> ASSOCIATING
> Limit connection to BSSID xx:xx:xx:xx:a4:a6 freq=2412 MHz based on
> scan results (bssid_set=0 wps=0) PSK (set in config) -
> hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
> 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
> wpa_driver_bsd_set_drop_unencrypted: enabled=1
> wpa_driver_bsd_associate: set PRIVACY 1 rtwn0: Setting authentication
> timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> rtwn0: Event ASSOC (0) received
> rtwn0: State: ASSOCIATING -> ASSOCIATED
> rtwn0: Associated to a new BSS: BSSID=xx:xx:xx:xx:a4:a6
> rtwn0: Associated with xx:xx:xx:xx:a4:a6
> rtwn0: WPA: Association event - clear replay counter
> rtwn0: WPA: Clear old PTK
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: enable timer tick
> EAPOL: SUPP_BE entering state IDLE
> rtwn0: Setting authentication timeout: 10 sec 0 usec
> rtwn0: Cancelling scan request
> rtwn0: RX EAPOL from xx:xx:xx:xx:a4:a6 (encrypted=-1)
> RX EAPOL - hexdump(len=99): [...REDACTED...]
> rtwn0: Setting authentication timeout: 10 sec 0 usec
> rtwn0: IEEE 802.1X RX: version=2 type=3 length=95
> WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
> rtwn0: EAPOL-Key type=2
> rtwn0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> rtwn0: key_length=16 key_data_length=0
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> rtwn0: WPA: RX message 1 of 4-Way Handshake from xx:xx:xx:xx:a4:a6
> (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
> rtwn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
> Get randomness: len=32 entropy=11
> WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
> WPA: PTK derivation using PRF(SHA1)
> WPA: PTK derivation - A1=74:de:2b:c1:f1:62 A2=xx:xx:xx:xx:a4:a6
> WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
> WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=48): [REMOVED]
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: KEK - hexdump(len=16): [REMOVED]
> WPA: TK - hexdump(len=16): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
> WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
> rtwn0: WPA: Sending EAPOL-Key 2/4
> WPA: Send EAPOL-Key frame to xx:xx:xx:xx:a4:a6 ver=2 mic_len=16
> key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
> WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
> rtwn0: RX EAPOL from xx:xx:xx:xx:a4:a6 (encrypted=-1)
> RX EAPOL - hexdump(len=163): [...REDACTED...]
> rtwn0: IEEE 802.1X RX: version=2 type=3 length=159
> WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
> rtwn0: EAPOL-Key type=2
> rtwn0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
> MIC Secure Encr) rtwn0: key_length=16 key_data_length=64
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> WPA: EAPOL-Key MIC using HMAC-SHA1
> RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
> WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
> WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
> rtwn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> rtwn0: RSN: RX message 3 of 4-Way Handshake from xx:xx:xx:xx:a4:a6
> (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
> WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
> WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
> WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
> rtwn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
> msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
> RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
> rtwn0: Request to deauthenticate - bssid=xx:xx:xx:xx:a4:a6
> pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
> state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> bsd_send_mlme_param: op=3 reason=17 addr=xx:xx:xx:xx:a4:a6 rtwn0:
> Event DEAUTH (11) received rtwn0: Deauthentication notification
> rtwn0: * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
> Deauthentication frame IE(s) - hexdump(len=0): [NULL] rtwn0:
> CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:xx:a4:a6 reason=17
> locally_generated=1 rtwn0: Auto connect enabled: try to reconnect
> (wps=0/0 wpa_state=7) rtwn0: Setting scan request: 0.100000 sec
> rtwn0: Radio work 'connect'@0xb3661f40 done in 0.057772 seconds
> rtwn0: radio_work_free('connect'@0xb3661f40): num_active_works --> 0
> rtwn0: BSSID xx:xx:xx:xx:a4:a6 ignore list count incremented to 3,
> ignoring for 60 seconds Continuous association failures - consider
> temporary network disabling rtwn0: CTRL-EVENT-SSID-TEMP-DISABLED id=0
> ssid="MY_WIFI_NETWORK" auth_failures=1 duration=10 reason=CONN_FAILED
> rtwn0: Consecutive connection failures: 4 --> request scan in 5000 ms
> rtwn0: Ignore new scan request for 5.000000 sec since an earlier
> request is scheduled to trigger sooner rtwn0: WPA: Clear old PMK and
> PTK rtwn0: Disconnect event - remove keys rtwn0: State:
> 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External notification -
> portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL:
> Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state
> INITIALIZE EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> rtwn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> QM: Clear all active DSCP policies
> rtwn0: CTRL-EVENT-DSCP-POLICY clear_all
> rtwn0: Ignore new scan request for 5.000000 sec since an earlier
> request is scheduled to trigger sooner rtwn0: Request to
> deauthenticate - bssid=00:00:00:00:00:00
> pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
> state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> rtwn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
> notification - portEnabled=0 EAPOL: External notification -
> portValid=0 QM: Clear all active DSCP policies rtwn0:
> CTRL-EVENT-DSCP-POLICY clear_all rtwn0: Ignore new scan request for
> 5.000000 sec since an earlier request is scheduled to trigger sooner
> rtwn0: Event DISASSOC (1) received rtwn0: Disassociation notification
> rtwn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
> rtwn0: Do not request new immediate scan rtwn0: WPA: Clear old PMK
> and PTK rtwn0: Disconnect event - remove keys
> rtwn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> rtwn0: State: DISCONNECTED -> SCANNING
> Scan SSID - hexdump_ascii(len=16):
> XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d MY_WIFI_NETWORK
> rtwn0: Starting AP scan for specific SSID: MY_WIFI_NETWORK
> rtwn0: Add radio work 'scan'@0xb3661f40
> rtwn0: First radio work item in the queue - schedule start
> immediately rtwn0: Starting radio work 'scan'@0xb3661f40 after
> 0.000137 second wait wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> EAPOL: startWhen --> 0
> EAPOL: disable timer tick
> rtwn0: Event SCAN_RESULTS (3) received
> Received 808 bytes of scan results (10 BSSes)
> rtwn0: BSS: Start scan result update 5
> BSS: last_scan_res_used=10/32
> rtwn0: New scan results available (own=0 ext=0)
> rtwn0: Radio work 'scan'@0xb3661f40 done in 4.884156 seconds
> rtwn0: radio_work_free('scan'@0xb3661f40): num_active_works --> 0
> rtwn0: Postpone network selection by 5 seconds since all networks
> are disabled rtwn0: Try to associate due to network getting re-enabled
> Fast associate: Old scan results
> rtwn0: Setting scan request: 0.000000 sec
> rtwn0: Starting AP scan for wildcard SSID
> rtwn0: Add radio work 'scan'@0xb3661f40
> rtwn0: First radio work item in the queue - schedule start
> immediately rtwn0: Starting radio work 'scan'@0xb3661f40 after
> 0.000032 second wait wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> rtwn0: Event SCAN_RESULTS (3) received
> Received 808 bytes of scan results (10 BSSes)
> rtwn0: BSS: Start scan result update 6
> BSS: last_scan_res_used=10/32
> rtwn0: New scan results available (own=0 ext=0)
> rtwn0: Radio work 'scan'@0xb3661f40 done in 4.834473 seconds
> rtwn0: radio_work_free('scan'@0xb3661f40): num_active_works --> 0
> rtwn0: CTRL-EVENT-SSID-REENABLED id=0 ssid="MY_WIFI_NETWORK"
> Mark BSSID xx:xx:xx:xx:a4:a6 ignored to allow a lower priority BSS,
> if any, to be tried next rtwn0: BSSID xx:xx:xx:xx:a4:a6 ignore list
> count incremented to 4, ignoring for 120 seconds rtwn0: Selecting BSS
> from priority group 0 rtwn0: 0: xx:xx:xx:xx:3b:46
> ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24 caps=0x31 level=216
> freq=2412 rtwn0: skip - BSSID ignored (count=3 limit=0) rtwn0: 1:
> xx:xx:xx:xx:3b:44 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x10
> level=216 freq=2412 rtwn0: skip - SSID not known rtwn0: 2:
> xx:xx:xx:xx:a4:a4 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x10
> level=188 freq=2412 rtwn0: skip - SSID not known rtwn0: 3:
> xx:xx:xx:xx:a4:a6 ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24
> caps=0x31 level=188 freq=2412 rtwn0: skip - BSSID ignored (count=4
> limit=0) rtwn0: 4: xx:xx:xx:xx:05:62 ssid='' wpa_ie_len=0
> rsn_ie_len=20 caps=0x11 level=184 freq=2412 rtwn0: skip - SSID not
> known rtwn0: 5: xx:xx:xx:xx:a5:26 ssid='MY_WIFI_NETWORK' wpa_ie_len=0
> rsn_ie_len=24 caps=0x31 level=178 freq=2412 rtwn0: selected based
> on RSN IE rtwn0: MLD: No Multi-Link element rtwn0: selected BSS
> xx:xx:xx:xx:a5:26 ssid='MY_WIFI_NETWORK' rtwn0: Considering connect
> request: reassociate: 0 selected: xx:xx:xx:xx:a5:26 bssid:
> 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
> ssid=0xb37f0000 current_ssid=0x0 rtwn0: Request association with
> xx:xx:xx:xx:a5:26 rtwn0: Re-association to the same ESS rtwn0: No
> ongoing scan/p2p-scan found to abort rtwn0: Add radio work
> 'connect'@0xb3661f40 rtwn0: First radio work item in the queue -
> schedule start immediately rtwn0: Starting radio work
> 'connect'@0xb3661f40 after 0.000150 second wait rtwn0: WPA: clearing
> own WPA/RSN IE rtwn0: RSN: clearing own RSNXE RSN: PMKSA cache search
> - network_ctx=0xb37f0000 try_opportunistic=0 akmp=0x0 RSN: Search for
> BSSID xx:xx:xx:xx:a5:26 RSN: No PMKSA cache entry found
> rtwn0: RSN: using IEEE 802.11i/D9.0
> rtwn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
> proto 2 rtwn0: WPA: Selected mgmt group cipher 32
> rtwn0: WPA: clearing AP WPA IE
> WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
> rtwn0: WPA: clearing AP RSNXE
> rtwn0: WPA: AP group 0x10 network profile group 0x18; available
> group 0x10 rtwn0: WPA: using GTK CCMP
> rtwn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
> available pairwise 0x10 rtwn0: WPA: using PTK CCMP
> rtwn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
> key_mgmt 0x2 rtwn0: WPA: using KEY_MGMT WPA-PSK
> rtwn0: WPA: AP mgmt_group_cipher 0x20 network profile
> mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 rtwn0: WPA:
> not using MGMT group cipher WPA: Set own WPA IE default -
> hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
> hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
> WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
> rtwn0: Automatic auth_alg selection: 0x1
> No supported operating classes IE to add
> rtwn0: Trying to associate with xx:xx:xx:xx:a5:26
> (SSID='MY_WIFI_NETWORK' freq=2412 MHz) rtwn0: Cancelling scan request
> rtwn0: State: SCANNING -> ASSOCIATING
> Limit connection to BSSID xx:xx:xx:xx:a5:26 freq=2412 MHz based on
> scan results (bssid_set=0 wps=0) PSK (set in config) -
> hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
> 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
> wpa_driver_bsd_set_drop_unencrypted: enabled=1
> wpa_driver_bsd_associate: set PRIVACY 1 rtwn0: Setting authentication
> timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> rtwn0: Event ASSOC (0) received
> rtwn0: State: ASSOCIATING -> ASSOCIATED
> rtwn0: Associated to a new BSS: BSSID=xx:xx:xx:xx:a5:26
> rtwn0: Associated with xx:xx:xx:xx:a5:26
> rtwn0: WPA: Association event - clear replay counter
> rtwn0: WPA: Clear old PTK
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: enable timer tick
> EAPOL: SUPP_BE entering state IDLE
> rtwn0: Setting authentication timeout: 10 sec 0 usec
> rtwn0: Cancelling scan request
> rtwn0: Event DISASSOC (1) received
> rtwn0: Disassociation notification
> rtwn0: CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:xx:a5:26 reason=0
> rtwn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6)
> rtwn0: Setting scan request: 0.100000 sec
> rtwn0: Radio work 'connect'@0xb3661f40 done in 0.033572 seconds
> rtwn0: radio_work_free('connect'@0xb3661f40): num_active_works --> 0
> rtwn0: Added BSSID xx:xx:xx:xx:a5:26 into ignore list, ignoring for
> 10 seconds Continuous association failures - consider temporary
> network disabling rtwn0: CTRL-EVENT-SSID-TEMP-DISABLED id=0
> ssid="MY_WIFI_NETWORK" auth_failures=2 duration=25 reason=CONN_FAILED
> rtwn0: Consecutive connection failures: 5 --> request scan in 10000
> ms rtwn0: Ignore new scan request for 10.000000 sec since an earlier
> request is scheduled to trigger sooner rtwn0: WPA: Clear old PMK and
> PTK rtwn0: Disconnect event - remove keys rtwn0: State: ASSOCIATED ->
> DISCONNECTED EAPOL: External notification - portEnabled=0
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: Supplicant port status: Unauthorized
> EAPOL: SUPP_BE entering state INITIALIZE
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> rtwn0: State: DISCONNECTED -> SCANNING
> Scan SSID - hexdump_ascii(len=16):
> XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d MY_WIFI_NETWORK
> rtwn0: Starting AP scan for wildcard SSID (Interleave with specific)
> rtwn0: Add radio work 'scan'@0xb3661f40
> rtwn0: First radio work item in the queue - schedule start
> immediately rtwn0: Starting radio work 'scan'@0xb3661f40 after
> 0.000137 second wait wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> EAPOL: startWhen --> 0
> EAPOL: disable timer tick
> rtwn0: Event SCAN_RESULTS (3) received
> Received 808 bytes of scan results (10 BSSes)
> rtwn0: BSS: Start scan result update 7
> BSS: last_scan_res_used=10/32
> rtwn0: New scan results available (own=0 ext=0)
> rtwn0: Radio work 'scan'@0xb3661f40 done in 4.875348 seconds
> rtwn0: radio_work_free('scan'@0xb3661f40): num_active_works --> 0
> rtwn0: Postpone network selection by 20 seconds since all networks
> are disabled rtwn0: Try to associate due to network getting re-enabled
> Fast associate: Old scan results
> rtwn0: Setting scan request: 0.000000 sec
> Scan SSID - hexdump_ascii(len=16):
> XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d MY_WIFI_NETWORK
> rtwn0: Starting AP scan for specific SSID: MY_WIFI_NETWORK
> rtwn0: Add radio work 'scan'@0xb3661f40
> rtwn0: First radio work item in the queue - schedule start
> immediately rtwn0: Starting radio work 'scan'@0xb3661f40 after
> 0.000135 second wait wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> rtwn0: Event SCAN_RESULTS (3) received
> Received 808 bytes of scan results (10 BSSes)
> rtwn0: BSS: Start scan result update 8
> BSS: last_scan_res_used=10/32
> rtwn0: New scan results available (own=0 ext=0)
> rtwn0: Radio work 'scan'@0xb3661f40 done in 4.833500 seconds
> rtwn0: radio_work_free('scan'@0xb3661f40): num_active_works --> 0
> rtwn0: CTRL-EVENT-SSID-REENABLED id=0 ssid="MY_WIFI_NETWORK"
> Mark BSSID xx:xx:xx:xx:a5:26 ignored to allow a lower priority BSS,
> if any, to be tried next rtwn0: BSSID xx:xx:xx:xx:a5:26 ignore list
> count incremented to 2, ignoring for 10 seconds rtwn0: Selecting BSS
> from priority group 0 rtwn0: 0: xx:xx:xx:xx:3b:44 ssid=''
> wpa_ie_len=0 rsn_ie_len=20 caps=0x10 level=216 freq=2412 rtwn0:
> skip - SSID not known rtwn0: 1: xx:xx:xx:xx:3b:46
> ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24 caps=0x31 level=216
> freq=2412 rtwn0: skip - BSSID ignored (count=3 limit=0) rtwn0: 2:
> xx:xx:xx:xx:a4:a6 ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24
> caps=0x31 level=186 freq=2412 rtwn0: skip - BSSID ignored (count=4
> limit=0) rtwn0: 3: xx:xx:xx:xx:a4:a4 ssid='' wpa_ie_len=0
> rsn_ie_len=20 caps=0x10 level=186 freq=2412 rtwn0: skip - SSID not
> known rtwn0: 4: xx:xx:xx:xx:05:62 ssid='' wpa_ie_len=0 rsn_ie_len=20
> caps=0x11 level=184 freq=2412 rtwn0: skip - SSID not known rtwn0:
> 5: xx:xx:xx:xx:a5:24 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x10
> level=178 freq=2412 rtwn0: skip - SSID not known rtwn0: 6:
> xx:xx:xx:xx:a5:26 ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24
> caps=0x31 level=174 freq=2412 rtwn0: skip - BSSID ignored (count=2
> limit=0) rtwn0: 7: xx:xx:xx:xx:3b:48 ssid='' wpa_ie_len=0
> rsn_ie_len=0 caps=0x21 level=216 freq=2412 rtwn0: skip - SSID not
> known rtwn0: 8: xx:xx:xx:xx:a4:a8 ssid='' wpa_ie_len=0 rsn_ie_len=0
> caps=0x21 level=186 freq=2412 rtwn0: skip - SSID not known rtwn0:
> 9: xx:xx:xx:xx:a5:28 ssid='' wpa_ie_len=0 rsn_ie_len=0 caps=0x21
> level=178 freq=2412 rtwn0: skip - SSID not known rtwn0: No APs
> found - clear BSSID ignore list and try again rtwn0: Removed BSSID
> xx:xx:xx:xx:a5:26 from ignore list (clear) rtwn0: Removed BSSID
> xx:xx:xx:xx:a4:a6 from ignore list (clear) rtwn0: Removed BSSID
> xx:xx:xx:xx:3b:46 from ignore list (clear) rtwn0: Selecting BSS from
> priority group 0 rtwn0: 0: xx:xx:xx:xx:3b:44 ssid='' wpa_ie_len=0
> rsn_ie_len=20 caps=0x10 level=216 freq=2412 rtwn0: skip - SSID not
> known rtwn0: 1: xx:xx:xx:xx:3b:46 ssid='MY_WIFI_NETWORK' wpa_ie_len=0
> rsn_ie_len=24 caps=0x31 level=216 freq=2412 rtwn0: selected based
> on RSN IE rtwn0: MLD: No Multi-Link element
> rtwn0: selected BSS xx:xx:xx:xx:3b:46 ssid='MY_WIFI_NETWORK'
> rtwn0: Considering connect request: reassociate: 0 selected:
> xx:xx:xx:xx:3b:46 bssid: 00:00:00:00:00:00 pending:
> 00:00:00:00:00:00 wpa_state: SCANNING ssid=0xb37f0000
> current_ssid=0x0 rtwn0: Request association with xx:xx:xx:xx:3b:46
> rtwn0: Re-association to the same ESS rtwn0: No ongoing scan/p2p-scan
> found to abort rtwn0: Add radio work 'connect'@0xb3661f40 rtwn0:
> First radio work item in the queue - schedule start immediately
> rtwn0: Starting radio work 'connect'@0xb3661f40 after 0.000151 second
> wait rtwn0: WPA: clearing own WPA/RSN IE rtwn0: RSN: clearing own
> RSNXE RSN: PMKSA cache search - network_ctx=0xb37f0000
> try_opportunistic=0 akmp=0x0 RSN: Search for BSSID xx:xx:xx:xx:3b:46
> RSN: No PMKSA cache entry found
> rtwn0: RSN: using IEEE 802.11i/D9.0
> rtwn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
> proto 2 rtwn0: WPA: Selected mgmt group cipher 32
> rtwn0: WPA: clearing AP WPA IE
> WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
> rtwn0: WPA: clearing AP RSNXE
> rtwn0: WPA: AP group 0x10 network profile group 0x18; available
> group 0x10 rtwn0: WPA: using GTK CCMP
> rtwn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
> available pairwise 0x10 rtwn0: WPA: using PTK CCMP
> rtwn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
> key_mgmt 0x2 rtwn0: WPA: using KEY_MGMT WPA-PSK
> rtwn0: WPA: AP mgmt_group_cipher 0x20 network profile
> mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 rtwn0: WPA:
> not using MGMT group cipher WPA: Set own WPA IE default -
> hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
> hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
> WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
> rtwn0: Automatic auth_alg selection: 0x1
> No supported operating classes IE to add
> rtwn0: Trying to associate with xx:xx:xx:xx:3b:46
> (SSID='MY_WIFI_NETWORK' freq=2412 MHz) rtwn0: Cancelling scan request
> rtwn0: State: SCANNING -> ASSOCIATING
> Limit connection to BSSID xx:xx:xx:xx:3b:46 freq=2412 MHz based on
> scan results (bssid_set=0 wps=0) PSK (set in config) -
> hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
> 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
> wpa_driver_bsd_set_drop_unencrypted: enabled=1
> wpa_driver_bsd_associate: set PRIVACY 1 rtwn0: Setting authentication
> timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> rtwn0: Event ASSOC (0) received
> rtwn0: State: ASSOCIATING -> ASSOCIATED
> rtwn0: Associated to a new BSS: BSSID=xx:xx:xx:xx:3b:46
> rtwn0: Associated with xx:xx:xx:xx:3b:46
> rtwn0: WPA: Association event - clear replay counter
> rtwn0: WPA: Clear old PTK
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: enable timer tick
> EAPOL: SUPP_BE entering state IDLE
> rtwn0: Setting authentication timeout: 10 sec 0 usec
> rtwn0: Cancelling scan request
> rtwn0: Event DISASSOC (1) received
> rtwn0: Disassociation notification
> rtwn0: CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:xx:3b:46 reason=0
> rtwn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6)
> rtwn0: Setting scan request: 0.100000 sec
> rtwn0: Radio work 'connect'@0xb3661f40 done in 0.031572 seconds
> rtwn0: radio_work_free('connect'@0xb3661f40): num_active_works --> 0
> rtwn0: Added BSSID xx:xx:xx:xx:3b:46 into ignore list, ignoring for
> 10 seconds rtwn0: Another BSS in this ESS has been seen; try it next
> rtwn0: BSSID xx:xx:xx:xx:3b:46 ignore list count incremented to 2,
> ignoring for 10 seconds Continuous association failures - consider
> temporary network disabling rtwn0: CTRL-EVENT-SSID-TEMP-DISABLED id=0
> ssid="MY_WIFI_NETWORK" auth_failures=3 duration=52 reason=CONN_FAILED
> rtwn0: Consecutive connection failures: 6 --> request scan in 10000
> ms rtwn0: Ignore new scan request for 10.000000 sec since an earlier
> request is scheduled to trigger sooner rtwn0: WPA: Clear old PMK and
> PTK rtwn0: Disconnect event - remove keys rtwn0: State: ASSOCIATED ->
> DISCONNECTED EAPOL: External notification - portEnabled=0
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: Supplicant port status: Unauthorized
> EAPOL: SUPP_BE entering state INITIALIZE
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> rtwn0: State: DISCONNECTED -> SCANNING
> rtwn0: Starting AP scan for wildcard SSID
> rtwn0: Optimize scan based on previously generated frequency list
> rtwn0: Add radio work 'scan'@0xb3661f40
> rtwn0: First radio work item in the queue - schedule start
> immediately rtwn0: Starting radio work 'scan'@0xb3661f40 after
> 0.000139 second wait wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> EAPOL: startWhen --> 0
> EAPOL: disable timer tick
> rtwn0: Event SCAN_RESULTS (3) received
> Received 808 bytes of scan results (10 BSSes)
> rtwn0: BSS: Start scan result update 9
> BSS: last_scan_res_used=10/32
> rtwn0: New scan results available (own=0 ext=0)
> rtwn0: Radio work 'scan'@0xb3661f40 done in 4.875490 seconds
> rtwn0: radio_work_free('scan'@0xb3661f40): num_active_works --> 0
> rtwn0: Postpone network selection by 47 seconds since all networks
> are disabled rtwn0: Try to associate due to network getting re-enabled
> Fast associate: Old scan results
> rtwn0: Setting scan request: 0.000000 sec
> Scan SSID - hexdump_ascii(len=16):
> XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d MY_WIFI_NETWORK
> rtwn0: Starting AP scan for wildcard SSID (Interleave with specific)
> rtwn0: Add radio work 'scan'@0xb3661f40
> rtwn0: First radio work item in the queue - schedule start
> immediately rtwn0: Starting radio work 'scan'@0xb3661f40 after
> 0.000136 second wait wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> rtwn0: Event SCAN_RESULTS (3) received
> Received 720 bytes of scan results (9 BSSes)
> rtwn0: BSS: Start scan result update 10
> BSS: last_scan_res_used=9/32
> rtwn0: New scan results available (own=0 ext=0)
> rtwn0: Radio work 'scan'@0xb3661f40 done in 4.833467 seconds
> rtwn0: radio_work_free('scan'@0xb3661f40): num_active_works --> 0
> rtwn0: CTRL-EVENT-SSID-REENABLED id=0 ssid="MY_WIFI_NETWORK"
> Mark BSSID xx:xx:xx:xx:3b:46 ignored to allow a lower priority BSS,
> if any, to be tried next rtwn0: BSSID xx:xx:xx:xx:3b:46 ignore list
> count incremented to 3, ignoring for 60 seconds rtwn0: Selecting BSS
> from priority group 0 rtwn0: 0: xx:xx:xx:xx:3b:46
> ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24 caps=0x31 level=216
> freq=2412 rtwn0: skip - BSSID ignored (count=3 limit=0) rtwn0: 1:
> xx:xx:xx:xx:3b:44 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x10
> level=216 freq=2412 rtwn0: skip - SSID not known rtwn0: 2:
> xx:xx:xx:xx:a4:a6 ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24
> caps=0x31 level=190 freq=2412 rtwn0: selected based on RSN IE
> rtwn0: MLD: No Multi-Link element rtwn0: selected BSS
> xx:xx:xx:xx:a4:a6 ssid='MY_WIFI_NETWORK' rtwn0: Considering connect
> request: reassociate: 0 selected: xx:xx:xx:xx:a4:a6 bssid:
> 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
> ssid=0xb37f0000 current_ssid=0x0 rtwn0: Request association with
> xx:xx:xx:xx:a4:a6 rtwn0: Re-association to the same ESS rtwn0: No
> ongoing scan/p2p-scan found to abort rtwn0: Add radio work
> 'connect'@0xb3661f40 rtwn0: First radio work item in the queue -
> schedule start immediately rtwn0: Starting radio work
> 'connect'@0xb3661f40 after 0.000148 second wait rtwn0: WPA: clearing
> own WPA/RSN IE rtwn0: RSN: clearing own RSNXE RSN: PMKSA cache search
> - network_ctx=0xb37f0000 try_opportunistic=0 akmp=0x0 RSN: Search for
> BSSID xx:xx:xx:xx:a4:a6 RSN: No PMKSA cache entry found
> rtwn0: RSN: using IEEE 802.11i/D9.0
> rtwn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
> proto 2 rtwn0: WPA: Selected mgmt group cipher 32
> rtwn0: WPA: clearing AP WPA IE
> WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
> rtwn0: WPA: clearing AP RSNXE
> rtwn0: WPA: AP group 0x10 network profile group 0x18; available
> group 0x10 rtwn0: WPA: using GTK CCMP
> rtwn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
> available pairwise 0x10 rtwn0: WPA: using PTK CCMP
> rtwn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
> key_mgmt 0x2 rtwn0: WPA: using KEY_MGMT WPA-PSK
> rtwn0: WPA: AP mgmt_group_cipher 0x20 network profile
> mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 rtwn0: WPA:
> not using MGMT group cipher WPA: Set own WPA IE default -
> hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
> hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
> WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
> rtwn0: Automatic auth_alg selection: 0x1
> No supported operating classes IE to add
> rtwn0: Trying to associate with xx:xx:xx:xx:a4:a6
> (SSID='MY_WIFI_NETWORK' freq=2412 MHz) rtwn0: Cancelling scan request
> rtwn0: State: SCANNING -> ASSOCIATING
> Limit connection to BSSID xx:xx:xx:xx:a4:a6 freq=2412 MHz based on
> scan results (bssid_set=0 wps=0) PSK (set in config) -
> hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
> 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
> wpa_driver_bsd_set_drop_unencrypted: enabled=1
> wpa_driver_bsd_associate: set PRIVACY 1 rtwn0: Setting authentication
> timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> rtwn0: Event ASSOC (0) received
> rtwn0: State: ASSOCIATING -> ASSOCIATED
> rtwn0: Associated to a new BSS: BSSID=xx:xx:xx:xx:a4:a6
> rtwn0: Associated with xx:xx:xx:xx:a4:a6
> rtwn0: WPA: Association event - clear replay counter
> rtwn0: WPA: Clear old PTK
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: enable timer tick
> EAPOL: SUPP_BE entering state IDLE
> rtwn0: Setting authentication timeout: 10 sec 0 usec
> rtwn0: Cancelling scan request
> rtwn0: RX EAPOL from xx:xx:xx:xx:a4:a6 (encrypted=-1)
> RX EAPOL - hexdump(len=99): [...REDACTED...]
> rtwn0: Setting authentication timeout: 10 sec 0 usec
> rtwn0: IEEE 802.1X RX: version=2 type=3 length=95
> WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
> rtwn0: EAPOL-Key type=2
> rtwn0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> rtwn0: key_length=16 key_data_length=0
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> rtwn0: WPA: RX message 1 of 4-Way Handshake from xx:xx:xx:xx:a4:a6
> (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
> rtwn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
> Get randomness: len=32 entropy=62
> WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
> WPA: PTK derivation using PRF(SHA1)
> WPA: PTK derivation - A1=74:de:2b:c1:f1:62 A2=xx:xx:xx:xx:a4:a6
> WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
> WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=48): [REMOVED]
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: KEK - hexdump(len=16): [REMOVED]
> WPA: TK - hexdump(len=16): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
> WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
> rtwn0: WPA: Sending EAPOL-Key 2/4
> WPA: Send EAPOL-Key frame to xx:xx:xx:xx:a4:a6 ver=2 mic_len=16
> key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
> WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
> rtwn0: RX EAPOL from xx:xx:xx:xx:a4:a6 (encrypted=-1)
> RX EAPOL - hexdump(len=163): [...REDACTED...]
> rtwn0: IEEE 802.1X RX: version=2 type=3 length=159
> WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
> rtwn0: EAPOL-Key type=2
> rtwn0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
> MIC Secure Encr) rtwn0: key_length=16 key_data_length=64
> replay_counter - hexdump(len=8): [...REDACTED...]
> key_nonce - hexdump(len=32): [...REDACTED...]
> key_iv - hexdump(len=16): [...REDACTED...]
> key_rsc - hexdump(len=8): [...REDACTED...]
> key_id (reserved) - hexdump(len=8): [...REDACTED...]
> key_mic - hexdump(len=16): [...REDACTED...]
> WPA: EAPOL-Key MIC using HMAC-SHA1
> RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
> WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
> WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
> rtwn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> rtwn0: RSN: RX message 3 of 4-Way Handshake from xx:xx:xx:xx:a4:a6
> (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
> WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
> WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
> WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
> rtwn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
> msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
> RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
> rtwn0: Request to deauthenticate - bssid=xx:xx:xx:xx:a4:a6
> pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
> state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> bsd_send_mlme_param: op=3 reason=17 addr=xx:xx:xx:xx:a4:a6 rtwn0:
> Event DEAUTH (11) received rtwn0: Deauthentication notification
> rtwn0: * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
> Deauthentication frame IE(s) - hexdump(len=0): [NULL] rtwn0:
> CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:xx:a4:a6 reason=17
> locally_generated=1 rtwn0: Auto connect enabled: try to reconnect
> (wps=0/0 wpa_state=7) rtwn0: Setting scan request: 0.100000 sec
> rtwn0: Radio work 'connect'@0xb3661f40 done in 0.071848 seconds
> rtwn0: radio_work_free('connect'@0xb3661f40): num_active_works --> 0
> rtwn0: Added BSSID xx:xx:xx:xx:a4:a6 into ignore list, ignoring for
> 10 seconds rtwn0: Another BSS in this ESS has been seen; try it next
> rtwn0: BSSID xx:xx:xx:xx:a4:a6 ignore list count incremented to 2,
> ignoring for 10 seconds Continuous association failures - consider
> temporary network disabling rtwn0: CTRL-EVENT-SSID-TEMP-DISABLED id=0
> ssid="MY_WIFI_NETWORK" auth_failures=4 duration=94 reason=CONN_FAILED
> rtwn0: Consecutive connection failures: 7 --> request scan in 10000
> ms rtwn0: Ignore new scan request for 10.000000 sec since an earlier
> request is scheduled to trigger sooner rtwn0: WPA: Clear old PMK and
> PTK rtwn0: Disconnect event - remove keys rtwn0: State:
> 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External notification -
> portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL:
> Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state
> INITIALIZE EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> rtwn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> QM: Clear all active DSCP policies
> rtwn0: CTRL-EVENT-DSCP-POLICY clear_all
> rtwn0: Ignore new scan request for 5.000000 sec since an earlier
> request is scheduled to trigger sooner rtwn0: Request to
> deauthenticate - bssid=00:00:00:00:00:00
> pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
> state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
> rtwn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
> notification - portEnabled=0 EAPOL: External notification -
> portValid=0 QM: Clear all active DSCP policies rtwn0:
> CTRL-EVENT-DSCP-POLICY clear_all rtwn0: Ignore new scan request for
> 5.000000 sec since an earlier request is scheduled to trigger sooner
> rtwn0: Event DISASSOC (1) received rtwn0: Disassociation notification
> rtwn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
> rtwn0: Do not request new immediate scan rtwn0: WPA: Clear old PMK
> and PTK rtwn0: Disconnect event - remove keys
> rtwn0: State: DISCONNECTED -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> rtwn0: State: DISCONNECTED -> SCANNING
> Scan SSID - hexdump_ascii(len=16):
> XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d MY_WIFI_NETWORK
> rtwn0: Starting AP scan for specific SSID: MY_WIFI_NETWORK
> rtwn0: Optimize scan based on previously generated frequency list
> rtwn0: Add radio work 'scan'@0xb3661f40
> rtwn0: First radio work item in the queue - schedule start
> immediately rtwn0: Starting radio work 'scan'@0xb3661f40 after
> 0.000137 second wait wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> EAPOL: startWhen --> 0
> EAPOL: disable timer tick
> rtwn0: Event SCAN_RESULTS (3) received
> Received 808 bytes of scan results (10 BSSes)
> rtwn0: BSS: Start scan result update 11
> BSS: last_scan_res_used=10/32
> rtwn0: New scan results available (own=0 ext=0)
> rtwn0: Radio work 'scan'@0xb3661f40 done in 4.884383 seconds
> rtwn0: radio_work_free('scan'@0xb3661f40): num_active_works --> 0
> rtwn0: Postpone network selection by 89 seconds since all networks
> are disabled
> --MP_/=AqH6GaA0+Un68Q7y46V_tI--
>
>
Home |
Main Index |
Thread Index |
Old Index