NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: port-i386/59908 - WiFi fails to associate on 11.0-RC1



The following reply was made to PR port-i386/59908; it has been noted by GNATS.

From: "requiem." <rqm%0xde501a7a.net@localhost>
To: gnats-bugs%netbsd.org@localhost
Cc: 
Subject: Re: port-i386/59908 - WiFi fails to associate on 11.0-RC1
Date: Fri, 13 Feb 2026 19:31:20 +0000

 After some longer troubleshooting with the help of some kind people on
 IRC, the problem was narrowed down to the changed behaviour in
 wpa_supplicant 2.11 regarding the SSID protection to counter
 CVE-2023-52424.
 
 The issue was that the local eero routers (!) I was trying to connect
 to seem to have some wonky behaviour, sometimes returning empty
 responses, which is why the logs had these lines:
  RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]       
 
 This then triggered wpa_supplicant 2.11's SSID protection.
 
 Apparently this behaviour is related to running a WPA3/WPA2 mixed mode
 network with eero's.
 
 What seems to have fixed it is forcing wpa_supplicant.conf to use WPA2
 only and to disable ieee80211w:
 
 ```/etc/wpa_supplicant.conf
 
 network={
 	ssid=MY_NETWORK
 	scan_ssid=1
 	psk="My1337passw0rd!"
 	key_mgmt=WPA-PSK
 	proto=RSN
 	pairwise=CCMP
 	group=CCMP
 	ieee80211w=0
 }
 ```
 
 Specifying the above in the config then resetting the interface with
 ifconfig, killing any existing wpa_supplicant abd dhcpcd processes the
 installer may have launched, then connecting with wpa_supplicant and
 starting dhcpcd manually got me a working network in the installer. The
 11.0RC1 install succeeded well and WiFi worked perfectly on first boot.
 
 So the problem was NOT NetBSD's side, but a result of changed
 behaviour in wpa_supplicant(8) and the particular eccentricities of the
 eero mesh access point that I will now probably replace with great
 speed...
 
 The issue can be closed.
 
 
 On Fri, 13 Feb 2026 16:50:01 +0000 (UTC)
 "requiem. via gnats" <gnats-admin%NetBSD.org@localhost> wrote:
 
 > The following reply was made to PR port-i386/59908; it has been noted
 > by GNATS.
 > 
 > From: "requiem." <rqm%0xde501a7a.net@localhost>
 > To: gnats-bugs%netbsd.org@localhost
 > Cc: 
 > Subject: Re: port-i386/59908 - WiFi fails to associate on 11.0-RC1
 > Date: Fri, 13 Feb 2026 16:46:57 +0000
 > 
 >  --MP_/=AqH6GaA0+Un68Q7y46V_tI
 >  Content-Type: text/plain; charset=US-ASCII
 >  Content-Transfer-Encoding: 7bit
 >  Content-Disposition: inline
 >  
 >  Hello,
 >  
 >  With the release of 11.0-RC1 I checked whether the dissociation loop
 >  still occurs, and, I am sad to report, it does.
 >  
 >  Here are some fresh logs, but in all honesty, there isn't much change
 >  in behaviour.
 >  
 >  For testing I swapped out the wifi card with an rtwn supported one,
 >  same behaviour. This makes me think there is something else going on,
 >  it isn't the athn0 driver that is causing the issues, but something
 >  else.
 >  
 >  What seems to be common is that it keeps throwing an
 > IE_IN_4WAY_DIFFERS error. I don't know why this happens.
 >  
 >  I attach logs for both devices, as well as a dmesg/sysctl/pcictl
 > dump. 
 >  I'm afraid my diagnostic capabilities stop here, I would be open to
 >  suggestions as to what more can I do?
 >  
 >  requiem
 >  
 >  
 >  
 >  
 >  
 >  --MP_/=AqH6GaA0+Un68Q7y46V_tI
 >  Content-Type: text/plain
 >  Content-Transfer-Encoding: 7bit
 >  Content-Disposition: attachment; filename=dmesg_2026-02-13.txt
 >  
 >  [     1.000000] Copyright (c) 1996, 1997, 1998, 1999, 2000, 2001,
 > 2002, 2003, [     1.000000]     2004, 2005, 2006, 2007, 2008, 2009,
 > 2010, 2011, 2012, 2013, [     1.000000]     2014, 2015, 2016, 2017,
 > 2018, 2019, 2020, 2021, 2022, 2023, [     1.000000]     2024
 >  [     1.000000]     The NetBSD Foundation, Inc.  All rights reserved.
 >  [     1.000000] Copyright (c) 1982, 1986, 1989, 1991, 1993
 >  [     1.000000]     The Regents of the University of California.
 > All rights reserved. 
 >  [     1.000000] NetBSD 10.1 (GENERIC) #0: Mon Dec 16 13:08:11 UTC
 > 2024 [     1.000000]
 > mkrepro%mkrepro.NetBSD.org@localhost:/usr/src/sys/arch/i386/compile/GENERIC [
 >   1.000000] total memory = 1015 MB [     1.000000] avail memory = 973
 > MB [     1.000000] timecounter: Timecounters tick every 10.000 msec
 >  [     1.000000] Kernelized RAIDframe activated
 >  [     1.000000] timecounter: Timecounter "i8254" frequency 1193182
 > Hz quality 100 [     1.000004] mainbus0 (root)
 >  [     1.000004] ACPI: RSDP 0x00000000000F9C50 000014 (v00 ACPIAM)
 >  [     1.000004] ACPI: RSDT 0x000000003F7B0000 000040 (v01 HPQOEM
 > SLIC-CPC 20100430 MSFT 00000097) [     1.000004] ACPI: FACP
 > 0x000000003F7B0200 000084 (v02 HPQOEM SLIC-CPC 20100430 MSFT
 > 00000097) [     1.000004] ACPI: DSDT 0x000000003F7B0430 008042 (v01
 > 361A0  361A0F16 00000F16 INTL 20060317) [     1.000004] ACPI: FACS
 > 0x000000003F7BE000 000040 [     1.000004] ACPI: ????
 > 0x00000000FFFD5600 FFFFFFFF (v255 ?????? ???????? FFFFFFFF ????
 > FFFFFFFF) [     1.000004] ACPI: APIC 0x000000003F7B0390 00005C (v01
 > HPQOEM APIC1004 20100430 MSFT 00000097) [     1.000004] ACPI: MCFG
 > 0x000000003F7B03F0 00003C (v01 HPQOEM OEMMCFG  20100430 MSFT
 > 00000097) [     1.000004] ACPI: OEMB 0x000000003F7BE040 000224 (v01
 > HPQOEM OEMB1004 20100430 MSFT 00000097) [     1.000004] ACPI: ASF!
 > 0x000000003F7B8480 000075 (v32 LEGEND I865PASF 00000001 INTL
 > 20060317) [     1.000004] ACPI: SSDT 0x000000003F7BEBE0 0004F0 (v01
 > PmRef  CpuPm    00003000 INTL 20060317) [     1.000004] ACPI: 2 ACPI
 > AML tables successfully acquired and loaded [     1.000004] ioapic0
 > at mainbus0 apid 2: pa 0xfec00000, version 0x20, 24 pins [
 > 1.000004] cpu0 at mainbus0 apid 0 [     1.000004] cpu0: Use lfence to
 > serialize rdtsc [     1.000004] cpu0: Intel(R) Atom(TM) CPU N270   @
 > 1.60GHz, id 0x106c2 [     1.000004] cpu0: node 0, package 0, core 0,
 > smt 0 [     1.000004] cpu1 at mainbus0 apid 1 [     1.000004] cpu1:
 > Intel(R) Atom(TM) CPU N270   @ 1.60GHz, id 0x106c2 [     1.000004]
 > cpu1: node 0, package 0, core 0, smt 1 [     1.000004] acpi0 at
 > mainbus0: Intel ACPICA 20221020 [     1.000004] acpi0: X/RSDT: OemId
 > <HPQOEM,SLIC-CPC,20100430>, AslId <MSFT,00000097> [     1.000004]
 > acpi0: MCFG: segment 0, bus 0-63, address 0x00000000e0000000 [
 > 1.000004] ACPI: Dynamic OEM Table Load: [     1.000004] ACPI: SSDT
 > 0x00000000C2DC3084 00023C (v01 PmRef  Cpu0Ist  00003000 INTL
 > 20060317) [     1.000004] ACPI: Dynamic OEM Table Load: [
 > 1.000004] ACPI: SSDT 0x00000000C2DC5004 0005D0 (v01 PmRef  Cpu0Cst
 > 00003001 INTL 20060317) [     1.000004] ACPI: Dynamic OEM Table Load:
 > [     1.000004] ACPI: SSDT 0x00000000C2D38B04 0000CC (v01 PmRef
 > Cpu1Ist  00003000 INTL 20060317) [     1.000004] ACPI: Dynamic OEM
 > Table Load: [     1.000004] ACPI: SSDT 0x00000000C2DBD7C4 000085 (v01
 > PmRef  Cpu1Cst  00003000 INTL 20060317) [     1.000004] acpi0: SCI
 > interrupting at int 9 [     1.000004] acpi0: fixed power button
 > present [     1.000004] timecounter: Timecounter "ACPI-Fast"
 > frequency 3579545 Hz quality 1000 [     1.015079] acpiec0 at acpi0
 > (EC0, PNP0C09): io 0x62,0x66 [     1.015079] MCH (PNP0C01) at acpi0
 > not configured [     1.015079] attimer1 at acpi0 (TMR, PNP0100): io
 > 0x40-0x43 irq 0 [     1.015079] pckbc1 at acpi0 (PS2K, PNP0303) (kbd
 > port): io 0x60,0x64 irq 1 [     1.015079] pckbc2 at acpi0 (PS2M,
 > SYN1E02) (aux port): irq 12 [     1.015079] pcppi1 at acpi0 (SPKR,
 > PNP0800): io 0x61 [     1.015079] midi0 at pcppi1: PC speaker [
 > 1.015079] sysbeep0 at pcppi1 [     1.015079] COPR (PNP0C04) at acpi0
 > not configured [     1.015079] acpibat0 at acpi0 (BAT1, PNP0C0A-1):
 > ACPI Battery [     1.015079] acpiacad0 at acpi0 (AC0, ACPI0003): ACPI
 > AC Adapter [     1.015079] acpivga0 at acpi0 (IGD): ACPI Display
 > Adapter [     1.015079] acpiout0 at acpivga0 (LCD, 0x0110): ACPI
 > Display Output Device [     1.015079] acpiout1 at acpivga0 (CRT,
 > 0x0100): ACPI Display Output Device [     1.015079] acpivga0:
 > connected output devices: [     1.015079] acpivga0:   0x0110
 > (acpiout0): LCD Panel, head 0, bios detect [     1.015079] acpivga0:
 >  0x0100 (acpiout1): Ext. Monitor, head 0, bios detect [     1.015079]
 > acpilid0 at acpi0 (LID, PNP0C0D): ACPI Lid Switch [     1.015079]
 > acpibut0 at acpi0 (SLPB, PNP0C0E): ACPI Sleep Button [     1.015079]
 > RMEM (PNP0C01) at acpi0 not configured [     1.015079] acpiwmi0 at
 > acpi0 (WMID, PNP0C14-0): ACPI WMI Interface [     1.015079] wmihp0 at
 > acpiwmi0: HP WMI mappings [     1.015079] acpibut1 at acpi0 (PWRB,
 > PNP0C0C-170): ACPI Power Button [     1.015079] acpitz0 at acpi0
 > (THRM): cpu0 cpu1 [     1.015079] acpitz0: levels: critical 93.0 C,
 > passive 85.0 C, passive cooling [     1.015079] apm0 at acpi0: Power
 > Management spec V1.2 [     1.015079] ACPI: Enabled 1 GPEs in block 00
 > to 1F [     1.015079] pckbd0 at pckbc1 (kbd slot) [     1.015079]
 > pckbc1: using irq 1 for kbd slot [     1.015079] wskbd0 at pckbd0:
 > console keyboard [     1.015079] pms0 at pckbc1 (aux slot) [
 > 1.015079] pms0: Synaptics touchpad version 7.2 [     1.015079] pms0:
 > Palm detect, Reports max [     1.015079] pms0: Probed max coordinates
 > right: 5856, top: 4890 [     1.015079] pckbc1: using irq 12 for aux
 > slot [     1.015079] wsmouse0 at pms0 mux 0 [     1.015079] attimer1:
 > attached to pcppi1 [     1.015079] pci0 at mainbus0 bus 0:
 > configuration mode 1 [     1.015079] pci0: i/o space, memory space
 > enabled, rd/line, rd/mult, wr/inv ok [     1.015079] pchb0 at pci0
 > dev 0 function 0: Intel 82945GME Host Bridge (rev. 0x03) [
 > 1.015079] agp0 at pchb0: i915-family chipset [     1.015079] agp0:
 > detected 7932k stolen memory [     1.015079] agp0: aperture at
 > 0xd0000000, size 0x10000000 [     1.015079] i915drmkms0 at pci0 dev 2
 > function 0: Intel 82945GME Integrated Graphics Device (rev. 0x03) [
 >   1.015079] Intel 82945GM/PM/GMS Integrated Graphics Device
 > (miscellaneous display, revision 0x03) at pci0 dev 2 function 1 not
 > configured [     1.015079] hdaudio0 at pci0 dev 27 function 0: HD
 > Audio Controller [     1.015079] hdaudio0: interrupting at msi0 vec 0
 > [     1.015079] hdaudio0: HDA ver. 1.0, OSS 4, ISS 4, BSS 0, SDO 1,
 > 64-bit [     1.015079] hdafg0 at hdaudio0: Sigmatel 92HD75B2X5 [
 > 1.015079] hdafg0: DAC00 2ch: Speaker [Built-In], HP Out [Jack] [
 > 1.015079] hdafg0: ADC01 2ch: Mic In [Jack] [Built-In] [     1.015079]
 > hdafg0: 2ch/2ch 44100Hz 48000Hz 88200Hz 96000Hz 192000Hz PCM16 PCM20
 > PCM24 AC3 [     1.015079] audio0 at hdafg0: playback, capture, full
 > duplex, independent [     1.015079] audio0: slinear_le:16 2ch
 > 48000Hz, blk 1920 bytes (10ms) for playback [     1.015079] audio0:
 > slinear_le:16 2ch 48000Hz, blk 1920 bytes (10ms) for recording [
 > 1.015079] ppb0 at pci0 dev 28 function 0: Intel 82801GB/GR PCI
 > Express Port #1 (rev. 0x02) [     1.015079] ppb0: PCI Express
 > capability version 1 <Root Port of PCI-E Root Complex> x1 @ 2.5GT/s [
 >     1.015079] pci1 at ppb0 bus 1 [     1.015079] pci1: i/o space,
 > memory space enabled, rd/line, wr/inv ok [     1.015079] athn0 at
 > pci1 dev 0 function 0: Atheros AR9280 [     1.015079] athn0: rev 2
 > (2T2R), ROM rev 22, address 74:e5:43:19:a9:b1 [     1.015079] athn0:
 > interrupting at ioapic0 pin 16 [     1.015079] ppb1 at pci0 dev 28
 > function 1: Intel 82801GB/GR PCI Express Port #2 (rev. 0x02) [
 > 1.015079] ppb1: PCI Express capability version 1 <Root Port of PCI-E
 > Root Complex> x1 @ 2.5GT/s [     1.015079] pci2 at ppb1 bus 2 [
 > 1.015079] pci2: i/o space, memory space enabled, rd/line, wr/inv ok [
 >     1.015079] mskc0 at pci2 dev 0 function 0, Yukon-2 FE+ rev. A0
 > (0x0) [     1.015079] mskc0: interrupting at msi1 vec 0 [
 > 1.015079] msk0 at mskc0 port A: Ethernet address 00:24:81:3b:4e:5b [
 >    1.015079] makphy0 at msk0 phy 0: Marvell 88E3016 10/100 Fast
 > Ethernet PHY, rev. 0 [     1.015079] makphy0: 10baseT, 10baseT-FDX,
 > 100baseTX, 100baseTX-FDX, auto [     1.015079] uhci0 at pci0 dev 29
 > function 0: Intel 82801GB/GR USB UHCI Controller (rev. 0x02) [
 > 1.015079] uhci0: interrupting at ioapic0 pin 23 [     1.015079] usb0
 > at uhci0: USB revision 1.0 [     1.015079] uhci1 at pci0 dev 29
 > function 1: Intel 82801GB/GR USB UHCI Controller (rev. 0x02) [
 > 1.015079] uhci1: interrupting at ioapic0 pin 19 [     1.015079] usb1
 > at uhci1: USB revision 1.0 [     1.015079] uhci2 at pci0 dev 29
 > function 2: Intel 82801GB/GR USB UHCI Controller (rev. 0x02) [
 > 1.015079] uhci2: interrupting at ioapic0 pin 18 [     1.015079] usb2
 > at uhci2: USB revision 1.0 [     1.015079] uhci3 at pci0 dev 29
 > function 3: Intel 82801GB/GR USB UHCI Controller (rev. 0x02) [
 > 1.015079] uhci3: interrupting at ioapic0 pin 16 [     1.015079] usb3
 > at uhci3: USB revision 1.0 [     1.015079] ehci0 at pci0 dev 29
 > function 7: Intel 82801GB/GR USB EHCI Controller (rev. 0x02) [
 > 1.015079] ehci0: 64-bit DMA - limited [     1.015079] ehci0:
 > interrupting at ioapic0 pin 23 [     1.015079] ehci0: EHCI version
 > 1.0 [     1.015079] ehci0: 4 companion controllers, 2 ports each:
 > uhci0 uhci1 uhci2 uhci3 [     1.015079] ehci0: Using DMA subregion
 > for control data structures [     1.015079] usb4 at ehci0: USB
 > revision 2.0 [     1.015079] ppb2 at pci0 dev 30 function 0: Intel
 > 82801BAM Hub-PCI Bridge (rev. 0xe2) [     1.015079] pci3 at ppb2 bus
 > 3 [     1.015079] pci3: i/o space, memory space enabled [
 > 1.015079] ichlpcib0 at pci0 dev 31 function 0: Intel 82801GBM LPC
 > Interface Bridge (rev. 0x02) [     1.015079] timecounter: Timecounter
 > "ichlpcib0" frequency 3579545 Hz quality 1000 [     1.015079]
 > ichlpcib0: 24-bit timer [     1.015079] tco0 at ichlpcib0: TCO
 > (watchdog) timer configured. [     1.015079] tco0: Min/Max interval
 > 1/367 seconds [     1.015079] piixide0 at pci0 dev 31 function 1:
 > Intel 82801GB/GR IDE Controller (ICH7) (rev. 0x02) [     1.015079]
 > piixide0: bus-master DMA support present [     1.015079] piixide0:
 > primary channel configured to compatibility mode [     1.015079]
 > piixide0: primary channel interrupting at ioapic0 pin 14 [
 > 1.015079] atabus0 at piixide0 channel 0 [     1.015079] piixide0:
 > secondary channel configured to compatibility mode [     1.015079]
 > piixide0: secondary channel ignored (disabled) [     1.015079]
 > ichsmb0 at pci0 dev 31 function 3: Intel 82801GB/GR SMBus Controller
 > (rev. 0x02) [     1.015079] ichsmb0: interrupting at ioapic0 pin 19 [
 >     1.015079] iic0 at ichsmb0: I2C bus [     1.015079] isa0 at
 > ichlpcib0 [     1.015079] acpicpu0 at cpu0: ACPI CPU [     1.015079]
 > acpicpu0: C1: FFH, lat   1 us, pow  1000 mW [     1.015079] acpicpu0:
 > C2: FFH, lat   1 us, pow   500 mW [     1.015079] acpicpu0: C3: FFH,
 > lat  57 us, pow   100 mW, bus master check [     1.015079] acpicpu0:
 > P0: FFH, lat  10 us, pow 25000 mW, 1600 MHz [     1.015079] acpicpu0:
 > P1: FFH, lat  10 us, pow 18000 mW, 1333 MHz [     1.015079] acpicpu0:
 > P2: FFH, lat  10 us, pow 11000 mW, 1067 MHz [     1.015079] acpicpu0:
 > P3: FFH, lat  10 us, pow  5000 mW,  800 MHz [     1.015079] coretemp0
 > at cpu0: thermal sensor, 1 C resolution, Tjmax=90 [     1.015079]
 > acpicpu1 at cpu1: ACPI CPU [     1.015079] timecounter: Timecounter
 > "clockinterrupt" frequency 100 Hz quality 0 [     1.015079] wmihp0:
 > autoconfiguration error: failed to get data for event 0x80:
 > AE_BAD_DATA [     2.002196] IPsec: Initialized Security Association
 > Processing. [     2.002196] acpibat0: Hewlett-Packard LION
 > rechargeable battery [     2.002196] acpibat0: granularity: low->warn
 > 0.000 Ah, warn->full 0.100 Ah [     2.012362] uhub0 at usb0: NetBSD
 > (0x0000) UHCI root hub (0x0000), class 9/0, rev 1.00/1.00, addr 1 [
 >   2.012362] uhub0: 2 ports with 2 removable, self powered [
 > 2.012362] uhub1 at usb1: NetBSD (0x0000) UHCI root hub (0x0000),
 > class 9/0, rev 1.00/1.00, addr 1 [     2.012362] uhub1: 2 ports with
 > 2 removable, self powered [     2.012362] uhub2 at usb2: NetBSD
 > (0x0000) UHCI root hub (0x0000), class 9/0, rev 1.00/1.00, addr 1 [
 >   2.012362] uhub2: 2 ports with 2 removable, self powered [
 > 2.012362] uhub3 at usb3: NetBSD (0x0000) UHCI root hub (0x0000),
 > class 9/0, rev 1.00/1.00, addr 1 [     2.012362] uhub3: 2 ports with
 > 2 removable, self powered [     2.012362] uhub4 at usb4: NetBSD
 > (0x0000) EHCI root hub (0x0000), class 9/0, rev 2.00/1.00, addr 1 [
 >   2.012362] uhub4: 8 ports with 8 removable, self powered [
 > 2.012362] acpiacad0: AC adapter online. [     2.462753] wmihp0:
 > autoconfiguration error: failed to get data for event 0x80:
 > AE_BAD_DATA [     3.763896] uvideo0 at uhub4 port 4 configuration 1
 > interface 0: importek (0x10f1) Webcam-101 (0x1a08), rev 2.00/15.12,
 > addr 2 [     3.763896] video0 at uvideo0: importek (0x10f1)
 > Webcam-101 (0x1a08), rev 2.00/15.12, addr 2 [     4.064160] ubt0 at
 > uhub1 port 1 [     4.064160] ubt0: Broadcom Corp (0x13d3) Bluetooth
 > 2.1 module (0x3249), rev 2.00/6.07, addr 2 [     5.085057] wd0 at
 > atabus0 drive 0 [     5.085057] wd0: <SAMSUNG SSD SM841 mSATA 256GB>
 > [     5.085057] wd0: drive supports 16-sector PIO transfers, LBA48
 > addressing [     5.085057] wd0: 238 GB, 496149 cyl, 16 head, 63 sec,
 > 512 bytes/sect x 500118192 sectors [     5.095067] wd0: 32-bit data
 > port [     5.095067] wd0: drive supports PIO mode 4, DMA mode 2,
 > Ultra-DMA mode 6 (Ultra/133), WRITE DMA FUA [     5.095067]
 > wd0(piixide0:0:0): using PIO mode 4, Ultra-DMA mode 5 (Ultra/100)
 > (using DMA), WRITE DMA FUA EXT [     5.095067] swwdog0: software
 > watchdog initialized [     5.095067] WARNING: 2 errors while
 > detecting hardware; check system log. [     5.095067] boot device:
 > wd0 [     5.095067] root on wd0a dumps on wd0b [     5.105191] root
 > file system type: ffs [     5.105191]
 > kern.module.path=/stand/i386/10.1/modules [     5.115121] [drm]
 > Supports vblank timestamp caching Rev 2 (21.10.2013). [     5.115121]
 > [drm] Driver supports precise vblank timestamp query. [     5.115121]
 > [drm] Failed to find VBIOS tables (VBT) [     5.115121] i915drmkms0:
 > interrupting at ioapic0 pin 16 (i915drmkms0) [     5.115121] WARNING:
 > NVRAM century is 19 but RTC year is 2026 [     5.135105] [drm]
 > Initialized overlay support. [     5.135105] [drm] Initialized i915
 > 1.6.0 20200114 for i915drmkms0 on minor 0 [     5.235210] intelfb0 at
 > i915drmkms0 [     5.235210] [drm] DRM_I915_DEBUG enabled [
 > 5.235210] [drm] DRM_I915_DEBUG_GEM enabled [     5.235210] intelfb0:
 > framebuffer at 0xd0009000, size 1024x600, depth 32, stride 4096 [
 > 6.025886] wsdisplay0 at intelfb0 kbdmux 1: console (default, vt100
 > emulation), using wskbd0 [     6.037294] wsmux1: connecting to
 > wsdisplay0 [    32.589234] acpibat0: normal capacity on 'charge
 > state' [    43.028417] wsdisplay0: screen 1 added (default, vt100
 > emulation) [    43.028417] wsdisplay0: screen 2 added (default, vt100
 > emulation) [    43.028417] wsdisplay0: screen 3 added (default, vt100
 > emulation) [    43.028417] wsdisplay0: screen 4 added (default, vt100
 > emulation) [   153.864808] umass0 at uhub4 port 2 configuration 1
 > interface 0 [   153.864808] umass0: SanDisk (0x0781) Cruzer Blade
 > (0x5567), rev 2.00/1.00, addr 3 [   153.864808] umass0: using SCSI
 > over Bulk-Only [   153.864808] scsibus0 at umass0: 2 targets, 1 lun
 > per target [   153.864808] sd0 at scsibus0 target 0 lun 0: <SanDisk,
 > Cruzer Blade, 1.00> disk removable [   153.874865] sd0: 29358 MB,
 > 59648 cyl, 16 head, 63 sec, 512 bytes/sect x 60125184 sectors
 > kern.ostype = NetBSD kern.osrelease = 10.1 kern.osrevision =
 > 1001000000 kern.version = NetBSD 10.1 (GENERIC) #0: Mon Dec 16
 > 13:08:11 UTC 2024
 > mkrepro%mkrepro.NetBSD.org@localhost:/usr/src/sys/arch/i386/compile/GENERIC
 > kern.maxvnodes = 51982 kern.maxproc = 1044 kern.maxfiles = 3404
 > kern.argmax = 262144 kern.securelevel = -1 kern.hostname =
 > tynie.0xde501a7a.xyz kern.hostid = 0 kern.clockrate: tick = 10000,
 > tickadj = 40, hz = 100, profhz = 100, stathz = 100 kern.posix1version
 > = 200112 kern.ngroups = 16 kern.job_control = 1 kern.saved_ids = 0
 >  kern.domainname = 
 >  kern.maxpartitions = 16
 >  kern.rawpartition = 3
 >  kern.rtc_offset = 0
 >  kern.root_device = wd0
 >  kern.msgbufsize = 65520
 >  kern.fsync = 1
 >  kern.synchronized_io = 1
 >  kern.iov_max = 1024
 >  kern.mbuf.msize = 256
 >  kern.mbuf.mclbytes = 2048
 >  kern.mbuf.nmbclusters = 32489
 >  kern.mbuf.mblowat = 16
 >  kern.mbuf.mcllowat = 8
 >  kern.mbuf.nmbclusters_limit = 32768
 >  kern.mapped_files = 1
 >  kern.memlock = 1
 >  kern.memlock_range = 1
 >  kern.memory_protection = 1
 >  kern.login_name_max = 17
 >  kern.defcorename = %n.core
 >  kern.logsigexit = 0
 >  kern.fscale = 2048
 >  kern.ccpu = 1948
 >  kern.cp_time: user = 968, nice = 338, sys = 900, intr = 92, idle =
 > 44710 kern.consdev = ttyE0
 >  kern.maxptys = 992
 >  kern.pipe.maxbigpipes = 32
 >  kern.pipe.nbigpipes = 0
 >  kern.pipe.kvasize = 344064
 >  kern.maxphys = 65536
 >  kern.sbmax = 262144
 >  kern.tkstat.nin = 1180
 >  kern.tkstat.nout = 17901
 >  kern.tkstat.cancc = 15
 >  kern.tkstat.rawcc = 1165
 >  kern.monotonic_clock = 200112
 >  kern.urandom = -1650222921
 >  kern.labelsector = 1
 >  kern.labeloffset = 0
 >  kern.forkfsleep = 0
 >  kern.posix_threads = 200112
 >  kern.posix_semaphores = 200112
 >  kern.posix_barriers = 200112
 >  kern.posix_timers = 200112
 >  kern.posix_spin_locks = 200112
 >  kern.posix_reader_writer_locks = 200112
 >  kern.dump_on_panic = 1
 >  kern.somaxkva = 16777216
 >  kern.root_partition = 0
 >  kern.drivers = [160 -1 crypto], [161 -1 pf], [163 163 fss], [164 -1
 > pps], [165 -1 ptm], [166 -1 atabus], [167 -1 drvctl], [168 168 dk],
 > [169 -1 tap], [170 -1 veriexec], [171 -1 fw], [172 -1 ucycom], [173
 > -1 gpio], [174 -1 utoppy], [175 -1 bthub], [176 -1 amr], [177 -1
 > lockstat], [178 -1 putter], [179 -1 srt], [180 -1 drm], [181 -1 bio],
 > [182 182 altmem], [187 -1 twa], [188 -1 cpuctl], [189 -1 pad], [190
 > 190 zfs], [191 -1 tprof], [192 -1 isv], [193 -1 video], [194 169 dm],
 > [195 -1 hdaudio], [196 -1 uhso], [197 197 rumpblk], [198 -1 npf],
 > [199 199 flash], [200 -1 dtv], [201 -1 iic], [203 -1 iscsi], [204 -1
 > tpm], [205 -1 mfi], [206 -1 seeprom], [207 -1 dtrace], [208 208
 > spiflash], [209 -1 lua], [240 -1 spkr], [340 -1 hdmicec], [341 -1
 > nvme], [342 -1 qemufwcfg], [343 -1 autofs], [344 -1 gpiopps], [345 -1
 > nvmm], [346 -1 kcov], [347 -1 spi], [354 -1 ipmi], [355 -1 vhci],
 > [356 -1 vio9p], [357 -1 fault], [358 -1 wwanc], [359 -1 acpi], [360
 > -1 smbios], [361 -1 efi], [362 -1 sht3xtemp], [363 - 1 scmd], [364 -1
 > viocon], [365 -1 gpioirq], [0 -1 cons], [1 -1 ctty], [2 -1 mem], [3 0
 > wd], [4 1 swap], [5 -1 pts], [6 -1 ptc], [7 -1 log], [8 -1 com], [9 2
 > fd], [10 3 wt], [12 -1 pc], [13 4 sd], [14 5 st], [15 6 cd], [16 -1
 > lpt], [17 -1 ch], [18 16 ccd], [19 -1 ss], [20 -1 uk], [21 -1 apm],
 > [22 -1 filedesc], [23 -1 bpf], [24 17 md], [26 -1 joy], [38 -1 cy],
 > [39 7 mcd], [40 -1 tun], [41 14 vnd], [42 -1 audio], [44 -1 ipl], [46
 > -1 rnd], [47 -1 wsdisplay], [48 -1 wskbd], [49 -1 wsmouse], [55 -1
 > usb], [56 -1 uhid], [57 -1 ulpt], [58 -1 midi], [59 -1 sequencer],
 > [60 -1 vcoda], [61 -1 scsibus], [62 18 raid], [63 -1 esh], [64 -1
 > ugen], [65 -1 wsmux], [66 -1 ucom], [67 -1 sysmon], [69 19 ld], [71
 > -1 bktr], [73 -1 cz], [74 -1 ses], [76 -1 iop], [77 -1 altq], [78 -1
 > mlx], [79 20 ed], [80 -1 mly], [81 -1 wsfont], [82 -1 agp], [83 -1
 > pci], [84 -1 dpti], [85 -1 irframe], [86 -1 cir], [87 -1 radio], [88
 > -1 cmos], [89 -1 clockctl], [91 -1 kttcp], [92 -1 dmoverio], [93 21
 > cgd], [96 -1 dpt], [97 - 1 twe], [99 -1 vmmon], [100 -1 vmnet], [101
 > -1 ksyms], [102 -1 icp], [103 -1 gpib], [104 -1 ppi], [105 22 rd],
 > [106 23 ct], [107 24 mt], [109 -1 vboxguest], [141 -1 xenevt], [142
 > 142 xbd], [143 -1 xencons] kern.cp_id: 0 = 0, 1 = 1
 > kern.hardclock_ticks = 23499 kern.arandom = -675471238
 > kern.ipc.sysvmsg = 1 kern.ipc.sysvsem = 1 kern.ipc.sysvshm = 1
 > kern.ipc.shmmax = 266153984 kern.ipc.shmmni = 128 kern.ipc.shmseg =
 > 128 kern.ipc.shmmaxpgs = 64979 kern.ipc.shm_use_phys = 0
 > kern.ipc.msgmni = 40 kern.ipc.msgseg = 2048 kern.ipc.semmni = 10
 > kern.ipc.semmns = 60 kern.ipc.semmnu = 30 kern.boottime = Fri Feb 13
 > 16:28:13 2026 kern.sofixedbuf = 1 kern.veriexec.verbose = 0
 > kern.veriexec.strict = 0 kern.veriexec.algorithms = SHA256 SHA384
 > SHA512 kern.crypto.aes.selected = Intel SSSE3 vpaes
 > kern.crypto.chacha.selected = x86 SSE2 ChaCha kern.boothowto = 0
 > kern.labelusesmbr = 1 kern.coredump.setid.dump = 0
 > kern.coredump.setid.path = /var/crash/%n.core
 > kern.coredump.setid.owner = 0 kern.coredump.setid.group = 0
 > kern.coredump.setid.mode = 0600 (rw------- ) kern.no_sa_support = 1
 > kern.configname = GENERIC kern.buildinfo = kern.messages = 2
 > kern.pmf.debug.event = 0 kern.pmf.debug.suspend = 0
 > kern.pmf.debug.suspensor = 0 kern.pmf.debug.idle = 0
 > kern.pmf.debug.transition = 0 kern.sched.cacheht_time = 10
 > kern.sched.skim_interval = 10 kern.sched.min_catch = 1
 > kern.sched.timesoftints = 0 kern.sched.kpreempt_pri = 128
 > kern.sched.name = 4.4BSD kern.sched.rtts = 100 kern.sched.pri_min = 0
 > kern.sched.pri_max = 63 kern.timecounter.choice = TSC(q=-100,
 > f=1597400400 Hz) clockinterrupt(q=0, f=100 Hz) lapic(q=-100,
 > f=133117000 Hz) ichlpcib0(q=1000, f=3579545 Hz) ACPI-Fast(q=1000,
 > f=3579545 Hz) i8254(q=100, f=1193182 Hz) dummy(q=-1000000, f=1000000
 > Hz) kern.timecounter.hardware = ACPI-Fast
 > kern.timecounter.timestepwarnings = 0 kern.threadpool.idle_ms = 30000
 > kern.posix_aio = 200112 kern.aio_listio_max = 512 kern.aio_max = 8192
 > kern.posix_msg = 200112 kern.mqueue.mq_open_max = 512
 >  kern.mqueue.mq_prio_max = 32
 >  kern.mqueue.mq_max_msgsize = 16384
 >  kern.mqueue.mq_def_maxmsg = 32
 >  kern.mqueue.mq_max_maxmsg = 512
 >  kern.pset.psets_max = 32
 >  kern.pset.list = 0:1
 >  kern.direct_select = 0
 >  kern.module.autoload = 1
 >  kern.module.autounload_unsafe = 0
 >  kern.module.verbose = 0
 >  kern.module.path = /stand/i386/10.1/modules
 >  kern.module.autotime = 10
 >  kern.sooptions = 0
 >  kern.entropy.collection = 1
 >  kern.entropy.depletion = 0
 >  kern.entropy.consolidate = 0
 >  kern.entropy.gather = 0
 >  kern.entropy.epoch = 4
 >  kern.maxlwp = 4096
 >  kern.uidinfo.proccnt = 12
 >  kern.uidinfo.lwpcnt = 14
 >  kern.uidinfo.lockcnt = 0
 >  kern.uidinfo.semcnt = 2
 >  kern.uidinfo.sbsize = 979072
 >  kern.posix_sched = 200112
 >  kern.detachall = 0
 >  kern.tty.qsize = 1024
 >  kern.bufq.strategies = priocscan fcfs disksort
 >  kern.expose_address = 1
 >  kern.posix.semmax = 128
 >  kern.posix.semcnt = 0
 >  kern.usercrypto = 1
 >  kern.userasymcrypto = 1
 >  kern.cryptodevallowsoft = 1
 >  vm.loadavg: 0.17 0.10 0.04
 >  vm.maxslp = 20
 >  vm.uspace = 8192
 >  vm.minaddress = 0
 >  vm.maxaddress = -1074794496
 >  vm.guard_size = 1048576
 >  vm.thread_guard_size = 65536
 >  vm.user_va0_disable = 1
 >  vm.anonmin = 10
 >  vm.filemin = 10
 >  vm.execmin = 5
 >  vm.anonmax = 80
 >  vm.filemax = 50
 >  vm.execmax = 30
 >  vm.inactivepct = 33
 >  vm.swap_encrypt = 1
 >  vm.bufcache = 15
 >  vm.bufmem = 12599296
 >  vm.bufmem_lowater = 19961344
 >  vm.bufmem_hiwater = 159690752
 >  vfs.generic.maxtypenum = 10
 >  vfs.generic.usermount = 0
 >  vfs.generic.magiclinks = 0
 >  vfs.generic.timestamp_precision = 3
 >  vfs.generic.fstypes = mfs lfs ffs ext2fs nfs umap procfs overlay
 > null kernfs fdesc union tmpfs puffs ptyfs ntfs msdos efs cd9660 coda
 > vfs.generic.dirhash.memused = 0 vfs.generic.dirhash.maxmem = 1048576
 >  vfs.ffs.log_changeopt = 0
 >  vfs.ffs.extattr_autocreate = 1024
 >  vfs.nfs.iothreads = -1
 >  vfs.lfs.flushindir = 1
 >  vfs.lfs.clean_vnhead = 0
 >  vfs.lfs.dostats = 1
 >  vfs.lfs.pagetrip = 0
 >  vfs.lfs.stats.segsused = 0
 >  vfs.lfs.stats.psegwrites = 0
 >  vfs.lfs.stats.psyncwrites = 0
 >  vfs.lfs.stats.pcleanwrites = 0
 >  vfs.lfs.stats.blocktot = 0
 >  vfs.lfs.stats.cleanblocks = 0
 >  vfs.lfs.stats.ncheckpoints = 0
 >  vfs.lfs.stats.nwrites = 0
 >  vfs.lfs.stats.nsync_writes = 0
 >  vfs.lfs.stats.wait_exceeded = 0
 >  vfs.lfs.stats.write_exceeded = 0
 >  vfs.lfs.stats.flush_invoked = 0
 >  vfs.lfs.stats.vflush_invoked = 0
 >  vfs.lfs.stats.clean_inlocked = 0
 >  vfs.lfs.stats.clean_vnlocked = 0
 >  vfs.lfs.stats.segs_reclaimed = 0
 >  vfs.lfs.ignore_lazy_sync = 1
 >  vfs.cd9660.utf8_joliet = 1
 >  vfs.ufs.dirhash.minblocks = 5
 >  vfs.ufs.dirhash.maxmem = 16634816
 >  vfs.ufs.dirhash.memused = 402196
 >  vfs.ufs.dirhash.docheck = 0
 >  vfs.wapbl.flush_disk_cache = 1
 >  vfs.wapbl.verbose_commit = 0
 >  vfs.wapbl.allow_dpofua = 0
 >  vfs.wapbl.journal_iobufs = 4
 >  vfs.sync.delay = 30
 >  vfs.sync.filedelay = 30
 >  vfs.sync.dirdelay = 15
 >  vfs.sync.metadelay = 10
 >  vfs.ulfs.dirhash.minblocks = 5
 >  vfs.ulfs.dirhash.maxmem = 16634816
 >  vfs.ulfs.dirhash.memused = 0
 >  vfs.ulfs.dirhash.docheck = 0
 >  net.local.stream.sendspace = 8192
 >  net.local.stream.recvspace = 8192
 >  net.local.dgram.sendspace = 2048
 >  net.local.dgram.recvspace = 16384
 >  net.local.inflight = 0
 >  net.local.deferred = 0
 >  net.inet.ip.forwarding = 0
 >  net.inet.ip.redirect = 1
 >  net.inet.ip.ttl = 64
 >  net.inet.ip.forwsrcrt = 0
 >  net.inet.ip.directed-broadcast = 0
 >  net.inet.ip.allowsrcrt = 0
 >  net.inet.ip.subnetsarelocal = 1
 >  net.inet.ip.mtudisc = 1
 >  net.inet.ip.anonportmin = 49152
 >  net.inet.ip.anonportmax = 65535
 >  net.inet.ip.mtudisctimeout = 600
 >  net.inet.ip.hostzerobroadcast = 0
 >  net.inet.ip.gifttl = 30
 >  net.inet.ip.lowportmin = 600
 >  net.inet.ip.lowportmax = 1023
 >  net.inet.ip.maxfragpackets = 200
 >  net.inet.ip.grettl = 30
 >  net.inet.ip.checkinterface = 0
 >  net.inet.ip.ifq.len = 0
 >  net.inet.ip.ifq.maxlen = 256
 >  net.inet.ip.ifq.drops = 0
 >  net.inet.ip.random_id = 1
 >  net.inet.ip.do_loopback_cksum = 0
 >  net.inet.ip.dad_count = 3
 >  net.inet.ip.anonportalgo.available = bsd random_start random_pick
 > hash doublehash randinc net.inet.ip.anonportalgo.selected = bsd
 >  net.inet.ip.anonportalgo.reserve = 
 >  net.inet.icmp.maskrepl = 0
 >  net.inet.icmp.returndatabytes = 8
 >  net.inet.icmp.errppslimit = 100
 >  net.inet.icmp.rediraccept = 1
 >  net.inet.icmp.redirtimeout = 600
 >  net.inet.icmp.bmcastecho = 0
 >  net.inet.icmp.dynamic_rt_msg = 0
 >  net.inet.tcp.rfc1323 = 1
 >  net.inet.tcp.sendspace = 32768
 >  net.inet.tcp.recvspace = 32768
 >  net.inet.tcp.mssdflt = 536
 >  net.inet.tcp.syn_cache_limit = 10255
 >  net.inet.tcp.syn_bucket_limit = 105
 >  net.inet.tcp.init_win = 4
 >  net.inet.tcp.mss_ifmtu = 0
 >  net.inet.tcp.sack.enable = 1
 >  net.inet.tcp.sack.maxholes = 32
 >  net.inet.tcp.sack.globalmaxholes = 1024
 >  net.inet.tcp.sack.globalholes = 0
 >  net.inet.tcp.win_scale = 1
 >  net.inet.tcp.timestamps = 1
 >  net.inet.tcp.cwm = 0
 >  net.inet.tcp.cwm_burstsize = 4
 >  net.inet.tcp.ack_on_push = 0
 >  net.inet.tcp.keepidle = 14400
 >  net.inet.tcp.keepintvl = 150
 >  net.inet.tcp.keepcnt = 8
 >  net.inet.tcp.slowhz = 2
 >  net.inet.tcp.log_refused = 0
 >  net.inet.tcp.rstppslimit = 100
 >  net.inet.tcp.delack_ticks = 20
 >  net.inet.tcp.init_win_local = 4
 >  net.inet.tcp.do_loopback_cksum = 0
 >  net.inet.tcp.msl = 30
 >  net.inet.tcp.minmss = 216
 >  net.inet.tcp.congctl.available = reno newreno cubic
 >  net.inet.tcp.congctl.selected = newreno
 >  net.inet.tcp.keepinit = 150
 >  net.inet.tcp.recvbuf_auto = 1
 >  net.inet.tcp.recvbuf_inc = 16384
 >  net.inet.tcp.recvbuf_max = 262144
 >  net.inet.tcp.sendbuf_auto = 1
 >  net.inet.tcp.sendbuf_inc = 8192
 >  net.inet.tcp.sendbuf_max = 262144
 >  net.inet.tcp.ecn.enable = 0
 >  net.inet.tcp.ecn.maxretries = 1
 >  net.inet.tcp.local_by_rtt = 0
 >  net.inet.tcp.iss_hash = 0
 >  net.inet.tcp.abc.enable = 1
 >  net.inet.tcp.abc.aggressive = 1
 >  net.inet.tcp.mslt.enable = 1
 >  net.inet.tcp.mslt.loopback = 2
 >  net.inet.tcp.mslt.local = 10
 >  net.inet.tcp.mslt.remote = 60
 >  net.inet.tcp.mslt.remote_threshold = 6
 >  net.inet.tcp.vtw.enable = 0
 >  net.inet.tcp.vtw.entries = 16
 >  net.inet.udp.checksum = 1
 >  net.inet.udp.sendspace = 9216
 >  net.inet.udp.recvspace = 41600
 >  net.inet.udp.do_loopback_cksum = 0
 >  net.inet.carp.preempt = 0
 >  net.inet.carp.arpbalance = 0
 >  net.inet.carp.allow = 1
 >  net.inet.carp.log = 0
 >  net.inet.ipsec.def_policy = 1
 >  net.inet.ipsec.esp_trans_deflev = 1
 >  net.inet.ipsec.esp_net_deflev = 1
 >  net.inet.ipsec.ah_trans_deflev = 1
 >  net.inet.ipsec.ah_net_deflev = 1
 >  net.inet.ipsec.ah_cleartos = 1
 >  net.inet.ipsec.ah_offsetmask = 0
 >  net.inet.ipsec.dfbit = 2
 >  net.inet.ipsec.ecn = 0
 >  net.inet.ipsec.debug = 0
 >  net.inet.ipsec.ipip_spoofcheck = 1
 >  net.inet.ipsec.enabled = 1
 >  net.inet.ipsec.used = 0
 >  net.inet.ipsec.ah_enable = 1
 >  net.inet.ipsec.esp_enable = 1
 >  net.inet.ipsec.ipcomp_enable = 1
 >  net.inet.ipsec.crypto_support = 0
 >  net.inet.arp.nd_delay = 5
 >  net.inet.arp.nd_bmaxtries = 3
 >  net.inet.arp.nd_umaxtries = 3
 >  net.inet.arp.nd_reachable = 30000
 >  net.inet.arp.nd_retrans = 1000
 >  net.inet.arp.nd_nud = 1
 >  net.inet.arp.nd_maxnudhint = 0
 >  net.inet.arp.maxqueuelen = 1
 >  net.inet.arp.log_movements = 0
 >  net.inet.arp.log_permanent_modify = 1
 >  net.inet.arp.log_wrong_iface = 1
 >  net.inet.arp.debug = 0
 >  net.inet.accf.http.parsehttpversion = 1
 >  net.link.ieee80211.debug = 0
 >  net.link.ieee80211.rssadapt.debug = 0
 >  net.link.ieee80211.vap0.parent = athn0
 >  net.link.ieee80211.vap0.debug = 0
 >  net.link.ieee80211.vap0.inact_run = 300
 >  net.link.ieee80211.vap0.inact_probe = 30
 >  net.link.ieee80211.vap0.inact_auth = 180
 >  net.link.ieee80211.vap0.inact_init = 30
 >  net.link.ieee80211.vap0.driver_caps = 25282048
 >  net.link.ieee80211.vap0.bmiss_max = 2
 >  net.inet6.tcp6.rfc1323 = 1
 >  net.inet6.tcp6.sendspace = 32768
 >  net.inet6.tcp6.recvspace = 32768
 >  net.inet6.tcp6.mssdflt = 536
 >  net.inet6.tcp6.syn_cache_limit = 10255
 >  net.inet6.tcp6.syn_bucket_limit = 105
 >  net.inet6.tcp6.init_win = 4
 >  net.inet6.tcp6.mss_ifmtu = 0
 >  net.inet6.tcp6.sack.enable = 1
 >  net.inet6.tcp6.sack.maxholes = 32
 >  net.inet6.tcp6.sack.globalmaxholes = 1024
 >  net.inet6.tcp6.sack.globalholes = 0
 >  net.inet6.tcp6.win_scale = 1
 >  net.inet6.tcp6.timestamps = 1
 >  net.inet6.tcp6.cwm = 0
 >  net.inet6.tcp6.cwm_burstsize = 4
 >  net.inet6.tcp6.ack_on_push = 0
 >  net.inet6.tcp6.keepidle = 14400
 >  net.inet6.tcp6.keepintvl = 150
 >  net.inet6.tcp6.keepcnt = 8
 >  net.inet6.tcp6.slowhz = 2
 >  net.inet6.tcp6.log_refused = 0
 >  net.inet6.tcp6.rstppslimit = 100
 >  net.inet6.tcp6.delack_ticks = 20
 >  net.inet6.tcp6.init_win_local = 4
 >  net.inet6.tcp6.do_loopback_cksum = 0
 >  net.inet6.tcp6.msl = 30
 >  net.inet6.tcp6.minmss = 216
 >  net.inet6.tcp6.congctl.available = reno newreno cubic
 >  net.inet6.tcp6.congctl.selected = newreno
 >  net.inet6.tcp6.keepinit = 150
 >  net.inet6.tcp6.recvbuf_auto = 1
 >  net.inet6.tcp6.recvbuf_inc = 16384
 >  net.inet6.tcp6.recvbuf_max = 262144
 >  net.inet6.tcp6.sendbuf_auto = 1
 >  net.inet6.tcp6.sendbuf_inc = 8192
 >  net.inet6.tcp6.sendbuf_max = 262144
 >  net.inet6.tcp6.ecn.enable = 0
 >  net.inet6.tcp6.ecn.maxretries = 1
 >  net.inet6.tcp6.local_by_rtt = 0
 >  net.inet6.tcp6.iss_hash = 0
 >  net.inet6.tcp6.abc.enable = 1
 >  net.inet6.tcp6.abc.aggressive = 1
 >  net.inet6.tcp6.mslt.enable = 1
 >  net.inet6.tcp6.mslt.loopback = 2
 >  net.inet6.tcp6.mslt.local = 10
 >  net.inet6.tcp6.mslt.remote = 60
 >  net.inet6.tcp6.mslt.remote_threshold = 6
 >  net.inet6.tcp6.vtw.enable = 0
 >  net.inet6.tcp6.vtw.entries = 16
 >  net.inet6.udp6.sendspace = 9216
 >  net.inet6.udp6.recvspace = 42080
 >  net.inet6.udp6.do_loopback_cksum = 0
 >  net.inet6.ip6.forwarding = 0
 >  net.inet6.ip6.redirect = 1
 >  net.inet6.ip6.hlim = 64
 >  net.inet6.ip6.maxfragpackets = 200
 >  net.inet6.ip6.keepfaith = 0
 >  net.inet6.ip6.log_interval = 5
 >  net.inet6.ip6.hdrnestlimit = 15
 >  net.inet6.ip6.dad_count = 1
 >  net.inet6.ip6.auto_flowlabel = 1
 >  net.inet6.ip6.defmcasthlim = 1
 >  net.inet6.ip6.gifhlim = 30
 >  net.inet6.ip6.kame_version = NetBSD-current
 >  net.inet6.ip6.use_deprecated = 1
 >  net.inet6.ip6.v6only = 1
 >  net.inet6.ip6.anonportmin = 49152
 >  net.inet6.ip6.anonportmax = 65535
 >  net.inet6.ip6.lowportmin = 600
 >  net.inet6.ip6.lowportmax = 1023
 >  net.inet6.ip6.auto_linklocal = 1
 >  net.inet6.ip6.use_defaultzone = 0
 >  net.inet6.ip6.maxfrags = 200
 >  net.inet6.ip6.ifq.len = 0
 >  net.inet6.ip6.ifq.maxlen = 256
 >  net.inet6.ip6.ifq.drops = 0
 >  net.inet6.ip6.gifpmtu = 0
 >  net.inet6.ip6.prefer_tempaddr = 0
 >  net.inet6.ip6.mcast_pmtu = 0
 >  net.inet6.ip6.anonportalgo.available = bsd random_start random_pick
 > hash doublehash randinc net.inet6.ip6.anonportalgo.selected = bsd
 >  net.inet6.ip6.anonportalgo.reserve = 
 >  net.inet6.ip6.neighborgcthresh = 2048
 >  net.inet6.ip6.maxdynroutes = 4096
 >  net.inet6.ip6.param_rt_msg = 1
 >  net.inet6.ipsec6.def_policy = 1
 >  net.inet6.ipsec6.esp_trans_deflev = 1
 >  net.inet6.ipsec6.esp_net_deflev = 1
 >  net.inet6.ipsec6.ah_trans_deflev = 1
 >  net.inet6.ipsec6.ah_net_deflev = 1
 >  net.inet6.ipsec6.ecn = 0
 >  net.inet6.ipsec6.debug = 0
 >  net.inet6.ipsec6.enabled = 1
 >  net.inet6.ipsec6.used = 0
 >  net.inet6.icmp6.rediraccept = 1
 >  net.inet6.icmp6.redirtimeout = 600
 >  net.inet6.icmp6.nd6_prune = 1
 >  net.inet6.icmp6.nd6_delay = 5
 >  net.inet6.icmp6.nd6_umaxtries = 3
 >  net.inet6.icmp6.nd6_mmaxtries = 3
 >  net.inet6.icmp6.nd6_useloopback = 1
 >  net.inet6.icmp6.nodeinfo = 1
 >  net.inet6.icmp6.errppslimit = 100
 >  net.inet6.icmp6.nd6_maxnudhint = 0
 >  net.inet6.icmp6.mtudisc_hiwat = 1280
 >  net.inet6.icmp6.mtudisc_lowat = 256
 >  net.inet6.icmp6.nd6_debug = 0
 >  net.inet6.icmp6.maxqueuelen = 1
 >  net.inet6.icmp6.reflect_pmtu = 0
 >  net.inet6.icmp6.dynamic_rt_msg = 0
 >  net.key.debug = 0
 >  net.key.spi_try = 1000
 >  net.key.spi_min_value = 256
 >  net.key.spi_max_value = 268435455
 >  net.key.random_int = 60
 >  net.key.larval_lifetime = 30
 >  net.key.blockacq_count = 10
 >  net.key.blockacq_lifetime = 20
 >  net.key.esp_keymin = 256
 >  net.key.esp_auth = 0
 >  net.key.ah_keymin = 128
 >  net.key.prefered_oldsa = 0
 >  net.key.allow_different_idtype = 0
 >  net.bluetooth.hci.sendspace = 259
 >  net.bluetooth.hci.recvspace = 4096
 >  net.bluetooth.hci.acl_expiry = 10
 >  net.bluetooth.hci.memo_expiry = 600
 >  net.bluetooth.hci.eventq_max = 20
 >  net.bluetooth.hci.aclrxq_max = 50
 >  net.bluetooth.hci.scorxq_max = 50
 >  net.bluetooth.l2cap.sendspace = 4096
 >  net.bluetooth.l2cap.recvspace = 4096
 >  net.bluetooth.l2cap.rtx = 30
 >  net.bluetooth.l2cap.ertx = 180
 >  net.bluetooth.rfcomm.sendspace = 4096
 >  net.bluetooth.rfcomm.recvspace = 4096
 >  net.bluetooth.rfcomm.mtu_default = 127
 >  net.bluetooth.rfcomm.ack_timeout = 20
 >  net.bluetooth.rfcomm.mcc_timeout = 20
 >  net.bluetooth.sco.sendspace = 4096
 >  net.bluetooth.sco.recvspace = 4096
 >  net.bpf.jit = 0
 >  net.bpf.maxbufsize = 1048576
 >  net.ether.rps_hash = zero
 >  net.gif.rps_hash = zero
 >  net.pppoe.term_unknown = 0
 >  net.pppoe.rps_hash = zero
 >  net.interfaces.athn0.rcvq.drops = 0
 >  net.interfaces.athn0.sndq.len = 0
 >  net.interfaces.athn0.sndq.maxlen = 256
 >  net.interfaces.athn0.sndq.drops = 0
 >  net.interfaces.athn0.watchdog.trigger = 0
 >  net.interfaces.msk0.rcvq.drops = 0
 >  net.interfaces.msk0.sndq.len = 0
 >  net.interfaces.msk0.sndq.maxlen = 511
 >  net.interfaces.msk0.sndq.drops = 0
 >  net.interfaces.msk0.watchdog.trigger = 0
 >  net.interfaces.lo0.sndq.len = 0
 >  net.interfaces.lo0.sndq.maxlen = 256
 >  net.interfaces.lo0.sndq.drops = 0
 >  net.wqinput.icmp.inputq.drops = 0
 >  net.wqinput.carp.inputq.drops = 0
 >  net.wqinput.carp6.inputq.drops = 0
 >  net.wqinput.icmp6.inputq.drops = 0
 >  debug.crashme.panic = 0
 >  debug.crashme.null_deref = 0
 >  debug.crashme.null_jump = 0
 >  debug.crashme.ddb = 0
 >  debug.crashme.mutex_recursion = 0
 >  debug.crashme_enable = 0
 >  hw.machine = i386
 >  hw.model = Intel 686-class
 >  hw.ncpu = 2
 >  hw.byteorder = 1234
 >  hw.physmem = 1064628224
 >  hw.usermem = 1033375744
 >  hw.pagesize = 4096
 >  hw.disknames = wd0 sd0
 >  hw.machine_arch = i386
 >  hw.alignbytes = 3
 >  hw.cnmagic = 
 >  hw.physmem64 = 1064628224
 >  hw.usermem64 = 1033375744
 >  hw.iostatnames = wd0 sd0
 >  hw.ncpuonline = 2
 >  hw.ubsec.maxbatch = 1
 >  hw.ubsec.maxaggr = 1
 >  hw.ipw.accept_eula = 0
 >  hw.iwi.accept_eula = 0
 >  hw.msk.mskc0.int_mod = 1000
 >  hw.uhso.autoswitch = 1
 >  hw.fwohci.nocyclemaster = 0
 >  hw.fwohci.phydma_enable = 1
 >  hw.ieee1394if.try_bmr = 1
 >  hw.ieee1394if.hold_count = 0
 >  hw.ieee1394if.ieee1394_debug = 0
 >  hw.fwmem.eui64_hi = 0
 >  hw.fwmem.eui64_lo = 0
 >  hw.fwmem.speed = 2
 >  hw.fwmem.fwmem_debug = 0
 >  hw.fwip.rx_queue_len = 256
 >  hw.fwip.if_fwip_debug = 0
 >  hw.sbp.auto_login = 1
 >  hw.sbp.max_speed = -1
 >  hw.sbp.exclusive_login = 1
 >  hw.sbp.login_delay = 1000
 >  hw.sbp.scan_delay = 500
 >  hw.sbp.use_doorbell = 0
 >  hw.sbp.tags = 0
 >  hw.sbp.sbp_debug = 0
 >  hw.acpi.root = 1023056
 >  hw.acpi.sleep.state = 0
 >  hw.acpi.sleep.states = S0 S3 S4 S5 
 >  hw.acpi.sleep.beep = 0
 >  hw.acpi.sleep.vbios = 0
 >  hw.acpi.stat.gpe = 636
 >  hw.acpi.stat.sci = 636
 >  hw.acpi.stat.fixed = 0
 >  hw.acpi.stat.method = 765
 >  hw.acpi.wake.ppb2 = 0
 >  hw.acpi.wake.uhci0 = 0
 >  hw.acpi.wake.uhci1 = 0
 >  hw.acpi.wake.uhci2 = 0
 >  hw.acpi.wake.uhci3 = 0
 >  hw.acpi.wake.ehci0 = 0
 >  hw.acpi.wake.ppb0 = 0
 >  hw.acpi.wake.ppb1 = 0
 >  hw.acpi.cpu.dynamic = 1
 >  hw.acpi.cpu.passive = 1
 >  hw.acpi.acpivga0.bios_switch = 1
 >  hw.hvn.udp_csum_fixup_mtu = 1420
 >  hw.hvn.chimney_size = 0
 >  hw.hvn.channel_count = 0
 >  hw.hvn.tx_ring_count = 0
 >  hw.ath.dwell = 200
 >  hw.ath.calibrate = 30
 >  hw.ath.outdoor = 1
 >  hw.ath.countrycode = 0
 >  hw.ath.regdomain = 0
 >  hw.ath.debug = 0
 >  hw.ath.rxbuf = 40
 >  hw.ath.txbuf = 200
 >  hw.ath.hal.dma_brt = 2
 >  hw.ath.hal.sw_brt = 10
 >  hw.ath.hal.swba_backoff = 0
 >  hw.rtw.rfprog_fallback = 0
 >  hw.rtw.host_rfio = 0
 >  hw.swwdog.reboot = 0
 >  hw.wsevent.default_version = 1
 >  hw.firmware.path =
 > /libdata/firmware:/usr/libdata/firmware:/usr/pkg/libdata/firmware:/usr/pkg/libdata
 > hw.drm2.i915_modparams.enable_dpcd_backlight = 0
 > hw.drm2.i915_modparams.inject_probe_failure = 0
 > hw.drm2.i915_modparams.enable_dp_mst = 1
 > hw.drm2.i915_modparams.dmc_firmware_path =
 > hw.drm2.i915_modparams.huc_firmware_path =
 > hw.drm2.i915_modparams.guc_firmware_path =
 > hw.drm2.i915_modparams.guc_log_level = -1
 > hw.drm2.i915_modparams.enable_guc = 0
 > hw.drm2.i915_modparams.edp_vswing = 0
 > hw.drm2.i915_modparams.nuclear_pageflip = 0
 > hw.drm2.i915_modparams.verbose_state_checks = 1
 > hw.drm2.i915_modparams.mmio_debug = -1
 > hw.drm2.i915_modparams.disable_display = 0
 > hw.drm2.i915_modparams.invert_brightness = 0
 > hw.drm2.i915_modparams.force_reset_modeset_test = 0
 > hw.drm2.i915_modparams.load_detect_test = 0
 > hw.drm2.i915_modparams.prefault_disable = 0
 > hw.drm2.i915_modparams.fastboot = -1
 > hw.drm2.i915_modparams.enable_ips = 1
 > hw.drm2.i915_modparams.disable_power_well = 1
 > hw.drm2.i915_modparams.alpha_support = 0
 > hw.drm2.i915_modparams.force_probe =
 > hw.drm2.i915_modparams.enable_psr = -1
 > hw.drm2.i915_modparams.enable_hangcheck = 1
 > hw.drm2.i915_modparams.vbt_firmware = hw.drm2.i915_modparams.reset = 3
 >  hw.drm2.i915_modparams.vbt_sdvo_panel_type = -1
 >  hw.drm2.i915_modparams.panel_use_ssc = -1
 >  hw.drm2.i915_modparams.lvds_channel_mode = 0
 >  hw.drm2.i915_modparams.enable_fbc = 0
 >  hw.drm2.i915_modparams.enable_dc = -1
 >  hw.drm2.i915_modparams.modeset = -1
 >  hw.drm2.radeon_cik_support = 1
 >  hw.drm2.radeon_si_support = 1
 >  hw.drm2.radeon_vce = 1
 >  hw.drm2.radeon_uvd = 1
 >  hw.drm2.radeon_mst = 0
 >  hw.drm2.radeon_auxch = -1
 >  hw.drm2.radeon_backlight = -1
 >  hw.drm2.radeon_bapm = -1
 >  hw.drm2.radeon_use_pflipirq = 2
 >  hw.drm2.radeon_deep_color = 0
 >  hw.drm2.radeon_vm_block_size = -1
 >  hw.drm2.radeon_vm_size = 8
 >  hw.drm2.radeon_hard_reset = 0
 >  hw.drm2.radeon_runtime_pm = -1
 >  hw.drm2.radeon_aspm = -1
 >  hw.drm2.radeon_dpm = -1
 >  hw.drm2.radeon_fastfb = 0
 >  hw.drm2.radeon_lockup_timeout = 10000
 >  hw.drm2.radeon_msi = -1
 >  hw.drm2.radeon_pcie_gen2 = -1
 >  hw.drm2.radeon_hw_i2c = 0
 >  hw.drm2.radeon_disp_priority = 0
 >  hw.drm2.radeon_audio = -1
 >  hw.drm2.radeon_tv = 1
 >  hw.drm2.radeon_connector_table = 0
 >  hw.drm2.radeon_testing = 0
 >  hw.drm2.radeon_benchmarking = 0
 >  hw.drm2.radeon_gart_size = -1
 >  hw.drm2.radeon_agpmode = 0
 >  hw.drm2.radeon_vram_limit = 0
 >  hw.drm2.radeon_r4xx_atom = 0
 >  hw.drm2.radeon_dynclks = -1
 >  hw.drm2.radeon_modeset = -1
 >  hw.drm2.radeon_no_wb = 0
 >  hw.drm2.nouveau_tv_norm = 
 >  hw.drm2.nouveau_vram_pushbuf = 0
 >  hw.drm2.nouveau_hdmimhz = 0
 >  hw.drm2.nouveau_duallink = 1
 >  hw.drm2.nouveau_tv_disable = 0
 >  hw.drm2.nouveau_mst = 1
 >  hw.drm2.nouveau_runtime_pm = -1
 >  hw.drm2.nouveau_atomic = 0
 >  hw.drm2.nouveau_modeset = -1
 >  hw.drm2.nouveau_noaccel = 0
 >  hw.drm2.nouveau_debug = 
 >  hw.drm2.nouveau_config = 
 >  hw.drm2.nouveau_fbcon_bpp = 0
 >  hw.drm2.dp_aux_i2c_transfer_size = 16
 >  hw.drm2.dp_aux_i2c_speed_khz = 10
 >  hw.drm2.edid_fixup = 6
 >  hw.drm2.drm_fbdev_overalloc = 100
 >  hw.drm2.drm_fbdev_emulation = 1
 >  hw.drm2.__drm_debug = 0
 >  hw.drm2.drm_kms_helper_poll = 1
 >  hw.drm2.drm_timestamp_precision = 20
 >  hw.drm2.drm_vblank_offdelay = 5000
 >  hw.synaptics.up_down_emulation = 3
 >  hw.synaptics.up_down_motion_delta = 1
 >  hw.synaptics.gesture_move = 200
 >  hw.synaptics.gesture_length = 20
 >  hw.synaptics.edge_left = 1632
 >  hw.synaptics.edge_right = 5856
 >  hw.synaptics.edge_top = 4890
 >  hw.synaptics.edge_bottom = 1568
 >  hw.synaptics.edge_motion_delta = 32
 >  hw.synaptics.finger_high = 35
 >  hw.synaptics.finger_low = 20
 >  hw.synaptics.two_fingers_emulation = 0
 >  hw.synaptics.scale_x = 8
 >  hw.synaptics.scale_y = 8
 >  hw.synaptics.scale_z = 32
 >  hw.synaptics.max_speed_x = 32
 >  hw.synaptics.max_speed_y = 32
 >  hw.synaptics.max_speed_z = 2
 >  hw.synaptics.movement_threshold = 4
 >  hw.synaptics.movement_enable = 1
 >  hw.synaptics.button_region_movement_enable = 1
 >  hw.synaptics.button_boundary = 1568
 >  hw.synaptics.button2_edge = 3040
 >  hw.synaptics.button3_edge = 4448
 >  hw.synaptics.aux_mid_button_scroll = 1
 >  hw.synaptics.vert_scroll_percent = 0
 >  hw.synaptics.horizontal_scroll_percent = 0
 >  hw.synaptics.button_region_percent = 0
 >  hw.synaptics.debug = 0
 >  hw.audio0.blk_ms = 10
 >  hw.audio0.multiuser = 0
 >  hw.ubt0.config = 0
 >  hw.ubt0.alt_config = 6
 >  hw.ubt0.sco_rxsize = 0
 >  hw.ubt0.sco_txsize = 0
 >  hw.wd0.use_ncq = 1
 >  hw.wd0.use_ncq_prio = 0
 >  machdep.biosbasemem = 639
 >  machdep.biosextmem = 1039040
 >  machdep.booted_kernel = netbsd
 >  machdep.diskinfo: 80:500118192(1024/255/63),2  wd0:80
 >  machdep.fpu_present = 1
 >  machdep.osfxsr = 1
 >  machdep.sse = 1
 >  machdep.sse2 = 1
 >  machdep.fpu_save = 1
 >  machdep.fpu_save_size = 512
 >  machdep.xsave_features = 0
 >  machdep.acpiapm.standby = 1
 >  machdep.acpiapm.suspend = 3
 >  machdep.dmi.system-vendor = Hewlett-Packard
 >  machdep.dmi.system-product = Compaq Mini
 >  machdep.dmi.system-version = F.05
 >  machdep.dmi.bios-vendor = Hewlett-Packard
 >  machdep.dmi.bios-version = 361A0 Ver. F.16
 >  machdep.dmi.bios-date = 20100430
 >  machdep.dmi.board-vendor = Hewlett-Packard
 >  machdep.dmi.board-product = 361A
 >  machdep.dmi.board-version = KBC Version 02.12
 >  machdep.dmi.board-asset-tag =  
 >  machdep.dmi.chassis-vendor = Hewlett-Packard
 >  machdep.dmi.chassis-version =  
 >  machdep.dmi.chassis-asset-tag = CNU90634NW
 >  machdep.dmi.processor-vendor = Intel            
 >  machdep.dmi.processor-version = Intel(R) Atom(TM) CPU N270   @
 > 1.60GHz machdep.dmi.processor-frequency = 1600 MHz
 >  machdep.bootmethod = BIOS
 >  machdep.cpu_brand = Intel(R) Atom(TM) CPU N270   @ 1.60GHz
 >  machdep.sparse_dump = 1
 >  machdep.tsc_freq = 1597400400
 >  machdep.pae = 0
 >  machdep.tsc_user_enable = 1
 >  machdep.hypervisor = none
 >  machdep.user_ldt = 0
 >  machdep.spectre_v1.mitigated = 0
 >  machdep.spectre_v2.hwmitigated = 0
 >  machdep.spectre_v2.swmitigated = 1
 >  machdep.spectre_v2.method = [GCC retpoline]
 >  machdep.spectre_v4.mitigated = 0
 >  machdep.spectre_v4.method = (none)
 >  machdep.mds.mitigated = 0
 >  machdep.mds.method = (none)
 >  machdep.taa.mitigated = 1
 >  machdep.taa.method = [TAA_NO]
 >  machdep.idle-mechanism = acpi
 >  machdep.smbios = 0xface0
 >  machdep.cpu.frequency.target = 1600
 >  machdep.cpu.frequency.current = 1600
 >  machdep.cpu.frequency.available = 1600 1333 1067 800
 >  user.cs_path =
 > /usr/bin:/bin:/usr/sbin:/sbin:/usr/pkg/bin:/usr/pkg/sbin:/usr/local/bin:/usr/local/sbin
 > user.bc_base_max = 2147483647 user.bc_dim_max = 65535
 >  user.bc_scale_max = 2147483647
 >  user.bc_string_max = 2147483647
 >  user.coll_weights_max = 2
 >  user.expr_nest_max = 32
 >  user.line_max = 2048
 >  user.re_dup_max = 255
 >  user.posix2_version = 200112
 >  user.posix2_c_bind = 1
 >  user.posix2_c_dev = 0
 >  user.posix2_char_term = 0
 >  user.posix2_fort_dev = 0
 >  user.posix2_fort_run = 0
 >  user.posix2_localedef = 0
 >  user.posix2_sw_dev = 0
 >  user.posix2_upe = 0
 >  user.stream_max = 20
 >  user.tzname_max = 511
 >  user.atexit_max = -1
 >  ddb.radix = 16
 >  ddb.maxoff = 1048576
 >  ddb.maxwidth = 80
 >  ddb.lines = 24
 >  ddb.tabstops = 8
 >  ddb.onpanic = 0
 >  ddb.fromconsole = 1
 >  ddb.tee_msgbuf = 0
 >  ddb.commandonenter = 
 >  ddb.panicstackframes = 65535
 >  ddb.dumpstack = 1
 >  proc.curproc.corename = %n.core
 >  proc.curproc.rlimit.cputime.soft = unlimited
 >  proc.curproc.rlimit.cputime.hard = unlimited
 >  proc.curproc.rlimit.filesize.soft = unlimited
 >  proc.curproc.rlimit.filesize.hard = unlimited
 >  proc.curproc.rlimit.datasize.soft = 268435456
 >  proc.curproc.rlimit.datasize.hard = 3221225472
 >  proc.curproc.rlimit.stacksize.soft = 2097152
 >  proc.curproc.rlimit.stacksize.hard = 67108864
 >  proc.curproc.rlimit.coredumpsize.soft = unlimited
 >  proc.curproc.rlimit.coredumpsize.hard = unlimited
 >  proc.curproc.rlimit.memoryuse.soft = 1019363328
 >  proc.curproc.rlimit.memoryuse.hard = 1019363328
 >  proc.curproc.rlimit.memorylocked.soft = 339787776
 >  proc.curproc.rlimit.memorylocked.hard = 1019363328
 >  proc.curproc.rlimit.maxproc.soft = 1024
 >  proc.curproc.rlimit.maxproc.hard = 1044
 >  proc.curproc.rlimit.descriptors.soft = 1024
 >  proc.curproc.rlimit.descriptors.hard = 3404
 >  proc.curproc.rlimit.sbsize.soft = unlimited
 >  proc.curproc.rlimit.sbsize.hard = unlimited
 >  proc.curproc.rlimit.vmemoryuse.soft = unlimited
 >  proc.curproc.rlimit.vmemoryuse.hard = unlimited
 >  proc.curproc.rlimit.maxlwp.soft = 2048
 >  proc.curproc.rlimit.maxlwp.hard = 4096
 >  proc.curproc.stopfork = 0
 >  proc.curproc.stopexec = 0
 >  proc.curproc.stopexit = 0
 >  proc.curproc.paxflags = 3
 >  security.pax.mprotect.enabled = 1
 >  security.pax.mprotect.global = 1
 >  security.pax.mprotect.ptrace = 1
 >  security.pax.mprotect.debug = 0
 >  security.pax.segvguard.enabled = 1
 >  security.pax.segvguard.global = 0
 >  security.pax.segvguard.expiry_timeout = 120
 >  security.pax.segvguard.suspend_timeout = 600
 >  security.pax.segvguard.max_crashes = 5
 >  security.pax.aslr.enabled = 1
 >  security.pax.aslr.global = 1
 >  security.pax.aslr.debug = 0
 >  security.pax.aslr.flags = 0
 >  security.pax.aslr.rand = 0
 >  security.pax.aslr.mmap_len = 16
 >  security.pax.aslr.stack_len = 8
 >  security.pax.aslr.exec_len = 12
 >  security.models.suser.name = Traditional NetBSD: Superuser
 >  security.models.bsd44.securelevel = -1
 >  security.models.bsd44.curtain = 0
 >  security.models.bsd44.name = Traditional NetBSD: 4.4BSD
 >  security.models.securelevel.name = Traditional NetBSD: Securelevel
 >  security.models.securelevel.securelevel = -1
 >  security.models.extensions.name = Traditional NetBSD: Extensions
 >  security.models.extensions.usermount = 0
 >  security.models.extensions.curtain = 0
 >  security.models.extensions.user_set_cpu_affinity = 0
 >  security.models.extensions.user_set_dbregs = 0
 >  security.models.extensions.hardlink_check_uid = 0
 >  security.models.extensions.hardlink_check_gid = 0
 >  security.curtain = 0
 >  opencrypto.crypto_ret_q.len = 0
 >  opencrypto.crypto_ret_q.drops = 0
 >  opencrypto.crypto_ret_q.maxlen = 0
 >  opencrypto.crypto_ret_kq.len = 0
 >  opencrypto.crypto_ret_kq.drops = 0
 >  opencrypto.crypto_ret_kq.maxlen = 0
 >  000:00:0: Intel 82945GME Host Bridge (host bridge, revision 0x03)
 > [pchb0] 000:02:0: Intel 82945GME Integrated Graphics Device (VGA
 > display, revision 0x03) [i915drmkms0] 000:02:1: Intel 82945GM/PM/GMS
 > Integrated Graphics Device (miscellaneous display, revision 0x03)
 > 000:27:0: Intel 82801GB/GR High Definition Audio Controller (mixed
 > mode multimedia, HD Audio 1.0, revision 0x02) [hdaudio0] 000:28:0:
 > Intel 82801GB/GR PCI Express Port #1 (PCI bridge, revision 0x02)
 > [ppb0] 000:28:1: Intel 82801GB/GR PCI Express Port #2 (PCI bridge,
 > revision 0x02) [ppb1] 000:29:0: Intel 82801GB/GR USB UHCI Controller
 > (USB serial bus, UHCI, revision 0x02) [uhci0] 000:29:1: Intel
 > 82801GB/GR USB UHCI Controller (USB serial bus, UHCI, revision 0x02)
 > [uhci1] 000:29:2: Intel 82801GB/GR USB UHCI Controller (USB serial
 > bus, UHCI, revision 0x02) [uhci2] 000:29:3: Intel 82801GB/GR USB UHCI
 > Controller (USB serial bus, UHCI, revision 0x02) [uhci3] 000:29:7:
 > Intel 82801GB/GR USB EHCI Controller (USB serial bus, EHCI, revision
 > 0x02) [ehci0] 000:30:0: Intel 82801BAM Hub-PCI Bridge (PCI bridge,
 > subtractive decode, revision 0xe2) [ppb2] 000:31:0: Intel 82801GBM
 > LPC Interface Bridge (ISA bridge, revision 0x02) [ichlpcib0]
 > 000:31:1: Intel 82801GB/GR IDE Controller (IDE mass storage,
 > interface 0x8a, revision 0x02) [piixide0] 000:31:3: Intel 82801GB/GR
 > SMBus Controller (SMBus serial bus, revision 0x02) [ichsmb0]
 > 001:00:0: Atheros Communications AR9281 (miscellaneous network,
 > revision 0x01) [athn0] 002:00:0: Marvell Yukon 88E8040 (ethernet
 > network) [mskc0] --MP_/=AqH6GaA0+Un68Q7y46V_tI Content-Type:
 > text/x-log Content-Transfer-Encoding: 7bit Content-Disposition:
 > attachment; filename=wpa_supplicant_2026-02-13-3-athn0.log
 > wpa_supplicant v2.11 Successfully initialized wpa_supplicant
 > Initializing interface 'athn0' conf '/etc/wpa_supplicant.conf' driver
 > 'bsd' ctrl_interface 'N/A' bridge 'N/A' Configuration file
 > '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' Reading
 > configuration file '/etc/wpa_supplicant.conf'
 > ctrl_interface='/var/run/wpa_supplicant' ctrl_interface_group='wheel'
 > update_config=1 Line: 11 - start of a new network block
 >  ssid - hexdump_ascii(len=16):
 >       XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d   MY_WIFI_NETWORK
 >  PSK (ASCII passphrase) - hexdump_ascii(len=28): [REMOVED]
 >  scan_ssid=1 (0x1)
 >  PSK (from passphrase) - hexdump(len=32): [REMOVED]
 >  Priority group 0
 >     id=0 ssid='MY_WIFI_NETWORK'
 >  Add interface athn0 to a new radio N/A
 >  athn0: Failed to attach pkt_type filter
 >  athn0: Own MAC address: xx:xx:xx:xx:a9:b1
 >  bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0
 >  bsd_del_key: key_idx=0
 >  bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0
 >  bsd_del_key: key_idx=1
 >  bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0
 >  bsd_del_key: key_idx=2
 >  bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0
 >  bsd_del_key: key_idx=3
 >  bsd_set_key: alg=0 addr=0x0 key_idx=4 set_tx=0 seq_len=0 key_len=0
 >  bsd_del_key: key_idx=4
 >  ioctl[SIOCS80211, op=20, val=0, arg_len=7]: Invalid argument
 >  bsd_set_key: alg=0 addr=0x0 key_idx=5 set_tx=0 seq_len=0 key_len=0
 >  bsd_del_key: key_idx=5
 >  ioctl[SIOCS80211, op=20, val=0, arg_len=7]: Invalid argument
 >  wpa_driver_bsd_set_countermeasures: enabled=0
 >  athn0: RSN: flushing PMKID list in the driver
 >  athn0: Setting scan request: 0.100000 sec
 >  ENGINE: Loading builtin engines
 >  ENGINE: Loading builtin engines
 >  EAPOL: SUPP_PAE entering state DISCONNECTED
 >  EAPOL: Supplicant port status: Unauthorized
 >  EAPOL: KEY_RX entering state NO_KEY_RECEIVE
 >  EAPOL: SUPP_BE entering state INITIALIZE
 >  EAP: EAP entering state DISABLED
 >  ctrl_interface_group=0 (from group name 'wheel')
 >  athn0: Added interface athn0
 >  athn0: State: DISCONNECTED -> DISCONNECTED
 >  athn0: State: DISCONNECTED -> SCANNING
 >  Scan SSID - hexdump_ascii(len=16):
 >       XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d   MY_WIFI_NETWORK
 >  athn0: Starting AP scan for wildcard SSID (Interleave with specific)
 >  athn0: Add radio work 'scan'@0xb3528f40
 >  athn0: First radio work item in the queue - schedule start
 > immediately athn0: Starting radio work 'scan'@0xb3528f40 after
 > 0.000140 second wait wpa_driver_bsd_set_wpa: enabled=1
 >  wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 >  EAPOL: disable timer tick
 >  athn0: Event SCAN_RESULTS (3) received
 >  Received 2012 bytes of scan results (25 BSSes)
 >  athn0: BSS: Start scan result update 1
 >  athn0: BSS: Add new id 0 BSSID XX:XX:XX:XX:3b:44 SSID '' freq 2412
 >  athn0: BSS: Add new id 1 BSSID XX:XX:XX:XX:3b:46 SSID
 > 'MY_WIFI_NETWORK' freq 2412 athn0: BSS: Add new id 2 BSSID
 > XX:XX:XX:XX:3b:43 SSID '' freq 5180 athn0: BSS: Add new id 3 BSSID
 > XX:XX:XX:XX:3b:45 SSID 'MY_WIFI_NETWORK' freq 5180 athn0: BSS: Add
 > new id 4 BSSID XX:XX:XX:XX:a4:a6 SSID 'MY_WIFI_NETWORK' freq 2412
 > athn0: BSS: Add new id 5 BSSID XX:XX:XX:XX:a4:a4 SSID '' freq 2412
 > athn0: BSS: Add new id 6 BSSID XX:XX:XX:XX:a4:a5 SSID
 > 'MY_WIFI_NETWORK' freq 5180 athn0: BSS: Add new id 7 BSSID
 > XX:XX:XX:XX:a4:a3 SSID '' freq 5180 athn0: BSS: Add new id 8 BSSID
 > XX:XX:XX:XX:a5:26 SSID 'MY_WIFI_NETWORK' freq 2412 athn0: BSS: Add
 > new id 9 BSSID XX:XX:XX:XX:a5:24 SSID '' freq 2412 athn0: BSS: Add
 > new id 10 BSSID XX:XX:XX:XX:23:64 SSID '' freq 2412 athn0: BSS: Add
 > new id 11 BSSID XX:XX:XX:XX:23:66 SSID 'MY_WIFI_NETWORK' freq 2412
 > athn0: BSS: Add new id 12 BSSID XX:XX:XX:XX:a5:25 SSID
 > 'MY_WIFI_NETWORK' freq 5180 athn0: BSS: Add new id 13 BSSID
 > XX:XX:XX:XX:a5:23 SSID '' freq 5180 athn0: BSS: Add new id 14 BSSID
 > XX:XX:XX:XX:23:65 SSID 'MY_WIFI_NETWORK' freq 5180 athn0: BSS: Add
 > new id 15 BSSID XX:XX:XX:XX:23:63 SSID '' freq 5180 athn0: BSS: Add
 > new id 16 BSSID XX:XX:XX:XX:05:63 SSID '' freq 5180 athn0: BSS: Add
 > new id 17 BSSID XX:XX:XX:XX:3b:48 SSID '' freq 2412 athn0: BSS: Add
 > new id 18 BSSID XX:XX:XX:XX:3b:47 SSID '' freq 5180 athn0: BSS: Add
 > new id 19 BSSID XX:XX:XX:XX:a4:a8 SSID '' freq 2412 athn0: BSS: Add
 > new id 20 BSSID XX:XX:XX:XX:a4:a7 SSID '' freq 5180 athn0: BSS: Add
 > new id 21 BSSID XX:XX:XX:XX:a5:28 SSID '' freq 2412 athn0: BSS: Add
 > new id 22 BSSID XX:XX:XX:XX:23:68 SSID '' freq 2412 athn0: BSS: Add
 > new id 23 BSSID XX:XX:XX:XX:a5:27 SSID '' freq 5180 athn0: BSS: Add
 > new id 24 BSSID XX:XX:XX:XX:23:67 SSID '' freq 5180 BSS:
 > last_scan_res_used=25/32 athn0: New scan results available (own=0
 > ext=0) athn0: Radio work 'scan'@0xb3528f40 done in 7.629141 seconds
 > athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
 > athn0: Selecting BSS from priority group 0 athn0: 0:
 > XX:XX:XX:XX:3b:44 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x10
 > level=75 freq=2412 athn0:    skip - SSID not known athn0: 1:
 > XX:XX:XX:XX:3b:46 ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24
 > caps=0x31 level=75 freq=2412 athn0:    selected based on RSN IE
 > athn0: MLD: No Multi-Link element athn0:    selected BSS
 > XX:XX:XX:XX:3b:46 ssid='MY_WIFI_NETWORK' athn0: Considering connect
 > request: reassociate: 0  selected: XX:XX:XX:XX:3b:46  bssid:
 > 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING
 > ssid=0xb36b7000  current_ssid=0x0 athn0: Request association with
 > XX:XX:XX:XX:3b:46 athn0: No ongoing scan/p2p-scan found to abort
 > athn0: Add radio work 'connect'@0xb3528f40 athn0: First radio work
 > item in the queue - schedule start immediately athn0: Starting radio
 > work 'connect'@0xb3528f40 after 0.000171 second wait athn0: WPA:
 > clearing own WPA/RSN IE athn0: RSN: clearing own RSNXE RSN: PMKSA
 > cache search - network_ctx=0xb36b7000 try_opportunistic=0 akmp=0x0
 > RSN: Search for BSSID XX:XX:XX:XX:3b:46 RSN: No PMKSA cache entry
 > found athn0: RSN: using IEEE 802.11i/D9.0 athn0: WPA: Selected cipher
 > suites: group 16 pairwise 16 key_mgmt 2 proto 2 athn0: WPA: Selected
 > mgmt group cipher 32 athn0: WPA: clearing AP WPA IE
 >  WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
 >  athn0: WPA: clearing AP RSNXE
 >  athn0: WPA: AP group 0x10 network profile group 0x18; available
 > group 0x10 athn0: WPA: using GTK CCMP
 >  athn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
 > available pairwise 0x10 athn0: WPA: using PTK CCMP
 >  athn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
 > key_mgmt 0x2 athn0: WPA: using KEY_MGMT WPA-PSK
 >  athn0: WPA: AP mgmt_group_cipher 0x20 network profile
 > mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 athn0: WPA:
 > not using MGMT group cipher WPA: Set own WPA IE default -
 > hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
 > hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
 >  WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
 >  athn0: Automatic auth_alg selection: 0x1
 >  No supported operating classes IE to add
 >  athn0: Trying to associate with XX:XX:XX:XX:3b:46
 > (SSID='MY_WIFI_NETWORK' freq=2412 MHz) athn0: Cancelling scan request
 >  athn0: State: SCANNING -> ASSOCIATING
 >  Limit connection to BSSID XX:XX:XX:XX:3b:46 freq=2412 MHz based on
 > scan results (bssid_set=0 wps=0) PSK (set in config) -
 > hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
 > 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
 > wpa_driver_bsd_set_drop_unencrypted: enabled=1
 > wpa_driver_bsd_associate: set PRIVACY 1 athn0: Setting authentication
 > timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - EAP fail=0
 >  EAPOL: External notification - portControl=Auto
 >  athn0: Event ASSOC (0) received
 >  athn0: State: ASSOCIATING -> ASSOCIATED
 >  athn0: Associated to a new BSS: BSSID=XX:XX:XX:XX:3b:46
 >  athn0: Associated with XX:XX:XX:XX:3b:46
 >  athn0: WPA: Association event - clear replay counter
 >  athn0: WPA: Clear old PTK
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - portEnabled=1
 >  EAPOL: SUPP_PAE entering state CONNECTING
 >  EAPOL: enable timer tick
 >  EAPOL: SUPP_BE entering state IDLE
 >  athn0: Setting authentication timeout: 10 sec 0 usec
 >  athn0: Cancelling scan request
 >  athn0: RX EAPOL from XX:XX:XX:XX:3b:46 (encrypted=-1)
 >  RX EAPOL - hexdump(len=99): [...REDACTED...]
 >  athn0: Setting authentication timeout: 10 sec 0 usec
 >  athn0: IEEE 802.1X RX: version=2 type=3 length=95
 >  WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
 >  athn0:   EAPOL-Key type=2
 >  athn0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
 >  athn0:   key_length=16 key_data_length=0
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  athn0: WPA: RX message 1 of 4-Way Handshake from XX:XX:XX:XX:3b:46
 > (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
 >  athn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
 >  Get randomness: len=32 entropy=11
 >  WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
 >  WPA: PTK derivation using PRF(SHA1)
 >  WPA: PTK derivation - A1=xx:xx:xx:xx:a9:b1 A2=XX:XX:XX:XX:3b:46
 >  WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
 >  WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
 >  WPA: PMK - hexdump(len=32): [REMOVED]
 >  WPA: PTK - hexdump(len=48): [REMOVED]
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: KEK - hexdump(len=16): [REMOVED]
 >  WPA: TK - hexdump(len=16): [REMOVED]
 >  WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
 >  WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
 >  athn0: WPA: Sending EAPOL-Key 2/4
 >  WPA: Send EAPOL-Key frame to XX:XX:XX:XX:3b:46 ver=2 mic_len=16
 > key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
 >  WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
 >  athn0: RX EAPOL from XX:XX:XX:XX:3b:46 (encrypted=-1)
 >  RX EAPOL - hexdump(len=163): [...REDACTED...]
 >  athn0: IEEE 802.1X RX: version=2 type=3 length=159
 >  WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
 >  athn0:   EAPOL-Key type=2
 >  athn0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
 > MIC Secure Encr) athn0:   key_length=16 key_data_length=64
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  WPA: EAPOL-Key MIC using HMAC-SHA1
 >  RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
 >  WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
 >  WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
 >  athn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
 >  athn0: RSN: RX message 3 of 4-Way Handshake from XX:XX:XX:XX:3b:46
 > (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
 >  WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
 >  WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
 >  WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
 >  athn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
 > msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
 >  RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
 >  athn0: Request to deauthenticate - bssid=XX:XX:XX:XX:3b:46
 > pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
 > state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > bsd_send_mlme_param: op=3 reason=17 addr=XX:XX:XX:XX:3b:46 athn0:
 > Event DEAUTH (11) received athn0: Deauthentication notification
 > athn0:  * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
 > Deauthentication frame IE(s) - hexdump(len=0): [NULL] athn0:
 > CTRL-EVENT-DISCONNECTED bssid=XX:XX:XX:XX:3b:46 reason=17
 > locally_generated=1 athn0: Auto connect enabled: try to reconnect
 > (wps=0/0 wpa_state=7) athn0: Setting scan request: 0.100000 sec
 > athn0: Radio work 'connect'@0xb3528f40 done in 0.075831 seconds
 > athn0: radio_work_free('connect'@0xb3528f40): num_active_works --> 0
 > athn0: Added BSSID XX:XX:XX:XX:3b:46 into ignore list, ignoring for
 > 10 seconds athn0: Another BSS in this ESS has been seen; try it next
 > athn0: BSSID XX:XX:XX:XX:3b:46 ignore list count incremented to 2,
 > ignoring for 10 seconds athn0: Consecutive connection failures: 1 -->
 > request scan in 100 ms athn0: Ignore new scan request for 0.100000
 > sec since an earlier request is scheduled to trigger sooner athn0:
 > WPA: Clear old PMK and PTK athn0: Disconnect event - remove keys
 > athn0: State: 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External
 > notification - portEnabled=0 EAPOL: SUPP_PAE entering state
 > DISCONNECTED EAPOL: Supplicant port status: Unauthorized
 >  EAPOL: SUPP_BE entering state INITIALIZE
 >  EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  athn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  QM: Clear all active DSCP policies
 >  athn0: CTRL-EVENT-DSCP-POLICY clear_all
 >  athn0: Ignore new scan request for 5.000000 sec since an earlier
 > request is scheduled to trigger sooner athn0: Request to
 > deauthenticate - bssid=00:00:00:00:00:00
 > pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
 > state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > athn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
 > notification - portEnabled=0 EAPOL: External notification -
 > portValid=0 QM: Clear all active DSCP policies athn0:
 > CTRL-EVENT-DSCP-POLICY clear_all athn0: Ignore new scan request for
 > 5.000000 sec since an earlier request is scheduled to trigger sooner
 > athn0: Event DISASSOC (1) received athn0: Disassociation notification
 > athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
 > athn0: Do not request new immediate scan athn0: WPA: Clear old PMK
 > and PTK athn0: Disconnect event - remove keys
 >  athn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  athn0: State: DISCONNECTED -> SCANNING
 >  Scan SSID - hexdump_ascii(len=16):
 >       XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d   MY_WIFI_NETWORK
 >  athn0: Starting AP scan for specific SSID: MY_WIFI_NETWORK
 >  athn0: Optimize scan based on previously generated frequency list
 >  athn0: Add radio work 'scan'@0xb3528f40
 >  athn0: First radio work item in the queue - schedule start
 > immediately athn0: Starting radio work 'scan'@0xb3528f40 after
 > 0.000136 second wait wpa_driver_bsd_set_wpa: enabled=1
 >  wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 >  EAPOL: startWhen --> 0
 >  EAPOL: disable timer tick
 >  athn0: Event SCAN_RESULTS (3) received
 >  Received 2100 bytes of scan results (26 BSSes)
 >  athn0: BSS: Start scan result update 2
 >  athn0: BSS: Add new id 25 BSSID XX:XX:XX:XX:05:62 SSID '' freq 2412
 >  BSS: last_scan_res_used=26/32
 >  athn0: New scan results available (own=0 ext=0)
 >  athn0: Radio work 'scan'@0xb3528f40 done in 7.745645 seconds
 >  athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
 >  athn0: Selecting BSS from priority group 0
 >  athn0: 0: XX:XX:XX:XX:3b:45 ssid='MY_WIFI_NETWORK' wpa_ie_len=0
 > rsn_ie_len=24 caps=0x11 level=63 freq=5180 athn0:    selected based
 > on RSN IE athn0: MLD: No Multi-Link element
 >  athn0:    selected BSS XX:XX:XX:XX:3b:45 ssid='MY_WIFI_NETWORK'
 >  athn0: Considering connect request: reassociate: 0  selected:
 > XX:XX:XX:XX:3b:45  bssid: 00:00:00:00:00:00  pending:
 > 00:00:00:00:00:00  wpa_state: SCANNING  ssid=0xb36b7000
 > current_ssid=0x0 athn0: Request association with XX:XX:XX:XX:3b:45
 > athn0: Re-association to the same ESS athn0: No ongoing scan/p2p-scan
 > found to abort athn0: Add radio work 'connect'@0xb3528f40 athn0:
 > First radio work item in the queue - schedule start immediately
 > athn0: Starting radio work 'connect'@0xb3528f40 after 0.000059 second
 > wait athn0: WPA: clearing own WPA/RSN IE athn0: RSN: clearing own
 > RSNXE RSN: PMKSA cache search - network_ctx=0xb36b7000
 > try_opportunistic=0 akmp=0x0 RSN: Search for BSSID XX:XX:XX:XX:3b:45
 >  RSN: No PMKSA cache entry found
 >  athn0: RSN: using IEEE 802.11i/D9.0
 >  athn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
 > proto 2 athn0: WPA: Selected mgmt group cipher 32
 >  athn0: WPA: clearing AP WPA IE
 >  WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
 >  athn0: WPA: clearing AP RSNXE
 >  athn0: WPA: AP group 0x10 network profile group 0x18; available
 > group 0x10 athn0: WPA: using GTK CCMP
 >  athn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
 > available pairwise 0x10 athn0: WPA: using PTK CCMP
 >  athn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
 > key_mgmt 0x2 athn0: WPA: using KEY_MGMT WPA-PSK
 >  athn0: WPA: AP mgmt_group_cipher 0x20 network profile
 > mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 athn0: WPA:
 > not using MGMT group cipher WPA: Set own WPA IE default -
 > hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
 > hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
 >  WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
 >  athn0: Automatic auth_alg selection: 0x1
 >  No supported operating classes IE to add
 >  athn0: Trying to associate with XX:XX:XX:XX:3b:45
 > (SSID='MY_WIFI_NETWORK' freq=5180 MHz) athn0: Cancelling scan request
 >  athn0: State: SCANNING -> ASSOCIATING
 >  Limit connection to BSSID XX:XX:XX:XX:3b:45 freq=5180 MHz based on
 > scan results (bssid_set=0 wps=0) PSK (set in config) -
 > hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
 > 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
 > wpa_driver_bsd_set_drop_unencrypted: enabled=1
 > wpa_driver_bsd_associate: set PRIVACY 1 athn0: Setting authentication
 > timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - EAP fail=0
 >  EAPOL: External notification - portControl=Auto
 >  athn0: Event ASSOC (0) received
 >  athn0: State: ASSOCIATING -> ASSOCIATED
 >  athn0: Associated to a new BSS: BSSID=XX:XX:XX:XX:3b:45
 >  athn0: Associated with XX:XX:XX:XX:3b:45
 >  athn0: WPA: Association event - clear replay counter
 >  athn0: WPA: Clear old PTK
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - portEnabled=1
 >  EAPOL: SUPP_PAE entering state CONNECTING
 >  EAPOL: enable timer tick
 >  EAPOL: SUPP_BE entering state IDLE
 >  athn0: Setting authentication timeout: 10 sec 0 usec
 >  athn0: Cancelling scan request
 >  athn0: RX EAPOL from XX:XX:XX:XX:3b:45 (encrypted=-1)
 >  RX EAPOL - hexdump(len=99): [...REDACTED...]
 >  athn0: Setting authentication timeout: 10 sec 0 usec
 >  athn0: IEEE 802.1X RX: version=2 type=3 length=95
 >  WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
 >  athn0:   EAPOL-Key type=2
 >  athn0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
 >  athn0:   key_length=16 key_data_length=0
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  athn0: WPA: RX message 1 of 4-Way Handshake from XX:XX:XX:XX:3b:45
 > (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
 >  athn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
 >  Get randomness: len=32 entropy=11
 >  WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
 >  WPA: PTK derivation using PRF(SHA1)
 >  WPA: PTK derivation - A1=xx:xx:xx:xx:a9:b1 A2=XX:XX:XX:XX:3b:45
 >  WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
 >  WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
 >  WPA: PMK - hexdump(len=32): [REMOVED]
 >  WPA: PTK - hexdump(len=48): [REMOVED]
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: KEK - hexdump(len=16): [REMOVED]
 >  WPA: TK - hexdump(len=16): [REMOVED]
 >  WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
 >  WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
 >  athn0: WPA: Sending EAPOL-Key 2/4
 >  WPA: Send EAPOL-Key frame to XX:XX:XX:XX:3b:45 ver=2 mic_len=16
 > key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
 >  WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
 >  athn0: RX EAPOL from XX:XX:XX:XX:3b:45 (encrypted=-1)
 >  RX EAPOL - hexdump(len=163): [...REDACTED...]
 >  athn0: IEEE 802.1X RX: version=2 type=3 length=159
 >  WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
 >  athn0:   EAPOL-Key type=2
 >  athn0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
 > MIC Secure Encr) athn0:   key_length=16 key_data_length=64
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  WPA: EAPOL-Key MIC using HMAC-SHA1
 >  RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
 >  WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
 >  WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
 >  athn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
 >  athn0: RSN: RX message 3 of 4-Way Handshake from XX:XX:XX:XX:3b:45
 > (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
 >  WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
 >  WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
 >  WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
 >  athn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
 > msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
 >  RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
 >  athn0: Request to deauthenticate - bssid=XX:XX:XX:XX:3b:45
 > pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
 > state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > bsd_send_mlme_param: op=3 reason=17 addr=XX:XX:XX:XX:3b:45 athn0:
 > Event DEAUTH (11) received athn0: Deauthentication notification
 > athn0:  * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
 > Deauthentication frame IE(s) - hexdump(len=0): [NULL] athn0:
 > CTRL-EVENT-DISCONNECTED bssid=XX:XX:XX:XX:3b:45 reason=17
 > locally_generated=1 athn0: Auto connect enabled: try to reconnect
 > (wps=0/0 wpa_state=7) athn0: Setting scan request: 0.100000 sec
 > athn0: Radio work 'connect'@0xb3528f40 done in 0.060213 seconds
 > athn0: radio_work_free('connect'@0xb3528f40): num_active_works --> 0
 > athn0: Added BSSID XX:XX:XX:XX:3b:45 into ignore list, ignoring for
 > 10 seconds athn0: Another BSS in this ESS has been seen; try it next
 > athn0: BSSID XX:XX:XX:XX:3b:45 ignore list count incremented to 2,
 > ignoring for 10 seconds athn0: Consecutive connection failures: 2 -->
 > request scan in 500 ms athn0: Ignore new scan request for 0.500000
 > sec since an earlier request is scheduled to trigger sooner athn0:
 > WPA: Clear old PMK and PTK athn0: Disconnect event - remove keys
 > athn0: State: 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External
 > notification - portEnabled=0 EAPOL: SUPP_PAE entering state
 > DISCONNECTED EAPOL: Supplicant port status: Unauthorized
 >  EAPOL: SUPP_BE entering state INITIALIZE
 >  EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  athn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  QM: Clear all active DSCP policies
 >  athn0: CTRL-EVENT-DSCP-POLICY clear_all
 >  athn0: Ignore new scan request for 5.000000 sec since an earlier
 > request is scheduled to trigger sooner athn0: Request to
 > deauthenticate - bssid=00:00:00:00:00:00
 > pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
 > state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > athn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
 > notification - portEnabled=0 EAPOL: External notification -
 > portValid=0 QM: Clear all active DSCP policies athn0:
 > CTRL-EVENT-DSCP-POLICY clear_all athn0: Ignore new scan request for
 > 5.000000 sec since an earlier request is scheduled to trigger sooner
 > athn0: Event DISASSOC (1) received athn0: Disassociation notification
 > athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
 > athn0: Do not request new immediate scan athn0: WPA: Clear old PMK
 > and PTK athn0: Disconnect event - remove keys
 >  athn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  athn0: State: DISCONNECTED -> SCANNING
 >  athn0: Starting AP scan for wildcard SSID
 >  athn0: Optimize scan based on previously generated frequency list
 >  athn0: Add radio work 'scan'@0xb3528f40
 >  athn0: First radio work item in the queue - schedule start
 > immediately athn0: Starting radio work 'scan'@0xb3528f40 after
 > 0.009627 second wait wpa_driver_bsd_set_wpa: enabled=1
 >  wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 >  EAPOL: startWhen --> 0
 >  EAPOL: disable timer tick
 >  athn0: Event SCAN_RESULTS (3) received
 >  Received 2100 bytes of scan results (26 BSSes)
 >  athn0: BSS: Start scan result update 3
 >  BSS: last_scan_res_used=26/32
 >  athn0: New scan results available (own=0 ext=0)
 >  athn0: Radio work 'scan'@0xb3528f40 done in 7.745969 seconds
 >  athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
 >  athn0: Selecting BSS from priority group 0
 >  athn0: 0: XX:XX:XX:XX:3b:43 ssid='' wpa_ie_len=0 rsn_ie_len=20
 > caps=0x10 level=63 freq=5180 athn0:    skip - SSID not known
 >  athn0: 1: XX:XX:XX:XX:3b:45 ssid='MY_WIFI_NETWORK' wpa_ie_len=0
 > rsn_ie_len=24 caps=0x11 level=59 freq=5180 athn0:    skip - BSSID
 > ignored (count=2 limit=0) athn0: 2: XX:XX:XX:XX:3b:44 ssid=''
 > wpa_ie_len=0 rsn_ie_len=20 caps=0x10 level=55 freq=2412 athn0:
 > skip - SSID not known athn0: 3: XX:XX:XX:XX:3b:46
 > ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24 caps=0x31 level=51
 > freq=2412 athn0:    selected based on RSN IE athn0: MLD: No
 > Multi-Link element athn0:    selected BSS XX:XX:XX:XX:3b:46
 > ssid='MY_WIFI_NETWORK' athn0: Considering connect request:
 > reassociate: 0  selected: XX:XX:XX:XX:3b:46  bssid: 00:00:00:00:00:00
 >  pending: 00:00:00:00:00:00  wpa_state: SCANNING  ssid=0xb36b7000
 > current_ssid=0x0 athn0: Request association with XX:XX:XX:XX:3b:46
 > athn0: Re-association to the same ESS athn0: No ongoing scan/p2p-scan
 > found to abort athn0: Add radio work 'connect'@0xb3528f40 athn0:
 > First radio work item in the queue - schedule start immediately
 > athn0: Starting radio work 'connect'@0xb3528f40 after 0.000055 second
 > wait athn0: WPA: clearing own WPA/RSN IE athn0: RSN: clearing own
 > RSNXE RSN: PMKSA cache search - network_ctx=0xb36b7000
 > try_opportunistic=0 akmp=0x0 RSN: Search for BSSID XX:XX:XX:XX:3b:46
 >  RSN: No PMKSA cache entry found
 >  athn0: RSN: using IEEE 802.11i/D9.0
 >  athn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
 > proto 2 athn0: WPA: Selected mgmt group cipher 32
 >  athn0: WPA: clearing AP WPA IE
 >  WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
 >  athn0: WPA: clearing AP RSNXE
 >  athn0: WPA: AP group 0x10 network profile group 0x18; available
 > group 0x10 athn0: WPA: using GTK CCMP
 >  athn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
 > available pairwise 0x10 athn0: WPA: using PTK CCMP
 >  athn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
 > key_mgmt 0x2 athn0: WPA: using KEY_MGMT WPA-PSK
 >  athn0: WPA: AP mgmt_group_cipher 0x20 network profile
 > mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 athn0: WPA:
 > not using MGMT group cipher WPA: Set own WPA IE default -
 > hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
 > hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
 >  WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
 >  athn0: Automatic auth_alg selection: 0x1
 >  No supported operating classes IE to add
 >  athn0: Trying to associate with XX:XX:XX:XX:3b:46
 > (SSID='MY_WIFI_NETWORK' freq=2412 MHz) athn0: Cancelling scan request
 >  athn0: State: SCANNING -> ASSOCIATING
 >  Limit connection to BSSID XX:XX:XX:XX:3b:46 freq=2412 MHz based on
 > scan results (bssid_set=0 wps=0) PSK (set in config) -
 > hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
 > 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
 > wpa_driver_bsd_set_drop_unencrypted: enabled=1
 > wpa_driver_bsd_associate: set PRIVACY 1 athn0: Setting authentication
 > timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - EAP fail=0
 >  EAPOL: External notification - portControl=Auto
 >  athn0: Event ASSOC (0) received
 >  athn0: State: ASSOCIATING -> ASSOCIATED
 >  athn0: Associated to a new BSS: BSSID=XX:XX:XX:XX:3b:46
 >  athn0: Associated with XX:XX:XX:XX:3b:46
 >  athn0: WPA: Association event - clear replay counter
 >  athn0: WPA: Clear old PTK
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - portEnabled=1
 >  EAPOL: SUPP_PAE entering state CONNECTING
 >  EAPOL: enable timer tick
 >  EAPOL: SUPP_BE entering state IDLE
 >  athn0: Setting authentication timeout: 10 sec 0 usec
 >  athn0: Cancelling scan request
 >  athn0: RX EAPOL from XX:XX:XX:XX:3b:46 (encrypted=-1)
 >  RX EAPOL - hexdump(len=99): [...REDACTED...]
 >  athn0: Setting authentication timeout: 10 sec 0 usec
 >  athn0: IEEE 802.1X RX: version=2 type=3 length=95
 >  WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
 >  athn0:   EAPOL-Key type=2
 >  athn0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
 >  athn0:   key_length=16 key_data_length=0
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  athn0: WPA: RX message 1 of 4-Way Handshake from XX:XX:XX:XX:3b:46
 > (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
 >  athn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
 >  Get randomness: len=32 entropy=11
 >  WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
 >  WPA: PTK derivation using PRF(SHA1)
 >  WPA: PTK derivation - A1=xx:xx:xx:xx:a9:b1 A2=XX:XX:XX:XX:3b:46
 >  WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
 >  WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
 >  WPA: PMK - hexdump(len=32): [REMOVED]
 >  WPA: PTK - hexdump(len=48): [REMOVED]
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: KEK - hexdump(len=16): [REMOVED]
 >  WPA: TK - hexdump(len=16): [REMOVED]
 >  WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
 >  WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
 >  athn0: WPA: Sending EAPOL-Key 2/4
 >  WPA: Send EAPOL-Key frame to XX:XX:XX:XX:3b:46 ver=2 mic_len=16
 > key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
 >  WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
 >  athn0: RX EAPOL from XX:XX:XX:XX:3b:46 (encrypted=-1)
 >  RX EAPOL - hexdump(len=163): [...REDACTED...]
 >  athn0: IEEE 802.1X RX: version=2 type=3 length=159
 >  WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
 >  athn0:   EAPOL-Key type=2
 >  athn0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
 > MIC Secure Encr) athn0:   key_length=16 key_data_length=64
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  WPA: EAPOL-Key MIC using HMAC-SHA1
 >  RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
 >  WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
 >  WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
 >  athn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
 >  athn0: RSN: RX message 3 of 4-Way Handshake from XX:XX:XX:XX:3b:46
 > (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
 >  WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
 >  WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
 >  WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
 >  athn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
 > msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
 >  RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
 >  athn0: Request to deauthenticate - bssid=XX:XX:XX:XX:3b:46
 > pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
 > state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > bsd_send_mlme_param: op=3 reason=17 addr=XX:XX:XX:XX:3b:46 athn0:
 > Event DEAUTH (11) received athn0: Deauthentication notification
 > athn0:  * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
 > Deauthentication frame IE(s) - hexdump(len=0): [NULL] athn0:
 > CTRL-EVENT-DISCONNECTED bssid=XX:XX:XX:XX:3b:46 reason=17
 > locally_generated=1 athn0: Auto connect enabled: try to reconnect
 > (wps=0/0 wpa_state=7) athn0: Setting scan request: 0.100000 sec
 > athn0: Radio work 'connect'@0xb3528f40 done in 0.056304 seconds
 > athn0: radio_work_free('connect'@0xb3528f40): num_active_works --> 0
 > athn0: BSSID XX:XX:XX:XX:3b:46 ignore list count incremented to 3,
 > ignoring for 60 seconds athn0: Consecutive connection failures: 3 -->
 > request scan in 1000 ms athn0: Ignore new scan request for 1.000000
 > sec since an earlier request is scheduled to trigger sooner athn0:
 > WPA: Clear old PMK and PTK athn0: Disconnect event - remove keys
 > athn0: State: 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External
 > notification - portEnabled=0 EAPOL: SUPP_PAE entering state
 > DISCONNECTED EAPOL: Supplicant port status: Unauthorized
 >  EAPOL: SUPP_BE entering state INITIALIZE
 >  EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  athn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  QM: Clear all active DSCP policies
 >  athn0: CTRL-EVENT-DSCP-POLICY clear_all
 >  athn0: Ignore new scan request for 5.000000 sec since an earlier
 > request is scheduled to trigger sooner athn0: Request to
 > deauthenticate - bssid=00:00:00:00:00:00
 > pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
 > state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > athn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
 > notification - portEnabled=0 EAPOL: External notification -
 > portValid=0 QM: Clear all active DSCP policies athn0:
 > CTRL-EVENT-DSCP-POLICY clear_all athn0: Ignore new scan request for
 > 5.000000 sec since an earlier request is scheduled to trigger sooner
 > athn0: Event DISASSOC (1) received athn0: Disassociation notification
 > athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
 > athn0: Do not request new immediate scan athn0: WPA: Clear old PMK
 > and PTK athn0: Disconnect event - remove keys
 >  athn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  athn0: State: DISCONNECTED -> SCANNING
 >  Scan SSID - hexdump_ascii(len=16):
 >       XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d   MY_WIFI_NETWORK
 >  athn0: Starting AP scan for wildcard SSID (Interleave with specific)
 >  athn0: Add radio work 'scan'@0xb3528f40
 >  athn0: First radio work item in the queue - schedule start
 > immediately athn0: Starting radio work 'scan'@0xb3528f40 after
 > 0.000138 second wait wpa_driver_bsd_set_wpa: enabled=1
 >  wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 >  EAPOL: startWhen --> 0
 >  EAPOL: disable timer tick
 >  athn0: Event SCAN_RESULTS (3) received
 >  Received 2012 bytes of scan results (25 BSSes)
 >  athn0: BSS: Start scan result update 4
 >  BSS: last_scan_res_used=25/32
 >  athn0: New scan results available (own=0 ext=0)
 >  athn0: Radio work 'scan'@0xb3528f40 done in 7.745189 seconds
 >  athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
 >  athn0: Selecting BSS from priority group 0
 >  athn0: 0: XX:XX:XX:XX:3b:43 ssid='' wpa_ie_len=0 rsn_ie_len=20
 > caps=0x10 level=64 freq=5180 athn0:    skip - SSID not known
 >  athn0: 1: XX:XX:XX:XX:3b:45 ssid='MY_WIFI_NETWORK' wpa_ie_len=0
 > rsn_ie_len=24 caps=0x11 level=63 freq=5180 athn0:    selected based
 > on RSN IE athn0: MLD: No Multi-Link element
 >  athn0:    selected BSS XX:XX:XX:XX:3b:45 ssid='MY_WIFI_NETWORK'
 >  athn0: Considering connect request: reassociate: 0  selected:
 > XX:XX:XX:XX:3b:45  bssid: 00:00:00:00:00:00  pending:
 > 00:00:00:00:00:00  wpa_state: SCANNING  ssid=0xb36b7000
 > current_ssid=0x0 athn0: Request association with XX:XX:XX:XX:3b:45
 > athn0: Re-association to the same ESS athn0: No ongoing scan/p2p-scan
 > found to abort athn0: Add radio work 'connect'@0xb3528f40 athn0:
 > First radio work item in the queue - schedule start immediately
 > athn0: Starting radio work 'connect'@0xb3528f40 after 0.000154 second
 > wait athn0: WPA: clearing own WPA/RSN IE athn0: RSN: clearing own
 > RSNXE RSN: PMKSA cache search - network_ctx=0xb36b7000
 > try_opportunistic=0 akmp=0x0 RSN: Search for BSSID XX:XX:XX:XX:3b:45
 >  RSN: No PMKSA cache entry found
 >  athn0: RSN: using IEEE 802.11i/D9.0
 >  athn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
 > proto 2 athn0: WPA: Selected mgmt group cipher 32
 >  athn0: WPA: clearing AP WPA IE
 >  WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
 >  athn0: WPA: clearing AP RSNXE
 >  athn0: WPA: AP group 0x10 network profile group 0x18; available
 > group 0x10 athn0: WPA: using GTK CCMP
 >  athn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
 > available pairwise 0x10 athn0: WPA: using PTK CCMP
 >  athn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
 > key_mgmt 0x2 athn0: WPA: using KEY_MGMT WPA-PSK
 >  athn0: WPA: AP mgmt_group_cipher 0x20 network profile
 > mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 athn0: WPA:
 > not using MGMT group cipher WPA: Set own WPA IE default -
 > hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
 > hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
 >  WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
 >  athn0: Automatic auth_alg selection: 0x1
 >  No supported operating classes IE to add
 >  athn0: Trying to associate with XX:XX:XX:XX:3b:45
 > (SSID='MY_WIFI_NETWORK' freq=5180 MHz) athn0: Cancelling scan request
 >  athn0: State: SCANNING -> ASSOCIATING
 >  Limit connection to BSSID XX:XX:XX:XX:3b:45 freq=5180 MHz based on
 > scan results (bssid_set=0 wps=0) PSK (set in config) -
 > hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
 > 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
 > wpa_driver_bsd_set_drop_unencrypted: enabled=1
 > wpa_driver_bsd_associate: set PRIVACY 1 athn0: Setting authentication
 > timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - EAP fail=0
 >  EAPOL: External notification - portControl=Auto
 >  athn0: Event ASSOC (0) received
 >  athn0: State: ASSOCIATING -> ASSOCIATED
 >  athn0: Associated to a new BSS: BSSID=XX:XX:XX:XX:3b:45
 >  athn0: Associated with XX:XX:XX:XX:3b:45
 >  athn0: WPA: Association event - clear replay counter
 >  athn0: WPA: Clear old PTK
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - portEnabled=1
 >  EAPOL: SUPP_PAE entering state CONNECTING
 >  EAPOL: enable timer tick
 >  EAPOL: SUPP_BE entering state IDLE
 >  athn0: Setting authentication timeout: 10 sec 0 usec
 >  athn0: Cancelling scan request
 >  athn0: RX EAPOL from XX:XX:XX:XX:3b:45 (encrypted=-1)
 >  RX EAPOL - hexdump(len=99): [...REDACTED...]
 >  athn0: Setting authentication timeout: 10 sec 0 usec
 >  athn0: IEEE 802.1X RX: version=2 type=3 length=95
 >  WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
 >  athn0:   EAPOL-Key type=2
 >  athn0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
 >  athn0:   key_length=16 key_data_length=0
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  athn0: WPA: RX message 1 of 4-Way Handshake from XX:XX:XX:XX:3b:45
 > (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
 >  athn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
 >  Get randomness: len=32 entropy=11
 >  WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
 >  WPA: PTK derivation using PRF(SHA1)
 >  WPA: PTK derivation - A1=xx:xx:xx:xx:a9:b1 A2=XX:XX:XX:XX:3b:45
 >  WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
 >  WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
 >  WPA: PMK - hexdump(len=32): [REMOVED]
 >  WPA: PTK - hexdump(len=48): [REMOVED]
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: KEK - hexdump(len=16): [REMOVED]
 >  WPA: TK - hexdump(len=16): [REMOVED]
 >  WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
 >  WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
 >  athn0: WPA: Sending EAPOL-Key 2/4
 >  WPA: Send EAPOL-Key frame to XX:XX:XX:XX:3b:45 ver=2 mic_len=16
 > key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
 >  WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
 >  athn0: RX EAPOL from XX:XX:XX:XX:3b:45 (encrypted=-1)
 >  RX EAPOL - hexdump(len=163): [...REDACTED...]
 >  athn0: IEEE 802.1X RX: version=2 type=3 length=159
 >  WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
 >  athn0:   EAPOL-Key type=2
 >  athn0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
 > MIC Secure Encr) athn0:   key_length=16 key_data_length=64
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  WPA: EAPOL-Key MIC using HMAC-SHA1
 >  RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
 >  WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
 >  WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
 >  athn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
 >  athn0: RSN: RX message 3 of 4-Way Handshake from XX:XX:XX:XX:3b:45
 > (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
 >  WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
 >  WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
 >  WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
 >  athn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
 > msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
 >  RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
 >  athn0: Request to deauthenticate - bssid=XX:XX:XX:XX:3b:45
 > pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
 > state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > bsd_send_mlme_param: op=3 reason=17 addr=XX:XX:XX:XX:3b:45 athn0:
 > Event DEAUTH (11) received athn0: Deauthentication notification
 > athn0:  * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
 > Deauthentication frame IE(s) - hexdump(len=0): [NULL] athn0:
 > CTRL-EVENT-DISCONNECTED bssid=XX:XX:XX:XX:3b:45 reason=17
 > locally_generated=1 athn0: Auto connect enabled: try to reconnect
 > (wps=0/0 wpa_state=7) athn0: Setting scan request: 0.100000 sec
 > athn0: Radio work 'connect'@0xb3528f40 done in 0.054246 seconds
 > athn0: radio_work_free('connect'@0xb3528f40): num_active_works --> 0
 > athn0: BSSID XX:XX:XX:XX:3b:45 ignore list count incremented to 3,
 > ignoring for 60 seconds Continuous association failures - consider
 > temporary network disabling athn0: CTRL-EVENT-SSID-TEMP-DISABLED id=0
 > ssid="MY_WIFI_NETWORK" auth_failures=1 duration=10 reason=CONN_FAILED
 > athn0: Consecutive connection failures: 4 --> request scan in 5000 ms
 > athn0: Ignore new scan request for 5.000000 sec since an earlier
 > request is scheduled to trigger sooner athn0: WPA: Clear old PMK and
 > PTK athn0: Disconnect event - remove keys athn0: State:
 > 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External notification -
 > portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL:
 > Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state
 > INITIALIZE EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  athn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  QM: Clear all active DSCP policies
 >  athn0: CTRL-EVENT-DSCP-POLICY clear_all
 >  athn0: Ignore new scan request for 5.000000 sec since an earlier
 > request is scheduled to trigger sooner athn0: Request to
 > deauthenticate - bssid=00:00:00:00:00:00
 > pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
 > state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > athn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
 > notification - portEnabled=0 EAPOL: External notification -
 > portValid=0 QM: Clear all active DSCP policies athn0:
 > CTRL-EVENT-DSCP-POLICY clear_all athn0: Ignore new scan request for
 > 5.000000 sec since an earlier request is scheduled to trigger sooner
 > athn0: Event DISASSOC (1) received athn0: Disassociation notification
 > athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
 > athn0: Do not request new immediate scan athn0: WPA: Clear old PMK
 > and PTK athn0: Disconnect event - remove keys
 >  athn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  athn0: State: DISCONNECTED -> SCANNING
 >  Scan SSID - hexdump_ascii(len=16):
 >       XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d   MY_WIFI_NETWORK
 >  athn0: Starting AP scan for specific SSID: MY_WIFI_NETWORK
 >  athn0: Add radio work 'scan'@0xb3528f40
 >  athn0: First radio work item in the queue - schedule start
 > immediately athn0: Starting radio work 'scan'@0xb3528f40 after
 > 0.000138 second wait wpa_driver_bsd_set_wpa: enabled=1
 >  wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 >  EAPOL: startWhen --> 0
 >  EAPOL: disable timer tick
 >  athn0: Event SCAN_RESULTS (3) received
 >  Received 1948 bytes of scan results (24 BSSes)
 >  athn0: BSS: Start scan result update 5
 >  athn0: BSS: Remove id 25 BSSID XX:XX:XX:XX:05:62 SSID '' due to no
 > match in scan BSS: last_scan_res_used=24/32
 >  athn0: New scan results available (own=0 ext=0)
 >  athn0: Radio work 'scan'@0xb3528f40 done in 7.745460 seconds
 >  athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
 >  athn0: Postpone network selection by 3 seconds since all networks
 > are disabled athn0: Try to associate due to network getting re-enabled
 >  athn0: CTRL-EVENT-SSID-REENABLED id=0 ssid="MY_WIFI_NETWORK"
 >  Mark BSSID XX:XX:XX:XX:3b:45 ignored to allow a lower priority BSS,
 > if any, to be tried next athn0: BSSID XX:XX:XX:XX:3b:45 ignore list
 > count incremented to 4, ignoring for 120 seconds athn0: Selecting BSS
 > from priority group 0 athn0: 0: XX:XX:XX:XX:3b:43 ssid=''
 > wpa_ie_len=0 rsn_ie_len=20 caps=0x10 level=65 freq=5180 athn0:
 > skip - SSID not known athn0: 1: XX:XX:XX:XX:3b:45
 > ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=64
 > freq=5180 athn0:    skip - BSSID ignored (count=4 limit=0) athn0: 2:
 > XX:XX:XX:XX:3b:44 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x10
 > level=56 freq=2412 athn0:    skip - SSID not known athn0: 3:
 > XX:XX:XX:XX:3b:46 ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24
 > caps=0x31 level=54 freq=2412 athn0:    skip - BSSID ignored (count=3
 > limit=0) athn0: 4: XX:XX:XX:XX:a4:a5 ssid='MY_WIFI_NETWORK'
 > wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=37 freq=5180 athn0:
 > selected based on RSN IE athn0: MLD: No Multi-Link element athn0:
 > selected BSS XX:XX:XX:XX:a4:a5 ssid='MY_WIFI_NETWORK' athn0:
 > Considering connect request: reassociate: 0  selected:
 > XX:XX:XX:XX:a4:a5  bssid: 00:00:00:00:00:00  pending:
 > 00:00:00:00:00:00  wpa_state: SCANNING  ssid=0xb36b7000
 > current_ssid=0x0 athn0: Request association with XX:XX:XX:XX:a4:a5
 > athn0: Re-association to the same ESS athn0: No ongoing scan/p2p-scan
 > found to abort athn0: Add radio work 'connect'@0xb3528f40 athn0:
 > First radio work item in the queue - schedule start immediately
 > athn0: Starting radio work 'connect'@0xb3528f40 after 0.000136 second
 > wait athn0: WPA: clearing own WPA/RSN IE athn0: RSN: clearing own
 > RSNXE RSN: PMKSA cache search - network_ctx=0xb36b7000
 > try_opportunistic=0 akmp=0x0 RSN: Search for BSSID XX:XX:XX:XX:a4:a5
 > RSN: No PMKSA cache entry found athn0: RSN: using IEEE 802.11i/D9.0
 >  athn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
 > proto 2 athn0: WPA: Selected mgmt group cipher 32
 >  athn0: WPA: clearing AP WPA IE
 >  WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
 >  athn0: WPA: clearing AP RSNXE
 >  athn0: WPA: AP group 0x10 network profile group 0x18; available
 > group 0x10 athn0: WPA: using GTK CCMP
 >  athn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
 > available pairwise 0x10 athn0: WPA: using PTK CCMP
 >  athn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
 > key_mgmt 0x2 athn0: WPA: using KEY_MGMT WPA-PSK
 >  athn0: WPA: AP mgmt_group_cipher 0x20 network profile
 > mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 athn0: WPA:
 > not using MGMT group cipher WPA: Set own WPA IE default -
 > hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
 > hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
 >  WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
 >  athn0: Automatic auth_alg selection: 0x1
 >  No supported operating classes IE to add
 >  athn0: Trying to associate with XX:XX:XX:XX:a4:a5
 > (SSID='MY_WIFI_NETWORK' freq=5180 MHz) athn0: Cancelling scan request
 >  athn0: State: SCANNING -> ASSOCIATING
 >  Limit connection to BSSID XX:XX:XX:XX:a4:a5 freq=5180 MHz based on
 > scan results (bssid_set=0 wps=0) PSK (set in config) -
 > hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
 > 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
 > wpa_driver_bsd_set_drop_unencrypted: enabled=1
 > wpa_driver_bsd_associate: set PRIVACY 1 athn0: Setting authentication
 > timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - EAP fail=0
 >  EAPOL: External notification - portControl=Auto
 >  athn0: Event ASSOC (0) received
 >  athn0: State: ASSOCIATING -> ASSOCIATED
 >  athn0: Associated to a new BSS: BSSID=XX:XX:XX:XX:a4:a5
 >  athn0: Associated with XX:XX:XX:XX:a4:a5
 >  athn0: WPA: Association event - clear replay counter
 >  athn0: WPA: Clear old PTK
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - portEnabled=1
 >  EAPOL: SUPP_PAE entering state CONNECTING
 >  EAPOL: enable timer tick
 >  EAPOL: SUPP_BE entering state IDLE
 >  athn0: Setting authentication timeout: 10 sec 0 usec
 >  athn0: Cancelling scan request
 >  athn0: RX EAPOL from XX:XX:XX:XX:a4:a5 (encrypted=-1)
 >  RX EAPOL - hexdump(len=99): [...REDACTED...]
 >  athn0: Setting authentication timeout: 10 sec 0 usec
 >  athn0: IEEE 802.1X RX: version=2 type=3 length=95
 >  WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
 >  athn0:   EAPOL-Key type=2
 >  athn0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
 >  athn0:   key_length=16 key_data_length=0
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  athn0: WPA: RX message 1 of 4-Way Handshake from XX:XX:XX:XX:a4:a5
 > (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
 >  athn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
 >  Get randomness: len=32 entropy=11
 >  WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
 >  WPA: PTK derivation using PRF(SHA1)
 >  WPA: PTK derivation - A1=xx:xx:xx:xx:a9:b1 A2=XX:XX:XX:XX:a4:a5
 >  WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
 >  WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
 >  WPA: PMK - hexdump(len=32): [REMOVED]
 >  WPA: PTK - hexdump(len=48): [REMOVED]
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: KEK - hexdump(len=16): [REMOVED]
 >  WPA: TK - hexdump(len=16): [REMOVED]
 >  WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
 >  WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
 >  athn0: WPA: Sending EAPOL-Key 2/4
 >  WPA: Send EAPOL-Key frame to XX:XX:XX:XX:a4:a5 ver=2 mic_len=16
 > key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
 >  WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
 >  athn0: RX EAPOL from XX:XX:XX:XX:a4:a5 (encrypted=-1)
 >  RX EAPOL - hexdump(len=163): [...REDACTED...]
 >  athn0: IEEE 802.1X RX: version=2 type=3 length=159
 >  WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
 >  athn0:   EAPOL-Key type=2
 >  athn0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
 > MIC Secure Encr) athn0:   key_length=16 key_data_length=64
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  WPA: EAPOL-Key MIC using HMAC-SHA1
 >  RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
 >  WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
 >  WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
 >  athn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
 >  athn0: RSN: RX message 3 of 4-Way Handshake from XX:XX:XX:XX:a4:a5
 > (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
 >  WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
 >  WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
 >  WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
 >  athn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
 > msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
 >  RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
 >  athn0: Request to deauthenticate - bssid=XX:XX:XX:XX:a4:a5
 > pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
 > state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > bsd_send_mlme_param: op=3 reason=17 addr=XX:XX:XX:XX:a4:a5 athn0:
 > Event DEAUTH (11) received athn0: Deauthentication notification
 > athn0:  * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
 > Deauthentication frame IE(s) - hexdump(len=0): [NULL] athn0:
 > CTRL-EVENT-DISCONNECTED bssid=XX:XX:XX:XX:a4:a5 reason=17
 > locally_generated=1 athn0: Auto connect enabled: try to reconnect
 > (wps=0/0 wpa_state=7) athn0: Setting scan request: 0.100000 sec
 > athn0: Radio work 'connect'@0xb3528f40 done in 0.073545 seconds
 > athn0: radio_work_free('connect'@0xb3528f40): num_active_works --> 0
 > athn0: Added BSSID XX:XX:XX:XX:a4:a5 into ignore list, ignoring for
 > 10 seconds athn0: Another BSS in this ESS has been seen; try it next
 > athn0: BSSID XX:XX:XX:XX:a4:a5 ignore list count incremented to 2,
 > ignoring for 10 seconds Continuous association failures - consider
 > temporary network disabling athn0: CTRL-EVENT-SSID-TEMP-DISABLED id=0
 > ssid="MY_WIFI_NETWORK" auth_failures=2 duration=31 reason=CONN_FAILED
 > athn0: Consecutive connection failures: 5 --> request scan in 10000
 > ms athn0: Ignore new scan request for 10.000000 sec since an earlier
 > request is scheduled to trigger sooner athn0: WPA: Clear old PMK and
 > PTK athn0: Disconnect event - remove keys athn0: State:
 > 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External notification -
 > portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL:
 > Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state
 > INITIALIZE EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  athn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  QM: Clear all active DSCP policies
 >  athn0: CTRL-EVENT-DSCP-POLICY clear_all
 >  athn0: Ignore new scan request for 5.000000 sec since an earlier
 > request is scheduled to trigger sooner athn0: Request to
 > deauthenticate - bssid=00:00:00:00:00:00
 > pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
 > state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > athn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
 > notification - portEnabled=0 EAPOL: External notification -
 > portValid=0 QM: Clear all active DSCP policies athn0:
 > CTRL-EVENT-DSCP-POLICY clear_all athn0: Ignore new scan request for
 > 5.000000 sec since an earlier request is scheduled to trigger sooner
 > athn0: Event DISASSOC (1) received athn0: Disassociation notification
 > athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
 > athn0: Do not request new immediate scan athn0: WPA: Clear old PMK
 > and PTK athn0: Disconnect event - remove keys
 >  athn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  athn0: State: DISCONNECTED -> SCANNING
 >  athn0: Starting AP scan for wildcard SSID
 >  athn0: Optimize scan based on previously generated frequency list
 >  athn0: Add radio work 'scan'@0xb3528f40
 >  athn0: First radio work item in the queue - schedule start
 > immediately athn0: Starting radio work 'scan'@0xb3528f40 after
 > 0.000137 second wait wpa_driver_bsd_set_wpa: enabled=1
 >  wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 >  EAPOL: startWhen --> 0
 >  EAPOL: disable timer tick
 >  athn0: Event SCAN_RESULTS (3) received
 >  Received 1860 bytes of scan results (23 BSSes)
 >  athn0: BSS: Start scan result update 6
 >  athn0: BSS: Add new id 26 BSSID XX:XX:XX:XX:05:62 SSID '' freq 2412
 >  BSS: last_scan_res_used=23/32
 >  athn0: New scan results available (own=0 ext=0)
 >  athn0: Radio work 'scan'@0xb3528f40 done in 7.754577 seconds
 >  athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
 >  athn0: Postpone network selection by 23 seconds since all networks
 > are disabled athn0: Try to associate due to network getting re-enabled
 >  Fast associate: Old scan results
 >  athn0: Setting scan request: 0.000000 sec
 >  Scan SSID - hexdump_ascii(len=16):
 >       XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d   MY_WIFI_NETWORK
 >  athn0: Starting AP scan for wildcard SSID (Interleave with specific)
 >  athn0: Add radio work 'scan'@0xb3528f40
 >  athn0: First radio work item in the queue - schedule start
 > immediately athn0: Starting radio work 'scan'@0xb3528f40 after
 > 0.000137 second wait wpa_driver_bsd_set_wpa: enabled=1
 >  wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 >  athn0: Event SCAN_RESULTS (3) received
 >  Received 2100 bytes of scan results (26 BSSes)
 >  athn0: BSS: Start scan result update 7
 >  BSS: last_scan_res_used=26/32
 >  athn0: New scan results available (own=0 ext=0)
 >  athn0: Radio work 'scan'@0xb3528f40 done in 7.624621 seconds
 >  athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
 >  athn0: CTRL-EVENT-SSID-REENABLED id=0 ssid="MY_WIFI_NETWORK"
 >  Mark BSSID XX:XX:XX:XX:a4:a5 ignored to allow a lower priority BSS,
 > if any, to be tried next athn0: BSSID XX:XX:XX:XX:a4:a5 ignore list
 > count incremented to 3, ignoring for 60 seconds athn0: Selecting BSS
 > from priority group 0 athn0: 0: XX:XX:XX:XX:3b:43 ssid=''
 > wpa_ie_len=0 rsn_ie_len=20 caps=0x10 level=65 freq=5180 athn0:
 > skip - SSID not known athn0: 1: XX:XX:XX:XX:3b:45
 > ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=60
 > freq=5180 athn0:    skip - BSSID ignored (count=4 limit=0) athn0: 2:
 > XX:XX:XX:XX:3b:44 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x10
 > level=56 freq=2412 athn0:    skip - SSID not known athn0: 3:
 > XX:XX:XX:XX:3b:46 ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24
 > caps=0x31 level=52 freq=2412 athn0:    skip - BSSID ignored (count=3
 > limit=0) athn0: 4: XX:XX:XX:XX:a4:a3 ssid='' wpa_ie_len=0
 > rsn_ie_len=20 caps=0x10 level=38 freq=5180 athn0:    skip - SSID not
 > known athn0: 5: XX:XX:XX:XX:a4:a5 ssid='MY_WIFI_NETWORK' wpa_ie_len=0
 > rsn_ie_len=24 caps=0x11 level=37 freq=5180 athn0:    skip - BSSID
 > ignored (count=3 limit=0) athn0: 6: XX:XX:XX:XX:a4:a4 ssid=''
 > wpa_ie_len=0 rsn_ie_len=20 caps=0x10 level=38 freq=2412 athn0:
 > skip - SSID not known athn0: 7: XX:XX:XX:XX:a4:a6
 > ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24 caps=0x31 level=38
 > freq=2412 athn0:    selected based on RSN IE athn0: MLD: No
 > Multi-Link element athn0:    selected BSS XX:XX:XX:XX:a4:a6
 > ssid='MY_WIFI_NETWORK' athn0: Considering connect request:
 > reassociate: 0  selected: XX:XX:XX:XX:a4:a6  bssid: 00:00:00:00:00:00
 >  pending: 00:00:00:00:00:00  wpa_state: SCANNING  ssid=0xb36b7000
 > current_ssid=0x0 athn0: Request association with XX:XX:XX:XX:a4:a6
 > athn0: Re-association to the same ESS athn0: No ongoing scan/p2p-scan
 > found to abort athn0: Add radio work 'connect'@0xb3528f40 athn0:
 > First radio work item in the queue - schedule start immediately
 > athn0: Starting radio work 'connect'@0xb3528f40 after 0.000054 second
 > wait athn0: WPA: clearing own WPA/RSN IE athn0: RSN: clearing own
 > RSNXE RSN: PMKSA cache search - network_ctx=0xb36b7000
 > try_opportunistic=0 akmp=0x0 RSN: Search for BSSID XX:XX:XX:XX:a4:a6
 > RSN: No PMKSA cache entry found athn0: RSN: using IEEE 802.11i/D9.0
 >  athn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
 > proto 2 athn0: WPA: Selected mgmt group cipher 32
 >  athn0: WPA: clearing AP WPA IE
 >  WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
 >  athn0: WPA: clearing AP RSNXE
 >  athn0: WPA: AP group 0x10 network profile group 0x18; available
 > group 0x10 athn0: WPA: using GTK CCMP
 >  athn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
 > available pairwise 0x10 athn0: WPA: using PTK CCMP
 >  athn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
 > key_mgmt 0x2 athn0: WPA: using KEY_MGMT WPA-PSK
 >  athn0: WPA: AP mgmt_group_cipher 0x20 network profile
 > mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 athn0: WPA:
 > not using MGMT group cipher WPA: Set own WPA IE default -
 > hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
 > hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
 >  WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
 >  athn0: Automatic auth_alg selection: 0x1
 >  No supported operating classes IE to add
 >  athn0: Trying to associate with XX:XX:XX:XX:a4:a6
 > (SSID='MY_WIFI_NETWORK' freq=2412 MHz) athn0: Cancelling scan request
 >  athn0: State: SCANNING -> ASSOCIATING
 >  Limit connection to BSSID XX:XX:XX:XX:a4:a6 freq=2412 MHz based on
 > scan results (bssid_set=0 wps=0) PSK (set in config) -
 > hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
 > 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
 > wpa_driver_bsd_set_drop_unencrypted: enabled=1
 > wpa_driver_bsd_associate: set PRIVACY 1 athn0: Setting authentication
 > timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - EAP fail=0
 >  EAPOL: External notification - portControl=Auto
 >  athn0: Event ASSOC (0) received
 >  athn0: State: ASSOCIATING -> ASSOCIATED
 >  athn0: Associated to a new BSS: BSSID=XX:XX:XX:XX:a4:a6
 >  athn0: Associated with XX:XX:XX:XX:a4:a6
 >  athn0: WPA: Association event - clear replay counter
 >  athn0: WPA: Clear old PTK
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - portEnabled=1
 >  EAPOL: SUPP_PAE entering state CONNECTING
 >  EAPOL: enable timer tick
 >  EAPOL: SUPP_BE entering state IDLE
 >  athn0: Setting authentication timeout: 10 sec 0 usec
 >  athn0: Cancelling scan request
 >  athn0: RX EAPOL from XX:XX:XX:XX:a4:a6 (encrypted=-1)
 >  RX EAPOL - hexdump(len=99): [...REDACTED...]
 >  athn0: Setting authentication timeout: 10 sec 0 usec
 >  athn0: IEEE 802.1X RX: version=2 type=3 length=95
 >  WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
 >  athn0:   EAPOL-Key type=2
 >  athn0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
 >  athn0:   key_length=16 key_data_length=0
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  athn0: WPA: RX message 1 of 4-Way Handshake from XX:XX:XX:XX:a4:a6
 > (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
 >  athn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
 >  Get randomness: len=32 entropy=21
 >  WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
 >  WPA: PTK derivation using PRF(SHA1)
 >  WPA: PTK derivation - A1=xx:xx:xx:xx:a9:b1 A2=XX:XX:XX:XX:a4:a6
 >  WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
 >  WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
 >  WPA: PMK - hexdump(len=32): [REMOVED]
 >  WPA: PTK - hexdump(len=48): [REMOVED]
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: KEK - hexdump(len=16): [REMOVED]
 >  WPA: TK - hexdump(len=16): [REMOVED]
 >  WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
 >  WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
 >  athn0: WPA: Sending EAPOL-Key 2/4
 >  WPA: Send EAPOL-Key frame to XX:XX:XX:XX:a4:a6 ver=2 mic_len=16
 > key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
 >  WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
 >  athn0: RX EAPOL from XX:XX:XX:XX:a4:a6 (encrypted=-1)
 >  RX EAPOL - hexdump(len=163): [...REDACTED...]
 >  athn0: IEEE 802.1X RX: version=2 type=3 length=159
 >  WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
 >  athn0:   EAPOL-Key type=2
 >  athn0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
 > MIC Secure Encr) athn0:   key_length=16 key_data_length=64
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  WPA: EAPOL-Key MIC using HMAC-SHA1
 >  RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
 >  WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
 >  WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
 >  athn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
 >  athn0: RSN: RX message 3 of 4-Way Handshake from XX:XX:XX:XX:a4:a6
 > (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
 >  WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
 >  WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
 >  WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
 >  athn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
 > msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
 >  RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
 >  athn0: Request to deauthenticate - bssid=XX:XX:XX:XX:a4:a6
 > pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
 > state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > bsd_send_mlme_param: op=3 reason=17 addr=XX:XX:XX:XX:a4:a6 athn0:
 > Event DEAUTH (11) received athn0: Deauthentication notification
 > athn0:  * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
 > Deauthentication frame IE(s) - hexdump(len=0): [NULL] athn0:
 > CTRL-EVENT-DISCONNECTED bssid=XX:XX:XX:XX:a4:a6 reason=17
 > locally_generated=1 athn0: Auto connect enabled: try to reconnect
 > (wps=0/0 wpa_state=7) athn0: Setting scan request: 0.100000 sec
 > athn0: Radio work 'connect'@0xb3528f40 done in 0.056066 seconds
 > athn0: radio_work_free('connect'@0xb3528f40): num_active_works --> 0
 > athn0: Added BSSID XX:XX:XX:XX:a4:a6 into ignore list, ignoring for
 > 10 seconds athn0: Another BSS in this ESS has been seen; try it next
 > athn0: BSSID XX:XX:XX:XX:a4:a6 ignore list count incremented to 2,
 > ignoring for 10 seconds Continuous association failures - consider
 > temporary network disabling athn0: CTRL-EVENT-SSID-TEMP-DISABLED id=0
 > ssid="MY_WIFI_NETWORK" auth_failures=3 duration=56 reason=CONN_FAILED
 > athn0: Consecutive connection failures: 6 --> request scan in 10000
 > ms athn0: Ignore new scan request for 10.000000 sec since an earlier
 > request is scheduled to trigger sooner athn0: WPA: Clear old PMK and
 > PTK athn0: Disconnect event - remove keys athn0: State:
 > 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External notification -
 > portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL:
 > Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state
 > INITIALIZE EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  athn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  QM: Clear all active DSCP policies
 >  athn0: CTRL-EVENT-DSCP-POLICY clear_all
 >  athn0: Ignore new scan request for 5.000000 sec since an earlier
 > request is scheduled to trigger sooner athn0: Request to
 > deauthenticate - bssid=00:00:00:00:00:00
 > pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
 > state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > athn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
 > notification - portEnabled=0 EAPOL: External notification -
 > portValid=0 QM: Clear all active DSCP policies athn0:
 > CTRL-EVENT-DSCP-POLICY clear_all athn0: Ignore new scan request for
 > 5.000000 sec since an earlier request is scheduled to trigger sooner
 > athn0: Event DISASSOC (1) received athn0: Disassociation notification
 > athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
 > athn0: Do not request new immediate scan athn0: WPA: Clear old PMK
 > and PTK athn0: Disconnect event - remove keys
 >  athn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  athn0: State: DISCONNECTED -> SCANNING
 >  Scan SSID - hexdump_ascii(len=16):
 >       XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d   MY_WIFI_NETWORK
 >  athn0: Starting AP scan for specific SSID: MY_WIFI_NETWORK
 >  athn0: Optimize scan based on previously generated frequency list
 >  athn0: Add radio work 'scan'@0xb3528f40
 >  athn0: First radio work item in the queue - schedule start
 > immediately athn0: Starting radio work 'scan'@0xb3528f40 after
 > 0.000137 second wait wpa_driver_bsd_set_wpa: enabled=1
 >  wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 >  EAPOL: startWhen --> 0
 >  EAPOL: disable timer tick
 >  athn0: Event SCAN_RESULTS (3) received
 >  Received 2012 bytes of scan results (25 BSSes)
 >  athn0: BSS: Start scan result update 8
 >  BSS: last_scan_res_used=25/32
 >  athn0: New scan results available (own=0 ext=0)
 >  athn0: Radio work 'scan'@0xb3528f40 done in 7.745099 seconds
 >  athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
 >  athn0: Postpone network selection by 48 seconds since all networks
 > are disabled athn0: Try to associate due to network getting re-enabled
 >  Fast associate: Old scan results
 >  athn0: Setting scan request: 0.000000 sec
 >  athn0: Starting AP scan for wildcard SSID
 >  athn0: Add radio work 'scan'@0xb3528f40
 >  athn0: First radio work item in the queue - schedule start
 > immediately athn0: Starting radio work 'scan'@0xb3528f40 after
 > 0.000036 second wait wpa_driver_bsd_set_wpa: enabled=1
 >  wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 >  athn0: Event SCAN_RESULTS (3) received
 >  Received 2200 bytes of scan results (27 BSSes)
 >  athn0: BSS: Start scan result update 9
 >  athn0: BSS: Add new id 27 BSSID XX:XX:XX:XX:ed:90 SSID
 > 'OTHERNETWORK' freq 2442 BSS: last_scan_res_used=27/32
 >  athn0: New scan results available (own=0 ext=0)
 >  athn0: Radio work 'scan'@0xb3528f40 done in 7.625546 seconds
 >  athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
 >  athn0: CTRL-EVENT-SSID-REENABLED id=0 ssid="MY_WIFI_NETWORK"
 >  Mark BSSID XX:XX:XX:XX:a4:a6 ignored to allow a lower priority BSS,
 > if any, to be tried next athn0: BSSID XX:XX:XX:XX:a4:a6 ignore list
 > count incremented to 3, ignoring for 60 seconds athn0: Selecting BSS
 > from priority group 0 athn0: 0: XX:XX:XX:XX:3b:45
 > ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=65
 > freq=5180 athn0:    skip - BSSID ignored (count=4 limit=0) athn0: 1:
 > XX:XX:XX:XX:3b:43 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x10
 > level=64 freq=5180 athn0:    skip - SSID not known athn0: 2:
 > XX:XX:XX:XX:3b:46 ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24
 > caps=0x31 level=65 freq=2412 athn0:    selected based on RSN IE
 > athn0: MLD: No Multi-Link element athn0:    selected BSS
 > XX:XX:XX:XX:3b:46 ssid='MY_WIFI_NETWORK' athn0: Considering connect
 > request: reassociate: 0  selected: XX:XX:XX:XX:3b:46  bssid:
 > 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING
 > ssid=0xb36b7000  current_ssid=0x0 athn0: Request association with
 > XX:XX:XX:XX:3b:46 athn0: Re-association to the same ESS athn0: No
 > ongoing scan/p2p-scan found to abort athn0: Add radio work
 > 'connect'@0xb3528f40 athn0: First radio work item in the queue -
 > schedule start immediately athn0: Starting radio work
 > 'connect'@0xb3528f40 after 0.000055 second wait athn0: WPA: clearing
 > own WPA/RSN IE athn0: RSN: clearing own RSNXE RSN: PMKSA cache search
 > - network_ctx=0xb36b7000 try_opportunistic=0 akmp=0x0 RSN: Search for
 > BSSID XX:XX:XX:XX:3b:46 RSN: No PMKSA cache entry found
 >  athn0: RSN: using IEEE 802.11i/D9.0
 >  athn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
 > proto 2 athn0: WPA: Selected mgmt group cipher 32
 >  athn0: WPA: clearing AP WPA IE
 >  WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
 >  athn0: WPA: clearing AP RSNXE
 >  athn0: WPA: AP group 0x10 network profile group 0x18; available
 > group 0x10 athn0: WPA: using GTK CCMP
 >  athn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
 > available pairwise 0x10 athn0: WPA: using PTK CCMP
 >  athn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
 > key_mgmt 0x2 athn0: WPA: using KEY_MGMT WPA-PSK
 >  athn0: WPA: AP mgmt_group_cipher 0x20 network profile
 > mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 athn0: WPA:
 > not using MGMT group cipher WPA: Set own WPA IE default -
 > hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
 > hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
 >  WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
 >  athn0: Automatic auth_alg selection: 0x1
 >  No supported operating classes IE to add
 >  athn0: Trying to associate with XX:XX:XX:XX:3b:46
 > (SSID='MY_WIFI_NETWORK' freq=2412 MHz) athn0: Cancelling scan request
 >  athn0: State: SCANNING -> ASSOCIATING
 >  Limit connection to BSSID XX:XX:XX:XX:3b:46 freq=2412 MHz based on
 > scan results (bssid_set=0 wps=0) PSK (set in config) -
 > hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
 > 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
 > wpa_driver_bsd_set_drop_unencrypted: enabled=1
 > wpa_driver_bsd_associate: set PRIVACY 1 athn0: Setting authentication
 > timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - EAP fail=0
 >  EAPOL: External notification - portControl=Auto
 >  athn0: Event ASSOC (0) received
 >  athn0: State: ASSOCIATING -> ASSOCIATED
 >  athn0: Associated to a new BSS: BSSID=XX:XX:XX:XX:3b:46
 >  athn0: Associated with XX:XX:XX:XX:3b:46
 >  athn0: WPA: Association event - clear replay counter
 >  athn0: WPA: Clear old PTK
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - portEnabled=1
 >  EAPOL: SUPP_PAE entering state CONNECTING
 >  EAPOL: enable timer tick
 >  EAPOL: SUPP_BE entering state IDLE
 >  athn0: Setting authentication timeout: 10 sec 0 usec
 >  athn0: Cancelling scan request
 >  athn0: RX EAPOL from XX:XX:XX:XX:3b:46 (encrypted=-1)
 >  RX EAPOL - hexdump(len=99): [...REDACTED...]
 >  athn0: Setting authentication timeout: 10 sec 0 usec
 >  athn0: IEEE 802.1X RX: version=2 type=3 length=95
 >  WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
 >  athn0:   EAPOL-Key type=2
 >  athn0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
 >  athn0:   key_length=16 key_data_length=0
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  athn0: WPA: RX message 1 of 4-Way Handshake from XX:XX:XX:XX:3b:46
 > (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
 >  athn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
 >  Get randomness: len=32 entropy=21
 >  WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
 >  WPA: PTK derivation using PRF(SHA1)
 >  WPA: PTK derivation - A1=xx:xx:xx:xx:a9:b1 A2=XX:XX:XX:XX:3b:46
 >  WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
 >  WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
 >  WPA: PMK - hexdump(len=32): [REMOVED]
 >  WPA: PTK - hexdump(len=48): [REMOVED]
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: KEK - hexdump(len=16): [REMOVED]
 >  WPA: TK - hexdump(len=16): [REMOVED]
 >  WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
 >  WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
 >  athn0: WPA: Sending EAPOL-Key 2/4
 >  WPA: Send EAPOL-Key frame to XX:XX:XX:XX:3b:46 ver=2 mic_len=16
 > key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
 >  WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
 >  athn0: RX EAPOL from XX:XX:XX:XX:3b:46 (encrypted=-1)
 >  RX EAPOL - hexdump(len=163): [...REDACTED...]
 >  athn0: IEEE 802.1X RX: version=2 type=3 length=159
 >  WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
 >  athn0:   EAPOL-Key type=2
 >  athn0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
 > MIC Secure Encr) athn0:   key_length=16 key_data_length=64
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  WPA: EAPOL-Key MIC using HMAC-SHA1
 >  RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
 >  WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
 >  WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
 >  athn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
 >  athn0: RSN: RX message 3 of 4-Way Handshake from XX:XX:XX:XX:3b:46
 > (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
 >  WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
 >  WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
 >  WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
 >  athn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
 > msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
 >  RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
 >  athn0: Request to deauthenticate - bssid=XX:XX:XX:XX:3b:46
 > pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
 > state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > bsd_send_mlme_param: op=3 reason=17 addr=XX:XX:XX:XX:3b:46 athn0:
 > Event DEAUTH (11) received athn0: Deauthentication notification
 > athn0:  * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
 > Deauthentication frame IE(s) - hexdump(len=0): [NULL] athn0:
 > CTRL-EVENT-DISCONNECTED bssid=XX:XX:XX:XX:3b:46 reason=17
 > locally_generated=1 athn0: Auto connect enabled: try to reconnect
 > (wps=0/0 wpa_state=7) athn0: Setting scan request: 0.100000 sec
 > athn0: Radio work 'connect'@0xb3528f40 done in 0.056098 seconds
 > athn0: radio_work_free('connect'@0xb3528f40): num_active_works --> 0
 > athn0: BSSID XX:XX:XX:XX:3b:46 ignore list count incremented to 4,
 > ignoring for 120 seconds Continuous association failures - consider
 > temporary network disabling athn0: CTRL-EVENT-SSID-TEMP-DISABLED id=0
 > ssid="MY_WIFI_NETWORK" auth_failures=4 duration=86 reason=CONN_FAILED
 > athn0: Consecutive connection failures: 7 --> request scan in 10000
 > ms athn0: Ignore new scan request for 10.000000 sec since an earlier
 > request is scheduled to trigger sooner athn0: WPA: Clear old PMK and
 > PTK athn0: Disconnect event - remove keys athn0: State:
 > 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External notification -
 > portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL:
 > Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state
 > INITIALIZE EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  athn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  QM: Clear all active DSCP policies
 >  athn0: CTRL-EVENT-DSCP-POLICY clear_all
 >  athn0: Ignore new scan request for 5.000000 sec since an earlier
 > request is scheduled to trigger sooner athn0: Request to
 > deauthenticate - bssid=00:00:00:00:00:00
 > pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
 > state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > athn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
 > notification - portEnabled=0 EAPOL: External notification -
 > portValid=0 QM: Clear all active DSCP policies athn0:
 > CTRL-EVENT-DSCP-POLICY clear_all athn0: Ignore new scan request for
 > 5.000000 sec since an earlier request is scheduled to trigger sooner
 > athn0: Event DISASSOC (1) received athn0: Disassociation notification
 > athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
 > athn0: Do not request new immediate scan athn0: WPA: Clear old PMK
 > and PTK athn0: Disconnect event - remove keys
 >  athn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  athn0: State: DISCONNECTED -> SCANNING
 >  Scan SSID - hexdump_ascii(len=16):
 >       XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d   MY_WIFI_NETWORK
 >  athn0: Starting AP scan for wildcard SSID (Interleave with specific)
 >  athn0: Add radio work 'scan'@0xb3528f40
 >  athn0: First radio work item in the queue - schedule start
 > immediately athn0: Starting radio work 'scan'@0xb3528f40 after
 > 0.000138 second wait wpa_driver_bsd_set_wpa: enabled=1
 >  wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 >  EAPOL: startWhen --> 0
 >  EAPOL: disable timer tick
 >  athn0: Event SCAN_RESULTS (3) received
 >  Received 2200 bytes of scan results (27 BSSes)
 >  athn0: BSS: Start scan result update 10
 >  BSS: last_scan_res_used=27/32
 >  athn0: New scan results available (own=0 ext=0)
 >  athn0: Radio work 'scan'@0xb3528f40 done in 7.745269 seconds
 >  athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
 >  athn0: Postpone network selection by 79 seconds since all networks
 > are disabled athn0: Try to associate due to network getting re-enabled
 >  Fast associate: Old scan results
 >  athn0: Setting scan request: 0.000000 sec
 >  Scan SSID - hexdump_ascii(len=16):
 >       XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d   MY_WIFI_NETWORK
 >  athn0: Starting AP scan for specific SSID: MY_WIFI_NETWORK
 >  athn0: Add radio work 'scan'@0xb3528f40
 >  athn0: First radio work item in the queue - schedule start
 > immediately athn0: Starting radio work 'scan'@0xb3528f40 after
 > 0.000137 second wait wpa_driver_bsd_set_wpa: enabled=1
 >  wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 >  athn0: Event SCAN_RESULTS (3) received
 >  Received 2100 bytes of scan results (26 BSSes)
 >  athn0: BSS: Start scan result update 11
 >  BSS: last_scan_res_used=26/32
 >  athn0: New scan results available (own=0 ext=0)
 >  athn0: Radio work 'scan'@0xb3528f40 done in 7.624696 seconds
 >  athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
 >  athn0: CTRL-EVENT-SSID-REENABLED id=0 ssid="MY_WIFI_NETWORK"
 >  Mark BSSID XX:XX:XX:XX:3b:46 ignored to allow a lower priority BSS,
 > if any, to be tried next athn0: BSSID XX:XX:XX:XX:3b:46 ignore list
 > count incremented to 5, ignoring for 600 seconds athn0: Selecting BSS
 > from priority group 0 athn0: 0: XX:XX:XX:XX:3b:43 ssid=''
 > wpa_ie_len=0 rsn_ie_len=20 caps=0x10 level=65 freq=5180 athn0:
 > skip - SSID not known athn0: 1: XX:XX:XX:XX:3b:45
 > ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=61
 > freq=5180 athn0:    selected based on RSN IE athn0: MLD: No
 > Multi-Link element athn0:    selected BSS XX:XX:XX:XX:3b:45
 > ssid='MY_WIFI_NETWORK' athn0: Considering connect request:
 > reassociate: 0  selected: XX:XX:XX:XX:3b:45  bssid: 00:00:00:00:00:00
 >  pending: 00:00:00:00:00:00  wpa_state: SCANNING  ssid=0xb36b7000
 > current_ssid=0x0 athn0: Request association with XX:XX:XX:XX:3b:45
 > athn0: Re-association to the same ESS athn0: No ongoing scan/p2p-scan
 > found to abort athn0: Add radio work 'connect'@0xb3528f40 athn0:
 > First radio work item in the queue - schedule start immediately
 > athn0: Starting radio work 'connect'@0xb3528f40 after 0.000056 second
 > wait athn0: WPA: clearing own WPA/RSN IE athn0: RSN: clearing own
 > RSNXE RSN: PMKSA cache search - network_ctx=0xb36b7000
 > try_opportunistic=0 akmp=0x0 RSN: Search for BSSID XX:XX:XX:XX:3b:45
 >  RSN: No PMKSA cache entry found
 >  athn0: RSN: using IEEE 802.11i/D9.0
 >  athn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
 > proto 2 athn0: WPA: Selected mgmt group cipher 32
 >  athn0: WPA: clearing AP WPA IE
 >  WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
 >  athn0: WPA: clearing AP RSNXE
 >  athn0: WPA: AP group 0x10 network profile group 0x18; available
 > group 0x10 athn0: WPA: using GTK CCMP
 >  athn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
 > available pairwise 0x10 athn0: WPA: using PTK CCMP
 >  athn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
 > key_mgmt 0x2 athn0: WPA: using KEY_MGMT WPA-PSK
 >  athn0: WPA: AP mgmt_group_cipher 0x20 network profile
 > mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 athn0: WPA:
 > not using MGMT group cipher WPA: Set own WPA IE default -
 > hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
 > hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
 >  WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
 >  athn0: Automatic auth_alg selection: 0x1
 >  No supported operating classes IE to add
 >  athn0: Trying to associate with XX:XX:XX:XX:3b:45
 > (SSID='MY_WIFI_NETWORK' freq=5180 MHz) athn0: Cancelling scan request
 >  athn0: State: SCANNING -> ASSOCIATING
 >  Limit connection to BSSID XX:XX:XX:XX:3b:45 freq=5180 MHz based on
 > scan results (bssid_set=0 wps=0) PSK (set in config) -
 > hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
 > 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
 > wpa_driver_bsd_set_drop_unencrypted: enabled=1
 > wpa_driver_bsd_associate: set PRIVACY 1 athn0: Setting authentication
 > timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - EAP fail=0
 >  EAPOL: External notification - portControl=Auto
 >  athn0: Event ASSOC (0) received
 >  athn0: State: ASSOCIATING -> ASSOCIATED
 >  athn0: Associated to a new BSS: BSSID=XX:XX:XX:XX:3b:45
 >  athn0: Associated with XX:XX:XX:XX:3b:45
 >  athn0: WPA: Association event - clear replay counter
 >  athn0: WPA: Clear old PTK
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - portEnabled=1
 >  EAPOL: SUPP_PAE entering state CONNECTING
 >  EAPOL: enable timer tick
 >  EAPOL: SUPP_BE entering state IDLE
 >  athn0: Setting authentication timeout: 10 sec 0 usec
 >  athn0: Cancelling scan request
 >  athn0: RX EAPOL from XX:XX:XX:XX:3b:45 (encrypted=-1)
 >  RX EAPOL - hexdump(len=99): [...REDACTED...]
 >  athn0: Setting authentication timeout: 10 sec 0 usec
 >  athn0: IEEE 802.1X RX: version=2 type=3 length=95
 >  WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
 >  athn0:   EAPOL-Key type=2
 >  athn0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
 >  athn0:   key_length=16 key_data_length=0
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  athn0: WPA: RX message 1 of 4-Way Handshake from XX:XX:XX:XX:3b:45
 > (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
 >  athn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
 >  Get randomness: len=32 entropy=21
 >  WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
 >  WPA: PTK derivation using PRF(SHA1)
 >  WPA: PTK derivation - A1=xx:xx:xx:xx:a9:b1 A2=XX:XX:XX:XX:3b:45
 >  WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
 >  WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
 >  WPA: PMK - hexdump(len=32): [REMOVED]
 >  WPA: PTK - hexdump(len=48): [REMOVED]
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: KEK - hexdump(len=16): [REMOVED]
 >  WPA: TK - hexdump(len=16): [REMOVED]
 >  WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
 >  WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
 >  athn0: WPA: Sending EAPOL-Key 2/4
 >  WPA: Send EAPOL-Key frame to XX:XX:XX:XX:3b:45 ver=2 mic_len=16
 > key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
 >  WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
 >  athn0: RX EAPOL from XX:XX:XX:XX:3b:45 (encrypted=-1)
 >  RX EAPOL - hexdump(len=163): [...REDACTED...]
 >  athn0: IEEE 802.1X RX: version=2 type=3 length=159
 >  WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
 >  athn0:   EAPOL-Key type=2
 >  athn0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
 > MIC Secure Encr) athn0:   key_length=16 key_data_length=64
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  WPA: EAPOL-Key MIC using HMAC-SHA1
 >  RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
 >  WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
 >  WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
 >  athn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
 >  athn0: RSN: RX message 3 of 4-Way Handshake from XX:XX:XX:XX:3b:45
 > (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
 >  WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
 >  WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
 >  WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
 >  athn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
 > msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
 >  RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
 >  athn0: Request to deauthenticate - bssid=XX:XX:XX:XX:3b:45
 > pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
 > state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > bsd_send_mlme_param: op=3 reason=17 addr=XX:XX:XX:XX:3b:45 athn0:
 > Event DEAUTH (11) received athn0: Deauthentication notification
 > athn0:  * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
 > Deauthentication frame IE(s) - hexdump(len=0): [NULL] athn0:
 > CTRL-EVENT-DISCONNECTED bssid=XX:XX:XX:XX:3b:45 reason=17
 > locally_generated=1 athn0: Auto connect enabled: try to reconnect
 > (wps=0/0 wpa_state=7) athn0: Setting scan request: 0.100000 sec
 > athn0: Radio work 'connect'@0xb3528f40 done in 0.078452 seconds
 > athn0: radio_work_free('connect'@0xb3528f40): num_active_works --> 0
 > athn0: BSSID XX:XX:XX:XX:3b:45 ignore list count incremented to 5,
 > ignoring for 600 seconds Continuous association failures - consider
 > temporary network disabling athn0: CTRL-EVENT-SSID-TEMP-DISABLED id=0
 > ssid="MY_WIFI_NETWORK" auth_failures=5 duration=77 reason=CONN_FAILED
 > athn0: Consecutive connection failures: 8 --> request scan in 10000
 > ms athn0: Ignore new scan request for 10.000000 sec since an earlier
 > request is scheduled to trigger sooner athn0: WPA: Clear old PMK and
 > PTK athn0: Disconnect event - remove keys athn0: State:
 > 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External notification -
 > portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL:
 > Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state
 > INITIALIZE EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  athn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  QM: Clear all active DSCP policies
 >  athn0: CTRL-EVENT-DSCP-POLICY clear_all
 >  athn0: Ignore new scan request for 5.000000 sec since an earlier
 > request is scheduled to trigger sooner athn0: Request to
 > deauthenticate - bssid=00:00:00:00:00:00
 > pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
 > state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > athn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
 > notification - portEnabled=0 EAPOL: External notification -
 > portValid=0 QM: Clear all active DSCP policies athn0:
 > CTRL-EVENT-DSCP-POLICY clear_all athn0: Ignore new scan request for
 > 5.000000 sec since an earlier request is scheduled to trigger sooner
 > athn0: Event DISASSOC (1) received athn0: Disassociation notification
 > athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
 > athn0: Do not request new immediate scan athn0: WPA: Clear old PMK
 > and PTK athn0: Disconnect event - remove keys
 >  athn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  athn0: State: DISCONNECTED -> SCANNING
 >  athn0: Starting AP scan for wildcard SSID
 >  athn0: Add radio work 'scan'@0xb3528f40
 >  athn0: First radio work item in the queue - schedule start
 > immediately athn0: Starting radio work 'scan'@0xb3528f40 after
 > 0.000138 second wait wpa_driver_bsd_set_wpa: enabled=1
 >  wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 >  EAPOL: startWhen --> 0
 >  EAPOL: disable timer tick
 >  athn0: Event SCAN_RESULTS (3) received
 >  Received 1992 bytes of scan results (25 BSSes)
 >  athn0: BSS: Start scan result update 12
 >  athn0: BSS: Remove id 27 BSSID XX:XX:XX:XX:ed:90 SSID 'OTHERNETWORK'
 > due to no match in scan BSS: last_scan_res_used=25/32
 >  athn0: New scan results available (own=0 ext=0)
 >  athn0: Radio work 'scan'@0xb3528f40 done in 7.755612 seconds
 >  athn0: radio_work_free('scan'@0xb3528f40): num_active_works --> 0
 >  athn0: Postpone network selection by 69 seconds since all networks
 > are disabled 
 >  -----------
 >  
 >  # cat /etc/wpa_supplicant.conf
 >  
 >  # $NetBSD: wpa_supplicant.conf,v 1.1 2019/01/12 16:51:54 roy Exp $
 >  
 >  # Allow wpa_cli(8) to configure wpa_supplicant
 >  ctrl_interface=/var/run/wpa_supplicant
 >  ctrl_interface_group=wheel
 >  update_config=1
 >  
 >  #
 >  # Added by NetBSD sysinst
 >  #
 >  network={
 >  	ssid="MY_WIFI_NETWORK"
 >  	psk="PASSWORD"
 >  	scan_ssid=1
 >  }
 >  athn0: flags=0x8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500
 >  	ssid "" nwkey 65536:"","","",""
 >  	powersave off
 >  	address: xx:xx:xx:xx:a9:b1
 >  	media: IEEE802.11 autoselect (OFDM6)
 >  	status: no network
 >  	inet6 fe80::76e5:43ff:fe19:a9b1%athn0/64 flags 0x8<DETACHED>
 > scopeid 0x1 
 >  --MP_/=AqH6GaA0+Un68Q7y46V_tI
 >  Content-Type: text/x-log
 >  Content-Transfer-Encoding: 7bit
 >  Content-Disposition: attachment;
 > filename=wpa_supplicant_2026-02-13-rtwn0.log 
 >  wpa_supplicant v2.11
 >  Successfully initialized wpa_supplicant
 >  Initializing interface 'rtwn0' conf '/etc/wpa_supplicant.conf'
 > driver 'bsd' ctrl_interface 'N/A' bridge 'N/A' Configuration file
 > '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' Reading
 > configuration file '/etc/wpa_supplicant.conf'
 > ctrl_interface='/var/run/wpa_supplicant' ctrl_interface_group='wheel'
 >  update_config=1
 >  Line: 11 - start of a new network block
 >  ssid - hexdump_ascii(len=16):
 >       XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d   MY_WIFI_NETWORK
 >  PSK (ASCII passphrase) - hexdump_ascii(len=28): [REMOVED]
 >  scan_ssid=1 (0x1)
 >  PSK (from passphrase) - hexdump(len=32): [REMOVED]
 >  Priority group 0
 >     id=0 ssid='MY_WIFI_NETWORK'
 >  Add interface rtwn0 to a new radio N/A
 >  rtwn0: Failed to attach pkt_type filter
 >  rtwn0: Own MAC address: 74:de:2b:c1:f1:62
 >  bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0
 >  bsd_del_key: key_idx=0
 >  bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0
 >  bsd_del_key: key_idx=1
 >  bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0
 >  bsd_del_key: key_idx=2
 >  bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0
 >  bsd_del_key: key_idx=3
 >  bsd_set_key: alg=0 addr=0x0 key_idx=4 set_tx=0 seq_len=0 key_len=0
 >  bsd_del_key: key_idx=4
 >  ioctl[SIOCS80211, op=20, val=0, arg_len=7]: Invalid argument
 >  bsd_set_key: alg=0 addr=0x0 key_idx=5 set_tx=0 seq_len=0 key_len=0
 >  bsd_del_key: key_idx=5
 >  ioctl[SIOCS80211, op=20, val=0, arg_len=7]: Invalid argument
 >  wpa_driver_bsd_set_countermeasures: enabled=0
 >  rtwn0: RSN: flushing PMKID list in the driver
 >  rtwn0: Setting scan request: 0.100000 sec
 >  ENGINE: Loading builtin engines
 >  ENGINE: Loading builtin engines
 >  EAPOL: SUPP_PAE entering state DISCONNECTED
 >  EAPOL: Supplicant port status: Unauthorized
 >  EAPOL: KEY_RX entering state NO_KEY_RECEIVE
 >  EAPOL: SUPP_BE entering state INITIALIZE
 >  EAP: EAP entering state DISABLED
 >  Using existing control interface directory.
 >  ctrl_interface_group=0 (from group name 'wheel')
 >  ctrl_iface bind(PF_UNIX) failed: Address already in use
 >  ctrl_iface exists, but does not allow connections - assuming it was
 > leftover from forced program termination Successfully replaced
 > leftover ctrl_iface socket '/var/run/wpa_supplicant/rtwn0' rtwn0:
 > Added interface rtwn0 rtwn0: State: DISCONNECTED -> DISCONNECTED
 >  rtwn0: State: DISCONNECTED -> SCANNING
 >  Scan SSID - hexdump_ascii(len=16):
 >       XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d   MY_WIFI_NETWORK
 >  rtwn0: Starting AP scan for wildcard SSID (Interleave with specific)
 >  rtwn0: Add radio work 'scan'@0xb3661f40
 >  rtwn0: First radio work item in the queue - schedule start
 > immediately rtwn0: Starting radio work 'scan'@0xb3661f40 after
 > 0.000138 second wait wpa_driver_bsd_set_wpa: enabled=1
 >  wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 >  EAPOL: disable timer tick
 >  rtwn0: Event SCAN_RESULTS (3) received
 >  Received 808 bytes of scan results (10 BSSes)
 >  rtwn0: BSS: Start scan result update 1
 >  rtwn0: BSS: Add new id 0 BSSID xx:xx:xx:xx:3b:44 SSID '' freq 2412
 >  rtwn0: BSS: Add new id 1 BSSID xx:xx:xx:xx:3b:46 SSID
 > 'MY_WIFI_NETWORK' freq 2412 rtwn0: BSS: Add new id 2 BSSID
 > xx:xx:xx:xx:a4:a4 SSID '' freq 2412 rtwn0: BSS: Add new id 3 BSSID
 > xx:xx:xx:xx:a4:a6 SSID 'MY_WIFI_NETWORK' freq 2412 rtwn0: BSS: Add
 > new id 4 BSSID xx:xx:xx:xx:05:62 SSID '' freq 2412 rtwn0: BSS: Add
 > new id 5 BSSID xx:xx:xx:xx:a5:24 SSID '' freq 2412 rtwn0: BSS: Add
 > new id 6 BSSID xx:xx:xx:xx:a5:26 SSID 'MY_WIFI_NETWORK' freq 2412
 > rtwn0: BSS: Add new id 7 BSSID xx:xx:xx:xx:3b:48 SSID '' freq 2412
 > rtwn0: BSS: Add new id 8 BSSID xx:xx:xx:xx:a4:a8 SSID '' freq 2412
 > rtwn0: BSS: Add new id 9 BSSID xx:xx:xx:xx:a5:28 SSID '' freq 2412
 > BSS: last_scan_res_used=10/32 rtwn0: New scan results available
 > (own=0 ext=0) rtwn0: Radio work 'scan'@0xb3661f40 done in 4.835237
 > seconds rtwn0: radio_work_free('scan'@0xb3661f40): num_active_works
 > --> 0 rtwn0: Selecting BSS from priority group 0
 >  rtwn0: 0: xx:xx:xx:xx:3b:44 ssid='' wpa_ie_len=0 rsn_ie_len=20
 > caps=0x10 level=216 freq=2412 rtwn0:    skip - SSID not known
 >  rtwn0: 1: xx:xx:xx:xx:3b:46 ssid='MY_WIFI_NETWORK' wpa_ie_len=0
 > rsn_ie_len=24 caps=0x31 level=216 freq=2412 rtwn0:    selected based
 > on RSN IE rtwn0: MLD: No Multi-Link element
 >  rtwn0:    selected BSS xx:xx:xx:xx:3b:46 ssid='MY_WIFI_NETWORK'
 >  rtwn0: Considering connect request: reassociate: 0  selected:
 > xx:xx:xx:xx:3b:46  bssid: 00:00:00:00:00:00  pending:
 > 00:00:00:00:00:00  wpa_state: SCANNING  ssid=0xb37f0000
 > current_ssid=0x0 rtwn0: Request association with xx:xx:xx:xx:3b:46
 > rtwn0: No ongoing scan/p2p-scan found to abort rtwn0: Add radio work
 > 'connect'@0xb3661f40 rtwn0: First radio work item in the queue -
 > schedule start immediately rtwn0: Starting radio work
 > 'connect'@0xb3661f40 after 0.000163 second wait rtwn0: WPA: clearing
 > own WPA/RSN IE rtwn0: RSN: clearing own RSNXE RSN: PMKSA cache search
 > - network_ctx=0xb37f0000 try_opportunistic=0 akmp=0x0 RSN: Search for
 > BSSID xx:xx:xx:xx:3b:46 RSN: No PMKSA cache entry found
 >  rtwn0: RSN: using IEEE 802.11i/D9.0
 >  rtwn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
 > proto 2 rtwn0: WPA: Selected mgmt group cipher 32
 >  rtwn0: WPA: clearing AP WPA IE
 >  WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
 >  rtwn0: WPA: clearing AP RSNXE
 >  rtwn0: WPA: AP group 0x10 network profile group 0x18; available
 > group 0x10 rtwn0: WPA: using GTK CCMP
 >  rtwn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
 > available pairwise 0x10 rtwn0: WPA: using PTK CCMP
 >  rtwn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
 > key_mgmt 0x2 rtwn0: WPA: using KEY_MGMT WPA-PSK
 >  rtwn0: WPA: AP mgmt_group_cipher 0x20 network profile
 > mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 rtwn0: WPA:
 > not using MGMT group cipher WPA: Set own WPA IE default -
 > hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
 > hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
 >  WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
 >  rtwn0: Automatic auth_alg selection: 0x1
 >  No supported operating classes IE to add
 >  rtwn0: Trying to associate with xx:xx:xx:xx:3b:46
 > (SSID='MY_WIFI_NETWORK' freq=2412 MHz) rtwn0: Cancelling scan request
 >  rtwn0: State: SCANNING -> ASSOCIATING
 >  Limit connection to BSSID xx:xx:xx:xx:3b:46 freq=2412 MHz based on
 > scan results (bssid_set=0 wps=0) PSK (set in config) -
 > hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
 > 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
 > wpa_driver_bsd_set_drop_unencrypted: enabled=1
 > wpa_driver_bsd_associate: set PRIVACY 1 rtwn0: Setting authentication
 > timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - EAP fail=0
 >  EAPOL: External notification - portControl=Auto
 >  rtwn0: Event ASSOC (0) received
 >  rtwn0: State: ASSOCIATING -> ASSOCIATED
 >  rtwn0: Associated to a new BSS: BSSID=xx:xx:xx:xx:3b:46
 >  rtwn0: Associated with xx:xx:xx:xx:3b:46
 >  rtwn0: WPA: Association event - clear replay counter
 >  rtwn0: WPA: Clear old PTK
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - portEnabled=1
 >  EAPOL: SUPP_PAE entering state CONNECTING
 >  EAPOL: enable timer tick
 >  EAPOL: SUPP_BE entering state IDLE
 >  rtwn0: Setting authentication timeout: 10 sec 0 usec
 >  rtwn0: Cancelling scan request
 >  rtwn0: Event DISASSOC (1) received
 >  rtwn0: Disassociation notification
 >  rtwn0: CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:xx:3b:46 reason=0
 >  rtwn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6)
 >  rtwn0: Setting scan request: 0.100000 sec
 >  rtwn0: Radio work 'connect'@0xb3661f40 done in 0.033964 seconds
 >  rtwn0: radio_work_free('connect'@0xb3661f40): num_active_works --> 0
 >  rtwn0: Added BSSID xx:xx:xx:xx:3b:46 into ignore list, ignoring for
 > 10 seconds rtwn0: Another BSS in this ESS has been seen; try it next
 >  rtwn0: BSSID xx:xx:xx:xx:3b:46 ignore list count incremented to 2,
 > ignoring for 10 seconds rtwn0: Consecutive connection failures: 1 -->
 > request scan in 100 ms rtwn0: Ignore new scan request for 0.100000
 > sec since an earlier request is scheduled to trigger sooner rtwn0:
 > WPA: Clear old PMK and PTK rtwn0: Disconnect event - remove keys
 >  rtwn0: State: ASSOCIATED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: SUPP_PAE entering state DISCONNECTED
 >  EAPOL: Supplicant port status: Unauthorized
 >  EAPOL: SUPP_BE entering state INITIALIZE
 >  EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  rtwn0: State: DISCONNECTED -> SCANNING
 >  Scan SSID - hexdump_ascii(len=16):
 >       XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d   MY_WIFI_NETWORK
 >  rtwn0: Starting AP scan for specific SSID: MY_WIFI_NETWORK
 >  rtwn0: Optimize scan based on previously generated frequency list
 >  rtwn0: Add radio work 'scan'@0xb3661f40
 >  rtwn0: First radio work item in the queue - schedule start
 > immediately rtwn0: Starting radio work 'scan'@0xb3661f40 after
 > 0.000136 second wait wpa_driver_bsd_set_wpa: enabled=1
 >  wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 >  EAPOL: startWhen --> 0
 >  EAPOL: disable timer tick
 >  rtwn0: Event SCAN_RESULTS (3) received
 >  Received 808 bytes of scan results (10 BSSes)
 >  rtwn0: BSS: Start scan result update 2
 >  BSS: last_scan_res_used=10/32
 >  rtwn0: New scan results available (own=0 ext=0)
 >  rtwn0: Radio work 'scan'@0xb3661f40 done in 4.874728 seconds
 >  rtwn0: radio_work_free('scan'@0xb3661f40): num_active_works --> 0
 >  rtwn0: Selecting BSS from priority group 0
 >  rtwn0: 0: xx:xx:xx:xx:3b:46 ssid='MY_WIFI_NETWORK' wpa_ie_len=0
 > rsn_ie_len=24 caps=0x31 level=216 freq=2412 rtwn0:    skip - BSSID
 > ignored (count=2 limit=0) rtwn0: 1: xx:xx:xx:xx:3b:44 ssid=''
 > wpa_ie_len=0 rsn_ie_len=20 caps=0x10 level=216 freq=2412 rtwn0:
 > skip - SSID not known rtwn0: 2: xx:xx:xx:xx:a4:a6
 > ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24 caps=0x31 level=188
 > freq=2412 rtwn0:    selected based on RSN IE rtwn0: MLD: No
 > Multi-Link element rtwn0:    selected BSS xx:xx:xx:xx:a4:a6
 > ssid='MY_WIFI_NETWORK' rtwn0: Considering connect request:
 > reassociate: 0  selected: xx:xx:xx:xx:a4:a6  bssid: 00:00:00:00:00:00
 >  pending: 00:00:00:00:00:00  wpa_state: SCANNING  ssid=0xb37f0000
 > current_ssid=0x0 rtwn0: Request association with xx:xx:xx:xx:a4:a6
 > rtwn0: Re-association to the same ESS rtwn0: No ongoing scan/p2p-scan
 > found to abort rtwn0: Add radio work 'connect'@0xb3661f40 rtwn0:
 > First radio work item in the queue - schedule start immediately
 > rtwn0: Starting radio work 'connect'@0xb3661f40 after 0.000046 second
 > wait rtwn0: WPA: clearing own WPA/RSN IE rtwn0: RSN: clearing own
 > RSNXE RSN: PMKSA cache search - network_ctx=0xb37f0000
 > try_opportunistic=0 akmp=0x0 RSN: Search for BSSID xx:xx:xx:xx:a4:a6
 >  RSN: No PMKSA cache entry found
 >  rtwn0: RSN: using IEEE 802.11i/D9.0
 >  rtwn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
 > proto 2 rtwn0: WPA: Selected mgmt group cipher 32
 >  rtwn0: WPA: clearing AP WPA IE
 >  WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
 >  rtwn0: WPA: clearing AP RSNXE
 >  rtwn0: WPA: AP group 0x10 network profile group 0x18; available
 > group 0x10 rtwn0: WPA: using GTK CCMP
 >  rtwn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
 > available pairwise 0x10 rtwn0: WPA: using PTK CCMP
 >  rtwn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
 > key_mgmt 0x2 rtwn0: WPA: using KEY_MGMT WPA-PSK
 >  rtwn0: WPA: AP mgmt_group_cipher 0x20 network profile
 > mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 rtwn0: WPA:
 > not using MGMT group cipher WPA: Set own WPA IE default -
 > hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
 > hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
 >  WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
 >  rtwn0: Automatic auth_alg selection: 0x1
 >  No supported operating classes IE to add
 >  rtwn0: Trying to associate with xx:xx:xx:xx:a4:a6
 > (SSID='MY_WIFI_NETWORK' freq=2412 MHz) rtwn0: Cancelling scan request
 >  rtwn0: State: SCANNING -> ASSOCIATING
 >  Limit connection to BSSID xx:xx:xx:xx:a4:a6 freq=2412 MHz based on
 > scan results (bssid_set=0 wps=0) PSK (set in config) -
 > hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
 > 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
 > wpa_driver_bsd_set_drop_unencrypted: enabled=1
 > wpa_driver_bsd_associate: set PRIVACY 1 rtwn0: Setting authentication
 > timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - EAP fail=0
 >  EAPOL: External notification - portControl=Auto
 >  rtwn0: Event ASSOC (0) received
 >  rtwn0: State: ASSOCIATING -> ASSOCIATED
 >  rtwn0: Associated to a new BSS: BSSID=xx:xx:xx:xx:a4:a6
 >  rtwn0: Associated with xx:xx:xx:xx:a4:a6
 >  rtwn0: WPA: Association event - clear replay counter
 >  rtwn0: WPA: Clear old PTK
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - portEnabled=1
 >  EAPOL: SUPP_PAE entering state CONNECTING
 >  EAPOL: enable timer tick
 >  EAPOL: SUPP_BE entering state IDLE
 >  rtwn0: Setting authentication timeout: 10 sec 0 usec
 >  rtwn0: Cancelling scan request
 >  rtwn0: RX EAPOL from xx:xx:xx:xx:a4:a6 (encrypted=-1)
 >  RX EAPOL - hexdump(len=99): [...REDACTED...]
 >  rtwn0: Setting authentication timeout: 10 sec 0 usec
 >  rtwn0: IEEE 802.1X RX: version=2 type=3 length=95
 >  WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
 >  rtwn0:   EAPOL-Key type=2
 >  rtwn0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
 >  rtwn0:   key_length=16 key_data_length=0
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  rtwn0: WPA: RX message 1 of 4-Way Handshake from xx:xx:xx:xx:a4:a6
 > (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
 >  rtwn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
 >  Get randomness: len=32 entropy=22
 >  WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
 >  WPA: PTK derivation using PRF(SHA1)
 >  WPA: PTK derivation - A1=74:de:2b:c1:f1:62 A2=xx:xx:xx:xx:a4:a6
 >  WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
 >  WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
 >  WPA: PMK - hexdump(len=32): [REMOVED]
 >  WPA: PTK - hexdump(len=48): [REMOVED]
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: KEK - hexdump(len=16): [REMOVED]
 >  WPA: TK - hexdump(len=16): [REMOVED]
 >  WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
 >  WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
 >  rtwn0: WPA: Sending EAPOL-Key 2/4
 >  WPA: Send EAPOL-Key frame to xx:xx:xx:xx:a4:a6 ver=2 mic_len=16
 > key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
 >  WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
 >  rtwn0: RX EAPOL from xx:xx:xx:xx:a4:a6 (encrypted=-1)
 >  RX EAPOL - hexdump(len=163): [...REDACTED...]
 >  rtwn0: IEEE 802.1X RX: version=2 type=3 length=159
 >  WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
 >  rtwn0:   EAPOL-Key type=2
 >  rtwn0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
 > MIC Secure Encr) rtwn0:   key_length=16 key_data_length=64
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  WPA: EAPOL-Key MIC using HMAC-SHA1
 >  RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
 >  WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
 >  WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
 >  rtwn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
 >  rtwn0: RSN: RX message 3 of 4-Way Handshake from xx:xx:xx:xx:a4:a6
 > (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
 >  WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
 >  WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
 >  WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
 >  rtwn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
 > msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
 >  RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
 >  rtwn0: Request to deauthenticate - bssid=xx:xx:xx:xx:a4:a6
 > pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
 > state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > bsd_send_mlme_param: op=3 reason=17 addr=xx:xx:xx:xx:a4:a6 rtwn0:
 > Event DEAUTH (11) received rtwn0: Deauthentication notification
 > rtwn0:  * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
 > Deauthentication frame IE(s) - hexdump(len=0): [NULL] rtwn0:
 > CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:xx:a4:a6 reason=17
 > locally_generated=1 rtwn0: Auto connect enabled: try to reconnect
 > (wps=0/0 wpa_state=7) rtwn0: Setting scan request: 0.100000 sec
 > rtwn0: Radio work 'connect'@0xb3661f40 done in 0.076267 seconds
 > rtwn0: radio_work_free('connect'@0xb3661f40): num_active_works --> 0
 > rtwn0: Added BSSID xx:xx:xx:xx:a4:a6 into ignore list, ignoring for
 > 10 seconds rtwn0: Another BSS in this ESS has been seen; try it next
 > rtwn0: BSSID xx:xx:xx:xx:a4:a6 ignore list count incremented to 2,
 > ignoring for 10 seconds rtwn0: Consecutive connection failures: 2 -->
 > request scan in 500 ms rtwn0: Ignore new scan request for 0.500000
 > sec since an earlier request is scheduled to trigger sooner rtwn0:
 > WPA: Clear old PMK and PTK rtwn0: Disconnect event - remove keys
 > rtwn0: State: 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External
 > notification - portEnabled=0 EAPOL: SUPP_PAE entering state
 > DISCONNECTED EAPOL: Supplicant port status: Unauthorized
 >  EAPOL: SUPP_BE entering state INITIALIZE
 >  EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  rtwn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  QM: Clear all active DSCP policies
 >  rtwn0: CTRL-EVENT-DSCP-POLICY clear_all
 >  rtwn0: Ignore new scan request for 5.000000 sec since an earlier
 > request is scheduled to trigger sooner rtwn0: Request to
 > deauthenticate - bssid=00:00:00:00:00:00
 > pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
 > state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > rtwn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
 > notification - portEnabled=0 EAPOL: External notification -
 > portValid=0 QM: Clear all active DSCP policies rtwn0:
 > CTRL-EVENT-DSCP-POLICY clear_all rtwn0: Ignore new scan request for
 > 5.000000 sec since an earlier request is scheduled to trigger sooner
 > rtwn0: Event DISASSOC (1) received rtwn0: Disassociation notification
 > rtwn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
 > rtwn0: Do not request new immediate scan rtwn0: WPA: Clear old PMK
 > and PTK rtwn0: Disconnect event - remove keys
 >  rtwn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  rtwn0: State: DISCONNECTED -> SCANNING
 >  rtwn0: Starting AP scan for wildcard SSID
 >  rtwn0: Optimize scan based on previously generated frequency list
 >  rtwn0: Add radio work 'scan'@0xb3661f40
 >  rtwn0: First radio work item in the queue - schedule start
 > immediately rtwn0: Starting radio work 'scan'@0xb3661f40 after
 > 0.000136 second wait wpa_driver_bsd_set_wpa: enabled=1
 >  wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 >  EAPOL: startWhen --> 0
 >  EAPOL: disable timer tick
 >  rtwn0: Event SCAN_RESULTS (3) received
 >  Received 808 bytes of scan results (10 BSSes)
 >  rtwn0: BSS: Start scan result update 3
 >  BSS: last_scan_res_used=10/32
 >  rtwn0: New scan results available (own=0 ext=0)
 >  rtwn0: Radio work 'scan'@0xb3661f40 done in 4.874954 seconds
 >  rtwn0: radio_work_free('scan'@0xb3661f40): num_active_works --> 0
 >  rtwn0: Selecting BSS from priority group 0
 >  rtwn0: 0: xx:xx:xx:xx:3b:46 ssid='MY_WIFI_NETWORK' wpa_ie_len=0
 > rsn_ie_len=24 caps=0x31 level=216 freq=2412 rtwn0:    selected based
 > on RSN IE rtwn0: MLD: No Multi-Link element
 >  rtwn0:    selected BSS xx:xx:xx:xx:3b:46 ssid='MY_WIFI_NETWORK'
 >  rtwn0: Considering connect request: reassociate: 0  selected:
 > xx:xx:xx:xx:3b:46  bssid: 00:00:00:00:00:00  pending:
 > 00:00:00:00:00:00  wpa_state: SCANNING  ssid=0xb37f0000
 > current_ssid=0x0 rtwn0: Request association with xx:xx:xx:xx:3b:46
 > rtwn0: Re-association to the same ESS rtwn0: No ongoing scan/p2p-scan
 > found to abort rtwn0: Add radio work 'connect'@0xb3661f40 rtwn0:
 > First radio work item in the queue - schedule start immediately
 > rtwn0: Starting radio work 'connect'@0xb3661f40 after 0.000151 second
 > wait rtwn0: WPA: clearing own WPA/RSN IE rtwn0: RSN: clearing own
 > RSNXE RSN: PMKSA cache search - network_ctx=0xb37f0000
 > try_opportunistic=0 akmp=0x0 RSN: Search for BSSID xx:xx:xx:xx:3b:46
 >  RSN: No PMKSA cache entry found
 >  rtwn0: RSN: using IEEE 802.11i/D9.0
 >  rtwn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
 > proto 2 rtwn0: WPA: Selected mgmt group cipher 32
 >  rtwn0: WPA: clearing AP WPA IE
 >  WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
 >  rtwn0: WPA: clearing AP RSNXE
 >  rtwn0: WPA: AP group 0x10 network profile group 0x18; available
 > group 0x10 rtwn0: WPA: using GTK CCMP
 >  rtwn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
 > available pairwise 0x10 rtwn0: WPA: using PTK CCMP
 >  rtwn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
 > key_mgmt 0x2 rtwn0: WPA: using KEY_MGMT WPA-PSK
 >  rtwn0: WPA: AP mgmt_group_cipher 0x20 network profile
 > mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 rtwn0: WPA:
 > not using MGMT group cipher WPA: Set own WPA IE default -
 > hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
 > hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
 >  WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
 >  rtwn0: Automatic auth_alg selection: 0x1
 >  No supported operating classes IE to add
 >  rtwn0: Trying to associate with xx:xx:xx:xx:3b:46
 > (SSID='MY_WIFI_NETWORK' freq=2412 MHz) rtwn0: Cancelling scan request
 >  rtwn0: State: SCANNING -> ASSOCIATING
 >  Limit connection to BSSID xx:xx:xx:xx:3b:46 freq=2412 MHz based on
 > scan results (bssid_set=0 wps=0) PSK (set in config) -
 > hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
 > 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
 > wpa_driver_bsd_set_drop_unencrypted: enabled=1
 > wpa_driver_bsd_associate: set PRIVACY 1 rtwn0: Setting authentication
 > timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - EAP fail=0
 >  EAPOL: External notification - portControl=Auto
 >  rtwn0: Event ASSOC (0) received
 >  rtwn0: State: ASSOCIATING -> ASSOCIATED
 >  rtwn0: Associated to a new BSS: BSSID=xx:xx:xx:xx:3b:46
 >  rtwn0: Associated with xx:xx:xx:xx:3b:46
 >  rtwn0: WPA: Association event - clear replay counter
 >  rtwn0: WPA: Clear old PTK
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - portEnabled=1
 >  EAPOL: SUPP_PAE entering state CONNECTING
 >  EAPOL: enable timer tick
 >  EAPOL: SUPP_BE entering state IDLE
 >  rtwn0: Setting authentication timeout: 10 sec 0 usec
 >  rtwn0: Cancelling scan request
 >  rtwn0: RX EAPOL from xx:xx:xx:xx:3b:46 (encrypted=-1)
 >  RX EAPOL - hexdump(len=99): [...REDACTED...]
 >  rtwn0: Setting authentication timeout: 10 sec 0 usec
 >  rtwn0: IEEE 802.1X RX: version=2 type=3 length=95
 >  WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
 >  rtwn0:   EAPOL-Key type=2
 >  rtwn0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
 >  rtwn0:   key_length=16 key_data_length=0
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  rtwn0: WPA: RX message 1 of 4-Way Handshake from xx:xx:xx:xx:3b:46
 > (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
 >  rtwn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
 >  Get randomness: len=32 entropy=11
 >  WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
 >  WPA: PTK derivation using PRF(SHA1)
 >  WPA: PTK derivation - A1=74:de:2b:c1:f1:62 A2=xx:xx:xx:xx:3b:46
 >  WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
 >  WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
 >  WPA: PMK - hexdump(len=32): [REMOVED]
 >  WPA: PTK - hexdump(len=48): [REMOVED]
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: KEK - hexdump(len=16): [REMOVED]
 >  WPA: TK - hexdump(len=16): [REMOVED]
 >  WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
 >  WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
 >  rtwn0: WPA: Sending EAPOL-Key 2/4
 >  WPA: Send EAPOL-Key frame to xx:xx:xx:xx:3b:46 ver=2 mic_len=16
 > key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
 >  WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
 >  rtwn0: RX EAPOL from xx:xx:xx:xx:3b:46 (encrypted=-1)
 >  RX EAPOL - hexdump(len=163): [...REDACTED...]
 >  rtwn0: IEEE 802.1X RX: version=2 type=3 length=159
 >  WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
 >  rtwn0:   EAPOL-Key type=2
 >  rtwn0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
 > MIC Secure Encr) rtwn0:   key_length=16 key_data_length=64
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  WPA: EAPOL-Key MIC using HMAC-SHA1
 >  RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
 >  WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
 >  WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
 >  rtwn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
 >  rtwn0: RSN: RX message 3 of 4-Way Handshake from xx:xx:xx:xx:3b:46
 > (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
 >  WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
 >  WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
 >  WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
 >  rtwn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
 > msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
 >  RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
 >  rtwn0: Request to deauthenticate - bssid=xx:xx:xx:xx:3b:46
 > pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
 > state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > bsd_send_mlme_param: op=3 reason=17 addr=xx:xx:xx:xx:3b:46 rtwn0:
 > Event DEAUTH (11) received rtwn0: Deauthentication notification
 > rtwn0:  * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
 > Deauthentication frame IE(s) - hexdump(len=0): [NULL] rtwn0:
 > CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:xx:3b:46 reason=17
 > locally_generated=1 rtwn0: Auto connect enabled: try to reconnect
 > (wps=0/0 wpa_state=7) rtwn0: Setting scan request: 0.100000 sec
 > rtwn0: Radio work 'connect'@0xb3661f40 done in 0.052810 seconds
 > rtwn0: radio_work_free('connect'@0xb3661f40): num_active_works --> 0
 > rtwn0: BSSID xx:xx:xx:xx:3b:46 ignore list count incremented to 3,
 > ignoring for 60 seconds rtwn0: Consecutive connection failures: 3 -->
 > request scan in 1000 ms rtwn0: Ignore new scan request for 1.000000
 > sec since an earlier request is scheduled to trigger sooner rtwn0:
 > WPA: Clear old PMK and PTK rtwn0: Disconnect event - remove keys
 > rtwn0: State: 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External
 > notification - portEnabled=0 EAPOL: SUPP_PAE entering state
 > DISCONNECTED EAPOL: Supplicant port status: Unauthorized
 >  EAPOL: SUPP_BE entering state INITIALIZE
 >  EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  rtwn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  QM: Clear all active DSCP policies
 >  rtwn0: CTRL-EVENT-DSCP-POLICY clear_all
 >  rtwn0: Ignore new scan request for 5.000000 sec since an earlier
 > request is scheduled to trigger sooner rtwn0: Request to
 > deauthenticate - bssid=00:00:00:00:00:00
 > pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
 > state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > rtwn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
 > notification - portEnabled=0 EAPOL: External notification -
 > portValid=0 QM: Clear all active DSCP policies rtwn0:
 > CTRL-EVENT-DSCP-POLICY clear_all rtwn0: Ignore new scan request for
 > 5.000000 sec since an earlier request is scheduled to trigger sooner
 > rtwn0: Event DISASSOC (1) received rtwn0: Disassociation notification
 > rtwn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
 > rtwn0: Do not request new immediate scan rtwn0: WPA: Clear old PMK
 > and PTK rtwn0: Disconnect event - remove keys
 >  rtwn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  rtwn0: State: DISCONNECTED -> SCANNING
 >  Scan SSID - hexdump_ascii(len=16):
 >       XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d   MY_WIFI_NETWORK
 >  rtwn0: Starting AP scan for wildcard SSID (Interleave with specific)
 >  rtwn0: Add radio work 'scan'@0xb3661f40
 >  rtwn0: First radio work item in the queue - schedule start
 > immediately rtwn0: Starting radio work 'scan'@0xb3661f40 after
 > 0.000037 second wait wpa_driver_bsd_set_wpa: enabled=1
 >  wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 >  EAPOL: startWhen --> 0
 >  EAPOL: disable timer tick
 >  rtwn0: Event SCAN_RESULTS (3) received
 >  Received 808 bytes of scan results (10 BSSes)
 >  rtwn0: BSS: Start scan result update 4
 >  BSS: last_scan_res_used=10/32
 >  rtwn0: New scan results available (own=0 ext=0)
 >  rtwn0: Radio work 'scan'@0xb3661f40 done in 6.875083 seconds
 >  rtwn0: radio_work_free('scan'@0xb3661f40): num_active_works --> 0
 >  rtwn0: Selecting BSS from priority group 0
 >  rtwn0: 0: xx:xx:xx:xx:3b:44 ssid='' wpa_ie_len=0 rsn_ie_len=20
 > caps=0x10 level=216 freq=2412 rtwn0:    skip - SSID not known
 >  rtwn0: 1: xx:xx:xx:xx:3b:46 ssid='MY_WIFI_NETWORK' wpa_ie_len=0
 > rsn_ie_len=24 caps=0x31 level=216 freq=2412 rtwn0:    skip - BSSID
 > ignored (count=3 limit=0) rtwn0: 2: xx:xx:xx:xx:a4:a6
 > ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24 caps=0x31 level=188
 > freq=2412 rtwn0:    selected based on RSN IE rtwn0: MLD: No
 > Multi-Link element rtwn0:    selected BSS xx:xx:xx:xx:a4:a6
 > ssid='MY_WIFI_NETWORK' rtwn0: Considering connect request:
 > reassociate: 0  selected: xx:xx:xx:xx:a4:a6  bssid: 00:00:00:00:00:00
 >  pending: 00:00:00:00:00:00  wpa_state: SCANNING  ssid=0xb37f0000
 > current_ssid=0x0 rtwn0: Request association with xx:xx:xx:xx:a4:a6
 > rtwn0: Re-association to the same ESS rtwn0: No ongoing scan/p2p-scan
 > found to abort rtwn0: Add radio work 'connect'@0xb3661f40 rtwn0:
 > First radio work item in the queue - schedule start immediately
 > rtwn0: Starting radio work 'connect'@0xb3661f40 after 0.000046 second
 > wait rtwn0: WPA: clearing own WPA/RSN IE rtwn0: RSN: clearing own
 > RSNXE RSN: PMKSA cache search - network_ctx=0xb37f0000
 > try_opportunistic=0 akmp=0x0 RSN: Search for BSSID xx:xx:xx:xx:a4:a6
 >  RSN: No PMKSA cache entry found
 >  rtwn0: RSN: using IEEE 802.11i/D9.0
 >  rtwn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
 > proto 2 rtwn0: WPA: Selected mgmt group cipher 32
 >  rtwn0: WPA: clearing AP WPA IE
 >  WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
 >  rtwn0: WPA: clearing AP RSNXE
 >  rtwn0: WPA: AP group 0x10 network profile group 0x18; available
 > group 0x10 rtwn0: WPA: using GTK CCMP
 >  rtwn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
 > available pairwise 0x10 rtwn0: WPA: using PTK CCMP
 >  rtwn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
 > key_mgmt 0x2 rtwn0: WPA: using KEY_MGMT WPA-PSK
 >  rtwn0: WPA: AP mgmt_group_cipher 0x20 network profile
 > mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 rtwn0: WPA:
 > not using MGMT group cipher WPA: Set own WPA IE default -
 > hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
 > hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
 >  WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
 >  rtwn0: Automatic auth_alg selection: 0x1
 >  No supported operating classes IE to add
 >  rtwn0: Trying to associate with xx:xx:xx:xx:a4:a6
 > (SSID='MY_WIFI_NETWORK' freq=2412 MHz) rtwn0: Cancelling scan request
 >  rtwn0: State: SCANNING -> ASSOCIATING
 >  Limit connection to BSSID xx:xx:xx:xx:a4:a6 freq=2412 MHz based on
 > scan results (bssid_set=0 wps=0) PSK (set in config) -
 > hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
 > 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
 > wpa_driver_bsd_set_drop_unencrypted: enabled=1
 > wpa_driver_bsd_associate: set PRIVACY 1 rtwn0: Setting authentication
 > timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - EAP fail=0
 >  EAPOL: External notification - portControl=Auto
 >  rtwn0: Event ASSOC (0) received
 >  rtwn0: State: ASSOCIATING -> ASSOCIATED
 >  rtwn0: Associated to a new BSS: BSSID=xx:xx:xx:xx:a4:a6
 >  rtwn0: Associated with xx:xx:xx:xx:a4:a6
 >  rtwn0: WPA: Association event - clear replay counter
 >  rtwn0: WPA: Clear old PTK
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - portEnabled=1
 >  EAPOL: SUPP_PAE entering state CONNECTING
 >  EAPOL: enable timer tick
 >  EAPOL: SUPP_BE entering state IDLE
 >  rtwn0: Setting authentication timeout: 10 sec 0 usec
 >  rtwn0: Cancelling scan request
 >  rtwn0: RX EAPOL from xx:xx:xx:xx:a4:a6 (encrypted=-1)
 >  RX EAPOL - hexdump(len=99): [...REDACTED...]
 >  rtwn0: Setting authentication timeout: 10 sec 0 usec
 >  rtwn0: IEEE 802.1X RX: version=2 type=3 length=95
 >  WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
 >  rtwn0:   EAPOL-Key type=2
 >  rtwn0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
 >  rtwn0:   key_length=16 key_data_length=0
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  rtwn0: WPA: RX message 1 of 4-Way Handshake from xx:xx:xx:xx:a4:a6
 > (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
 >  rtwn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
 >  Get randomness: len=32 entropy=11
 >  WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
 >  WPA: PTK derivation using PRF(SHA1)
 >  WPA: PTK derivation - A1=74:de:2b:c1:f1:62 A2=xx:xx:xx:xx:a4:a6
 >  WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
 >  WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
 >  WPA: PMK - hexdump(len=32): [REMOVED]
 >  WPA: PTK - hexdump(len=48): [REMOVED]
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: KEK - hexdump(len=16): [REMOVED]
 >  WPA: TK - hexdump(len=16): [REMOVED]
 >  WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
 >  WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
 >  rtwn0: WPA: Sending EAPOL-Key 2/4
 >  WPA: Send EAPOL-Key frame to xx:xx:xx:xx:a4:a6 ver=2 mic_len=16
 > key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
 >  WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
 >  rtwn0: RX EAPOL from xx:xx:xx:xx:a4:a6 (encrypted=-1)
 >  RX EAPOL - hexdump(len=163): [...REDACTED...]
 >  rtwn0: IEEE 802.1X RX: version=2 type=3 length=159
 >  WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
 >  rtwn0:   EAPOL-Key type=2
 >  rtwn0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
 > MIC Secure Encr) rtwn0:   key_length=16 key_data_length=64
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  WPA: EAPOL-Key MIC using HMAC-SHA1
 >  RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
 >  WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
 >  WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
 >  rtwn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
 >  rtwn0: RSN: RX message 3 of 4-Way Handshake from xx:xx:xx:xx:a4:a6
 > (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
 >  WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
 >  WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
 >  WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
 >  rtwn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
 > msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
 >  RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
 >  rtwn0: Request to deauthenticate - bssid=xx:xx:xx:xx:a4:a6
 > pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
 > state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > bsd_send_mlme_param: op=3 reason=17 addr=xx:xx:xx:xx:a4:a6 rtwn0:
 > Event DEAUTH (11) received rtwn0: Deauthentication notification
 > rtwn0:  * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
 > Deauthentication frame IE(s) - hexdump(len=0): [NULL] rtwn0:
 > CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:xx:a4:a6 reason=17
 > locally_generated=1 rtwn0: Auto connect enabled: try to reconnect
 > (wps=0/0 wpa_state=7) rtwn0: Setting scan request: 0.100000 sec
 > rtwn0: Radio work 'connect'@0xb3661f40 done in 0.057772 seconds
 > rtwn0: radio_work_free('connect'@0xb3661f40): num_active_works --> 0
 > rtwn0: BSSID xx:xx:xx:xx:a4:a6 ignore list count incremented to 3,
 > ignoring for 60 seconds Continuous association failures - consider
 > temporary network disabling rtwn0: CTRL-EVENT-SSID-TEMP-DISABLED id=0
 > ssid="MY_WIFI_NETWORK" auth_failures=1 duration=10 reason=CONN_FAILED
 > rtwn0: Consecutive connection failures: 4 --> request scan in 5000 ms
 > rtwn0: Ignore new scan request for 5.000000 sec since an earlier
 > request is scheduled to trigger sooner rtwn0: WPA: Clear old PMK and
 > PTK rtwn0: Disconnect event - remove keys rtwn0: State:
 > 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External notification -
 > portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL:
 > Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state
 > INITIALIZE EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  rtwn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  QM: Clear all active DSCP policies
 >  rtwn0: CTRL-EVENT-DSCP-POLICY clear_all
 >  rtwn0: Ignore new scan request for 5.000000 sec since an earlier
 > request is scheduled to trigger sooner rtwn0: Request to
 > deauthenticate - bssid=00:00:00:00:00:00
 > pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
 > state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > rtwn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
 > notification - portEnabled=0 EAPOL: External notification -
 > portValid=0 QM: Clear all active DSCP policies rtwn0:
 > CTRL-EVENT-DSCP-POLICY clear_all rtwn0: Ignore new scan request for
 > 5.000000 sec since an earlier request is scheduled to trigger sooner
 > rtwn0: Event DISASSOC (1) received rtwn0: Disassociation notification
 > rtwn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
 > rtwn0: Do not request new immediate scan rtwn0: WPA: Clear old PMK
 > and PTK rtwn0: Disconnect event - remove keys
 >  rtwn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  rtwn0: State: DISCONNECTED -> SCANNING
 >  Scan SSID - hexdump_ascii(len=16):
 >       XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d   MY_WIFI_NETWORK
 >  rtwn0: Starting AP scan for specific SSID: MY_WIFI_NETWORK
 >  rtwn0: Add radio work 'scan'@0xb3661f40
 >  rtwn0: First radio work item in the queue - schedule start
 > immediately rtwn0: Starting radio work 'scan'@0xb3661f40 after
 > 0.000137 second wait wpa_driver_bsd_set_wpa: enabled=1
 >  wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 >  EAPOL: startWhen --> 0
 >  EAPOL: disable timer tick
 >  rtwn0: Event SCAN_RESULTS (3) received
 >  Received 808 bytes of scan results (10 BSSes)
 >  rtwn0: BSS: Start scan result update 5
 >  BSS: last_scan_res_used=10/32
 >  rtwn0: New scan results available (own=0 ext=0)
 >  rtwn0: Radio work 'scan'@0xb3661f40 done in 4.884156 seconds
 >  rtwn0: radio_work_free('scan'@0xb3661f40): num_active_works --> 0
 >  rtwn0: Postpone network selection by 5 seconds since all networks
 > are disabled rtwn0: Try to associate due to network getting re-enabled
 >  Fast associate: Old scan results
 >  rtwn0: Setting scan request: 0.000000 sec
 >  rtwn0: Starting AP scan for wildcard SSID
 >  rtwn0: Add radio work 'scan'@0xb3661f40
 >  rtwn0: First radio work item in the queue - schedule start
 > immediately rtwn0: Starting radio work 'scan'@0xb3661f40 after
 > 0.000032 second wait wpa_driver_bsd_set_wpa: enabled=1
 >  wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 >  rtwn0: Event SCAN_RESULTS (3) received
 >  Received 808 bytes of scan results (10 BSSes)
 >  rtwn0: BSS: Start scan result update 6
 >  BSS: last_scan_res_used=10/32
 >  rtwn0: New scan results available (own=0 ext=0)
 >  rtwn0: Radio work 'scan'@0xb3661f40 done in 4.834473 seconds
 >  rtwn0: radio_work_free('scan'@0xb3661f40): num_active_works --> 0
 >  rtwn0: CTRL-EVENT-SSID-REENABLED id=0 ssid="MY_WIFI_NETWORK"
 >  Mark BSSID xx:xx:xx:xx:a4:a6 ignored to allow a lower priority BSS,
 > if any, to be tried next rtwn0: BSSID xx:xx:xx:xx:a4:a6 ignore list
 > count incremented to 4, ignoring for 120 seconds rtwn0: Selecting BSS
 > from priority group 0 rtwn0: 0: xx:xx:xx:xx:3b:46
 > ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24 caps=0x31 level=216
 > freq=2412 rtwn0:    skip - BSSID ignored (count=3 limit=0) rtwn0: 1:
 > xx:xx:xx:xx:3b:44 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x10
 > level=216 freq=2412 rtwn0:    skip - SSID not known rtwn0: 2:
 > xx:xx:xx:xx:a4:a4 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x10
 > level=188 freq=2412 rtwn0:    skip - SSID not known rtwn0: 3:
 > xx:xx:xx:xx:a4:a6 ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24
 > caps=0x31 level=188 freq=2412 rtwn0:    skip - BSSID ignored (count=4
 > limit=0) rtwn0: 4: xx:xx:xx:xx:05:62 ssid='' wpa_ie_len=0
 > rsn_ie_len=20 caps=0x11 level=184 freq=2412 rtwn0:    skip - SSID not
 > known rtwn0: 5: xx:xx:xx:xx:a5:26 ssid='MY_WIFI_NETWORK' wpa_ie_len=0
 > rsn_ie_len=24 caps=0x31 level=178 freq=2412 rtwn0:    selected based
 > on RSN IE rtwn0: MLD: No Multi-Link element rtwn0:    selected BSS
 > xx:xx:xx:xx:a5:26 ssid='MY_WIFI_NETWORK' rtwn0: Considering connect
 > request: reassociate: 0  selected: xx:xx:xx:xx:a5:26  bssid:
 > 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING
 > ssid=0xb37f0000  current_ssid=0x0 rtwn0: Request association with
 > xx:xx:xx:xx:a5:26 rtwn0: Re-association to the same ESS rtwn0: No
 > ongoing scan/p2p-scan found to abort rtwn0: Add radio work
 > 'connect'@0xb3661f40 rtwn0: First radio work item in the queue -
 > schedule start immediately rtwn0: Starting radio work
 > 'connect'@0xb3661f40 after 0.000150 second wait rtwn0: WPA: clearing
 > own WPA/RSN IE rtwn0: RSN: clearing own RSNXE RSN: PMKSA cache search
 > - network_ctx=0xb37f0000 try_opportunistic=0 akmp=0x0 RSN: Search for
 > BSSID xx:xx:xx:xx:a5:26 RSN: No PMKSA cache entry found
 >  rtwn0: RSN: using IEEE 802.11i/D9.0
 >  rtwn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
 > proto 2 rtwn0: WPA: Selected mgmt group cipher 32
 >  rtwn0: WPA: clearing AP WPA IE
 >  WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
 >  rtwn0: WPA: clearing AP RSNXE
 >  rtwn0: WPA: AP group 0x10 network profile group 0x18; available
 > group 0x10 rtwn0: WPA: using GTK CCMP
 >  rtwn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
 > available pairwise 0x10 rtwn0: WPA: using PTK CCMP
 >  rtwn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
 > key_mgmt 0x2 rtwn0: WPA: using KEY_MGMT WPA-PSK
 >  rtwn0: WPA: AP mgmt_group_cipher 0x20 network profile
 > mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 rtwn0: WPA:
 > not using MGMT group cipher WPA: Set own WPA IE default -
 > hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
 > hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
 >  WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
 >  rtwn0: Automatic auth_alg selection: 0x1
 >  No supported operating classes IE to add
 >  rtwn0: Trying to associate with xx:xx:xx:xx:a5:26
 > (SSID='MY_WIFI_NETWORK' freq=2412 MHz) rtwn0: Cancelling scan request
 >  rtwn0: State: SCANNING -> ASSOCIATING
 >  Limit connection to BSSID xx:xx:xx:xx:a5:26 freq=2412 MHz based on
 > scan results (bssid_set=0 wps=0) PSK (set in config) -
 > hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
 > 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
 > wpa_driver_bsd_set_drop_unencrypted: enabled=1
 > wpa_driver_bsd_associate: set PRIVACY 1 rtwn0: Setting authentication
 > timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - EAP fail=0
 >  EAPOL: External notification - portControl=Auto
 >  rtwn0: Event ASSOC (0) received
 >  rtwn0: State: ASSOCIATING -> ASSOCIATED
 >  rtwn0: Associated to a new BSS: BSSID=xx:xx:xx:xx:a5:26
 >  rtwn0: Associated with xx:xx:xx:xx:a5:26
 >  rtwn0: WPA: Association event - clear replay counter
 >  rtwn0: WPA: Clear old PTK
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - portEnabled=1
 >  EAPOL: SUPP_PAE entering state CONNECTING
 >  EAPOL: enable timer tick
 >  EAPOL: SUPP_BE entering state IDLE
 >  rtwn0: Setting authentication timeout: 10 sec 0 usec
 >  rtwn0: Cancelling scan request
 >  rtwn0: Event DISASSOC (1) received
 >  rtwn0: Disassociation notification
 >  rtwn0: CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:xx:a5:26 reason=0
 >  rtwn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6)
 >  rtwn0: Setting scan request: 0.100000 sec
 >  rtwn0: Radio work 'connect'@0xb3661f40 done in 0.033572 seconds
 >  rtwn0: radio_work_free('connect'@0xb3661f40): num_active_works --> 0
 >  rtwn0: Added BSSID xx:xx:xx:xx:a5:26 into ignore list, ignoring for
 > 10 seconds Continuous association failures - consider temporary
 > network disabling rtwn0: CTRL-EVENT-SSID-TEMP-DISABLED id=0
 > ssid="MY_WIFI_NETWORK" auth_failures=2 duration=25 reason=CONN_FAILED
 > rtwn0: Consecutive connection failures: 5 --> request scan in 10000
 > ms rtwn0: Ignore new scan request for 10.000000 sec since an earlier
 > request is scheduled to trigger sooner rtwn0: WPA: Clear old PMK and
 > PTK rtwn0: Disconnect event - remove keys rtwn0: State: ASSOCIATED ->
 > DISCONNECTED EAPOL: External notification - portEnabled=0
 >  EAPOL: SUPP_PAE entering state DISCONNECTED
 >  EAPOL: Supplicant port status: Unauthorized
 >  EAPOL: SUPP_BE entering state INITIALIZE
 >  EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  rtwn0: State: DISCONNECTED -> SCANNING
 >  Scan SSID - hexdump_ascii(len=16):
 >       XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d   MY_WIFI_NETWORK
 >  rtwn0: Starting AP scan for wildcard SSID (Interleave with specific)
 >  rtwn0: Add radio work 'scan'@0xb3661f40
 >  rtwn0: First radio work item in the queue - schedule start
 > immediately rtwn0: Starting radio work 'scan'@0xb3661f40 after
 > 0.000137 second wait wpa_driver_bsd_set_wpa: enabled=1
 >  wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 >  EAPOL: startWhen --> 0
 >  EAPOL: disable timer tick
 >  rtwn0: Event SCAN_RESULTS (3) received
 >  Received 808 bytes of scan results (10 BSSes)
 >  rtwn0: BSS: Start scan result update 7
 >  BSS: last_scan_res_used=10/32
 >  rtwn0: New scan results available (own=0 ext=0)
 >  rtwn0: Radio work 'scan'@0xb3661f40 done in 4.875348 seconds
 >  rtwn0: radio_work_free('scan'@0xb3661f40): num_active_works --> 0
 >  rtwn0: Postpone network selection by 20 seconds since all networks
 > are disabled rtwn0: Try to associate due to network getting re-enabled
 >  Fast associate: Old scan results
 >  rtwn0: Setting scan request: 0.000000 sec
 >  Scan SSID - hexdump_ascii(len=16):
 >       XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d   MY_WIFI_NETWORK
 >  rtwn0: Starting AP scan for specific SSID: MY_WIFI_NETWORK
 >  rtwn0: Add radio work 'scan'@0xb3661f40
 >  rtwn0: First radio work item in the queue - schedule start
 > immediately rtwn0: Starting radio work 'scan'@0xb3661f40 after
 > 0.000135 second wait wpa_driver_bsd_set_wpa: enabled=1
 >  wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 >  rtwn0: Event SCAN_RESULTS (3) received
 >  Received 808 bytes of scan results (10 BSSes)
 >  rtwn0: BSS: Start scan result update 8
 >  BSS: last_scan_res_used=10/32
 >  rtwn0: New scan results available (own=0 ext=0)
 >  rtwn0: Radio work 'scan'@0xb3661f40 done in 4.833500 seconds
 >  rtwn0: radio_work_free('scan'@0xb3661f40): num_active_works --> 0
 >  rtwn0: CTRL-EVENT-SSID-REENABLED id=0 ssid="MY_WIFI_NETWORK"
 >  Mark BSSID xx:xx:xx:xx:a5:26 ignored to allow a lower priority BSS,
 > if any, to be tried next rtwn0: BSSID xx:xx:xx:xx:a5:26 ignore list
 > count incremented to 2, ignoring for 10 seconds rtwn0: Selecting BSS
 > from priority group 0 rtwn0: 0: xx:xx:xx:xx:3b:44 ssid=''
 > wpa_ie_len=0 rsn_ie_len=20 caps=0x10 level=216 freq=2412 rtwn0:
 > skip - SSID not known rtwn0: 1: xx:xx:xx:xx:3b:46
 > ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24 caps=0x31 level=216
 > freq=2412 rtwn0:    skip - BSSID ignored (count=3 limit=0) rtwn0: 2:
 > xx:xx:xx:xx:a4:a6 ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24
 > caps=0x31 level=186 freq=2412 rtwn0:    skip - BSSID ignored (count=4
 > limit=0) rtwn0: 3: xx:xx:xx:xx:a4:a4 ssid='' wpa_ie_len=0
 > rsn_ie_len=20 caps=0x10 level=186 freq=2412 rtwn0:    skip - SSID not
 > known rtwn0: 4: xx:xx:xx:xx:05:62 ssid='' wpa_ie_len=0 rsn_ie_len=20
 > caps=0x11 level=184 freq=2412 rtwn0:    skip - SSID not known rtwn0:
 > 5: xx:xx:xx:xx:a5:24 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x10
 > level=178 freq=2412 rtwn0:    skip - SSID not known rtwn0: 6:
 > xx:xx:xx:xx:a5:26 ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24
 > caps=0x31 level=174 freq=2412 rtwn0:    skip - BSSID ignored (count=2
 > limit=0) rtwn0: 7: xx:xx:xx:xx:3b:48 ssid='' wpa_ie_len=0
 > rsn_ie_len=0 caps=0x21 level=216 freq=2412 rtwn0:    skip - SSID not
 > known rtwn0: 8: xx:xx:xx:xx:a4:a8 ssid='' wpa_ie_len=0 rsn_ie_len=0
 > caps=0x21 level=186 freq=2412 rtwn0:    skip - SSID not known rtwn0:
 > 9: xx:xx:xx:xx:a5:28 ssid='' wpa_ie_len=0 rsn_ie_len=0 caps=0x21
 > level=178 freq=2412 rtwn0:    skip - SSID not known rtwn0: No APs
 > found - clear BSSID ignore list and try again rtwn0: Removed BSSID
 > xx:xx:xx:xx:a5:26 from ignore list (clear) rtwn0: Removed BSSID
 > xx:xx:xx:xx:a4:a6 from ignore list (clear) rtwn0: Removed BSSID
 > xx:xx:xx:xx:3b:46 from ignore list (clear) rtwn0: Selecting BSS from
 > priority group 0 rtwn0: 0: xx:xx:xx:xx:3b:44 ssid='' wpa_ie_len=0
 > rsn_ie_len=20 caps=0x10 level=216 freq=2412 rtwn0:    skip - SSID not
 > known rtwn0: 1: xx:xx:xx:xx:3b:46 ssid='MY_WIFI_NETWORK' wpa_ie_len=0
 > rsn_ie_len=24 caps=0x31 level=216 freq=2412 rtwn0:    selected based
 > on RSN IE rtwn0: MLD: No Multi-Link element
 >  rtwn0:    selected BSS xx:xx:xx:xx:3b:46 ssid='MY_WIFI_NETWORK'
 >  rtwn0: Considering connect request: reassociate: 0  selected:
 > xx:xx:xx:xx:3b:46  bssid: 00:00:00:00:00:00  pending:
 > 00:00:00:00:00:00  wpa_state: SCANNING  ssid=0xb37f0000
 > current_ssid=0x0 rtwn0: Request association with xx:xx:xx:xx:3b:46
 > rtwn0: Re-association to the same ESS rtwn0: No ongoing scan/p2p-scan
 > found to abort rtwn0: Add radio work 'connect'@0xb3661f40 rtwn0:
 > First radio work item in the queue - schedule start immediately
 > rtwn0: Starting radio work 'connect'@0xb3661f40 after 0.000151 second
 > wait rtwn0: WPA: clearing own WPA/RSN IE rtwn0: RSN: clearing own
 > RSNXE RSN: PMKSA cache search - network_ctx=0xb37f0000
 > try_opportunistic=0 akmp=0x0 RSN: Search for BSSID xx:xx:xx:xx:3b:46
 >  RSN: No PMKSA cache entry found
 >  rtwn0: RSN: using IEEE 802.11i/D9.0
 >  rtwn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
 > proto 2 rtwn0: WPA: Selected mgmt group cipher 32
 >  rtwn0: WPA: clearing AP WPA IE
 >  WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
 >  rtwn0: WPA: clearing AP RSNXE
 >  rtwn0: WPA: AP group 0x10 network profile group 0x18; available
 > group 0x10 rtwn0: WPA: using GTK CCMP
 >  rtwn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
 > available pairwise 0x10 rtwn0: WPA: using PTK CCMP
 >  rtwn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
 > key_mgmt 0x2 rtwn0: WPA: using KEY_MGMT WPA-PSK
 >  rtwn0: WPA: AP mgmt_group_cipher 0x20 network profile
 > mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 rtwn0: WPA:
 > not using MGMT group cipher WPA: Set own WPA IE default -
 > hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
 > hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
 >  WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
 >  rtwn0: Automatic auth_alg selection: 0x1
 >  No supported operating classes IE to add
 >  rtwn0: Trying to associate with xx:xx:xx:xx:3b:46
 > (SSID='MY_WIFI_NETWORK' freq=2412 MHz) rtwn0: Cancelling scan request
 >  rtwn0: State: SCANNING -> ASSOCIATING
 >  Limit connection to BSSID xx:xx:xx:xx:3b:46 freq=2412 MHz based on
 > scan results (bssid_set=0 wps=0) PSK (set in config) -
 > hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
 > 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
 > wpa_driver_bsd_set_drop_unencrypted: enabled=1
 > wpa_driver_bsd_associate: set PRIVACY 1 rtwn0: Setting authentication
 > timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - EAP fail=0
 >  EAPOL: External notification - portControl=Auto
 >  rtwn0: Event ASSOC (0) received
 >  rtwn0: State: ASSOCIATING -> ASSOCIATED
 >  rtwn0: Associated to a new BSS: BSSID=xx:xx:xx:xx:3b:46
 >  rtwn0: Associated with xx:xx:xx:xx:3b:46
 >  rtwn0: WPA: Association event - clear replay counter
 >  rtwn0: WPA: Clear old PTK
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - portEnabled=1
 >  EAPOL: SUPP_PAE entering state CONNECTING
 >  EAPOL: enable timer tick
 >  EAPOL: SUPP_BE entering state IDLE
 >  rtwn0: Setting authentication timeout: 10 sec 0 usec
 >  rtwn0: Cancelling scan request
 >  rtwn0: Event DISASSOC (1) received
 >  rtwn0: Disassociation notification
 >  rtwn0: CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:xx:3b:46 reason=0
 >  rtwn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=6)
 >  rtwn0: Setting scan request: 0.100000 sec
 >  rtwn0: Radio work 'connect'@0xb3661f40 done in 0.031572 seconds
 >  rtwn0: radio_work_free('connect'@0xb3661f40): num_active_works --> 0
 >  rtwn0: Added BSSID xx:xx:xx:xx:3b:46 into ignore list, ignoring for
 > 10 seconds rtwn0: Another BSS in this ESS has been seen; try it next
 >  rtwn0: BSSID xx:xx:xx:xx:3b:46 ignore list count incremented to 2,
 > ignoring for 10 seconds Continuous association failures - consider
 > temporary network disabling rtwn0: CTRL-EVENT-SSID-TEMP-DISABLED id=0
 > ssid="MY_WIFI_NETWORK" auth_failures=3 duration=52 reason=CONN_FAILED
 > rtwn0: Consecutive connection failures: 6 --> request scan in 10000
 > ms rtwn0: Ignore new scan request for 10.000000 sec since an earlier
 > request is scheduled to trigger sooner rtwn0: WPA: Clear old PMK and
 > PTK rtwn0: Disconnect event - remove keys rtwn0: State: ASSOCIATED ->
 > DISCONNECTED EAPOL: External notification - portEnabled=0
 >  EAPOL: SUPP_PAE entering state DISCONNECTED
 >  EAPOL: Supplicant port status: Unauthorized
 >  EAPOL: SUPP_BE entering state INITIALIZE
 >  EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  rtwn0: State: DISCONNECTED -> SCANNING
 >  rtwn0: Starting AP scan for wildcard SSID
 >  rtwn0: Optimize scan based on previously generated frequency list
 >  rtwn0: Add radio work 'scan'@0xb3661f40
 >  rtwn0: First radio work item in the queue - schedule start
 > immediately rtwn0: Starting radio work 'scan'@0xb3661f40 after
 > 0.000139 second wait wpa_driver_bsd_set_wpa: enabled=1
 >  wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 >  EAPOL: startWhen --> 0
 >  EAPOL: disable timer tick
 >  rtwn0: Event SCAN_RESULTS (3) received
 >  Received 808 bytes of scan results (10 BSSes)
 >  rtwn0: BSS: Start scan result update 9
 >  BSS: last_scan_res_used=10/32
 >  rtwn0: New scan results available (own=0 ext=0)
 >  rtwn0: Radio work 'scan'@0xb3661f40 done in 4.875490 seconds
 >  rtwn0: radio_work_free('scan'@0xb3661f40): num_active_works --> 0
 >  rtwn0: Postpone network selection by 47 seconds since all networks
 > are disabled rtwn0: Try to associate due to network getting re-enabled
 >  Fast associate: Old scan results
 >  rtwn0: Setting scan request: 0.000000 sec
 >  Scan SSID - hexdump_ascii(len=16):
 >       XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d   MY_WIFI_NETWORK
 >  rtwn0: Starting AP scan for wildcard SSID (Interleave with specific)
 >  rtwn0: Add radio work 'scan'@0xb3661f40
 >  rtwn0: First radio work item in the queue - schedule start
 > immediately rtwn0: Starting radio work 'scan'@0xb3661f40 after
 > 0.000136 second wait wpa_driver_bsd_set_wpa: enabled=1
 >  wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 >  rtwn0: Event SCAN_RESULTS (3) received
 >  Received 720 bytes of scan results (9 BSSes)
 >  rtwn0: BSS: Start scan result update 10
 >  BSS: last_scan_res_used=9/32
 >  rtwn0: New scan results available (own=0 ext=0)
 >  rtwn0: Radio work 'scan'@0xb3661f40 done in 4.833467 seconds
 >  rtwn0: radio_work_free('scan'@0xb3661f40): num_active_works --> 0
 >  rtwn0: CTRL-EVENT-SSID-REENABLED id=0 ssid="MY_WIFI_NETWORK"
 >  Mark BSSID xx:xx:xx:xx:3b:46 ignored to allow a lower priority BSS,
 > if any, to be tried next rtwn0: BSSID xx:xx:xx:xx:3b:46 ignore list
 > count incremented to 3, ignoring for 60 seconds rtwn0: Selecting BSS
 > from priority group 0 rtwn0: 0: xx:xx:xx:xx:3b:46
 > ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24 caps=0x31 level=216
 > freq=2412 rtwn0:    skip - BSSID ignored (count=3 limit=0) rtwn0: 1:
 > xx:xx:xx:xx:3b:44 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x10
 > level=216 freq=2412 rtwn0:    skip - SSID not known rtwn0: 2:
 > xx:xx:xx:xx:a4:a6 ssid='MY_WIFI_NETWORK' wpa_ie_len=0 rsn_ie_len=24
 > caps=0x31 level=190 freq=2412 rtwn0:    selected based on RSN IE
 > rtwn0: MLD: No Multi-Link element rtwn0:    selected BSS
 > xx:xx:xx:xx:a4:a6 ssid='MY_WIFI_NETWORK' rtwn0: Considering connect
 > request: reassociate: 0  selected: xx:xx:xx:xx:a4:a6  bssid:
 > 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING
 > ssid=0xb37f0000  current_ssid=0x0 rtwn0: Request association with
 > xx:xx:xx:xx:a4:a6 rtwn0: Re-association to the same ESS rtwn0: No
 > ongoing scan/p2p-scan found to abort rtwn0: Add radio work
 > 'connect'@0xb3661f40 rtwn0: First radio work item in the queue -
 > schedule start immediately rtwn0: Starting radio work
 > 'connect'@0xb3661f40 after 0.000148 second wait rtwn0: WPA: clearing
 > own WPA/RSN IE rtwn0: RSN: clearing own RSNXE RSN: PMKSA cache search
 > - network_ctx=0xb37f0000 try_opportunistic=0 akmp=0x0 RSN: Search for
 > BSSID xx:xx:xx:xx:a4:a6 RSN: No PMKSA cache entry found
 >  rtwn0: RSN: using IEEE 802.11i/D9.0
 >  rtwn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
 > proto 2 rtwn0: WPA: Selected mgmt group cipher 32
 >  rtwn0: WPA: clearing AP WPA IE
 >  WPA: set AP RSN IE - hexdump(len=26): [...REDACTED...]
 >  rtwn0: WPA: clearing AP RSNXE
 >  rtwn0: WPA: AP group 0x10 network profile group 0x18; available
 > group 0x10 rtwn0: WPA: using GTK CCMP
 >  rtwn0: WPA: AP pairwise 0x10 network profile pairwise 0x18;
 > available pairwise 0x10 rtwn0: WPA: using PTK CCMP
 >  rtwn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available
 > key_mgmt 0x2 rtwn0: WPA: using KEY_MGMT WPA-PSK
 >  rtwn0: WPA: AP mgmt_group_cipher 0x20 network profile
 > mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 rtwn0: WPA:
 > not using MGMT group cipher WPA: Set own WPA IE default -
 > hexdump(len=22): [...REDACTED...] RSN: Set own RSNXE default -
 > hexdump(len=0): PSK (set in config) - hexdump(len=32): [REMOVED]
 >  WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
 >  rtwn0: Automatic auth_alg selection: 0x1
 >  No supported operating classes IE to add
 >  rtwn0: Trying to associate with xx:xx:xx:xx:a4:a6
 > (SSID='MY_WIFI_NETWORK' freq=2412 MHz) rtwn0: Cancelling scan request
 >  rtwn0: State: SCANNING -> ASSOCIATING
 >  Limit connection to BSSID xx:xx:xx:xx:a4:a6 freq=2412 MHz based on
 > scan results (bssid_set=0 wps=0) PSK (set in config) -
 > hexdump(len=32): [REMOVED] wpa_driver_bsd_associate: ssid
 > 'MY_WIFI_NETWORK' wpa ie len 22 pairwise 16 group 16 key mgmt 2
 > wpa_driver_bsd_set_drop_unencrypted: enabled=1
 > wpa_driver_bsd_associate: set PRIVACY 1 rtwn0: Setting authentication
 > timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - EAP fail=0
 >  EAPOL: External notification - portControl=Auto
 >  rtwn0: Event ASSOC (0) received
 >  rtwn0: State: ASSOCIATING -> ASSOCIATED
 >  rtwn0: Associated to a new BSS: BSSID=xx:xx:xx:xx:a4:a6
 >  rtwn0: Associated with xx:xx:xx:xx:a4:a6
 >  rtwn0: WPA: Association event - clear replay counter
 >  rtwn0: WPA: Clear old PTK
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  EAPOL: External notification - portEnabled=1
 >  EAPOL: SUPP_PAE entering state CONNECTING
 >  EAPOL: enable timer tick
 >  EAPOL: SUPP_BE entering state IDLE
 >  rtwn0: Setting authentication timeout: 10 sec 0 usec
 >  rtwn0: Cancelling scan request
 >  rtwn0: RX EAPOL from xx:xx:xx:xx:a4:a6 (encrypted=-1)
 >  RX EAPOL - hexdump(len=99): [...REDACTED...]
 >  rtwn0: Setting authentication timeout: 10 sec 0 usec
 >  rtwn0: IEEE 802.1X RX: version=2 type=3 length=95
 >  WPA: RX EAPOL-Key - hexdump(len=99): [...REDACTED...]
 >  rtwn0:   EAPOL-Key type=2
 >  rtwn0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
 >  rtwn0:   key_length=16 key_data_length=0
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  rtwn0: WPA: RX message 1 of 4-Way Handshake from xx:xx:xx:xx:a4:a6
 > (ver=2) RSN: msg 1/4 key data - hexdump(len=0):
 >  rtwn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
 >  Get randomness: len=32 entropy=62
 >  WPA: Renewed SNonce - hexdump(len=32): [...REDACTED...]
 >  WPA: PTK derivation using PRF(SHA1)
 >  WPA: PTK derivation - A1=74:de:2b:c1:f1:62 A2=xx:xx:xx:xx:a4:a6
 >  WPA: Nonce1 - hexdump(len=32): [...REDACTED...]
 >  WPA: Nonce2 - hexdump(len=32): [...REDACTED...]
 >  WPA: PMK - hexdump(len=32): [REMOVED]
 >  WPA: PTK - hexdump(len=48): [REMOVED]
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: KEK - hexdump(len=16): [REMOVED]
 >  WPA: TK - hexdump(len=16): [REMOVED]
 >  WPA: WPA IE for msg 2/4 - hexdump(len=22): [...REDACTED...]
 >  WPA: Replay Counter - hexdump(len=8): [...REDACTED...]
 >  rtwn0: WPA: Sending EAPOL-Key 2/4
 >  WPA: Send EAPOL-Key frame to xx:xx:xx:xx:a4:a6 ver=2 mic_len=16
 > key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1
 >  WPA: KCK - hexdump(len=16): [REMOVED]
 >  WPA: Derived Key MIC - hexdump(len=16): [...REDACTED...]
 >  WPA: TX EAPOL-Key - hexdump(len=121): [...REDACTED...]
 >  rtwn0: RX EAPOL from xx:xx:xx:xx:a4:a6 (encrypted=-1)
 >  RX EAPOL - hexdump(len=163): [...REDACTED...]
 >  rtwn0: IEEE 802.1X RX: version=2 type=3 length=159
 >  WPA: RX EAPOL-Key - hexdump(len=163): [...REDACTED...]
 >  rtwn0:   EAPOL-Key type=2
 >  rtwn0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack
 > MIC Secure Encr) rtwn0:   key_length=16 key_data_length=64
 >    replay_counter - hexdump(len=8): [...REDACTED...]
 >    key_nonce - hexdump(len=32): [...REDACTED...]
 >    key_iv - hexdump(len=16): [...REDACTED...]
 >    key_rsc - hexdump(len=8): [...REDACTED...]
 >    key_id (reserved) - hexdump(len=8): [...REDACTED...]
 >    key_mic - hexdump(len=16): [...REDACTED...]
 >  WPA: EAPOL-Key MIC using HMAC-SHA1
 >  RSN: encrypted key data - hexdump(len=64): [...REDACTED...]
 >  WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
 >  WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
 >  rtwn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
 >  rtwn0: RSN: RX message 3 of 4-Way Handshake from xx:xx:xx:xx:a4:a6
 > (ver=2) WPA: IE KeyData - hexdump(len=56): [...REDACTED...]
 >  WPA: RSN IE in EAPOL-Key - hexdump(len=26): [...REDACTED...]
 >  WPA: RSNXE in EAPOL-Key - hexdump(len=3): [...REDACTED...]
 >  WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
 >  rtwn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key
 > msg 3/4 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
 >  RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): [...REDACTED...]
 >  rtwn0: Request to deauthenticate - bssid=xx:xx:xx:xx:a4:a6
 > pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS)
 > state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > bsd_send_mlme_param: op=3 reason=17 addr=xx:xx:xx:xx:a4:a6 rtwn0:
 > Event DEAUTH (11) received rtwn0: Deauthentication notification
 > rtwn0:  * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
 > Deauthentication frame IE(s) - hexdump(len=0): [NULL] rtwn0:
 > CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:xx:a4:a6 reason=17
 > locally_generated=1 rtwn0: Auto connect enabled: try to reconnect
 > (wps=0/0 wpa_state=7) rtwn0: Setting scan request: 0.100000 sec
 > rtwn0: Radio work 'connect'@0xb3661f40 done in 0.071848 seconds
 > rtwn0: radio_work_free('connect'@0xb3661f40): num_active_works --> 0
 > rtwn0: Added BSSID xx:xx:xx:xx:a4:a6 into ignore list, ignoring for
 > 10 seconds rtwn0: Another BSS in this ESS has been seen; try it next
 > rtwn0: BSSID xx:xx:xx:xx:a4:a6 ignore list count incremented to 2,
 > ignoring for 10 seconds Continuous association failures - consider
 > temporary network disabling rtwn0: CTRL-EVENT-SSID-TEMP-DISABLED id=0
 > ssid="MY_WIFI_NETWORK" auth_failures=4 duration=94 reason=CONN_FAILED
 > rtwn0: Consecutive connection failures: 7 --> request scan in 10000
 > ms rtwn0: Ignore new scan request for 10.000000 sec since an earlier
 > request is scheduled to trigger sooner rtwn0: WPA: Clear old PMK and
 > PTK rtwn0: Disconnect event - remove keys rtwn0: State:
 > 4WAY_HANDSHAKE -> DISCONNECTED EAPOL: External notification -
 > portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL:
 > Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state
 > INITIALIZE EAPOL: External notification - portValid=0
 >  EAPOL: External notification - EAP success=0
 >  rtwn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  QM: Clear all active DSCP policies
 >  rtwn0: CTRL-EVENT-DSCP-POLICY clear_all
 >  rtwn0: Ignore new scan request for 5.000000 sec since an earlier
 > request is scheduled to trigger sooner rtwn0: Request to
 > deauthenticate - bssid=00:00:00:00:00:00
 > pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED)
 > state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 > rtwn0: State: DISCONNECTED -> DISCONNECTED EAPOL: External
 > notification - portEnabled=0 EAPOL: External notification -
 > portValid=0 QM: Clear all active DSCP policies rtwn0:
 > CTRL-EVENT-DSCP-POLICY clear_all rtwn0: Ignore new scan request for
 > 5.000000 sec since an earlier request is scheduled to trigger sooner
 > rtwn0: Event DISASSOC (1) received rtwn0: Disassociation notification
 > rtwn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
 > rtwn0: Do not request new immediate scan rtwn0: WPA: Clear old PMK
 > and PTK rtwn0: Disconnect event - remove keys
 >  rtwn0: State: DISCONNECTED -> DISCONNECTED
 >  EAPOL: External notification - portEnabled=0
 >  EAPOL: External notification - portValid=0
 >  rtwn0: State: DISCONNECTED -> SCANNING
 >  Scan SSID - hexdump_ascii(len=16):
 >       XX XX XX XX XX XX XX XX XX XX XX XX XX 75 6d   MY_WIFI_NETWORK
 >  rtwn0: Starting AP scan for specific SSID: MY_WIFI_NETWORK
 >  rtwn0: Optimize scan based on previously generated frequency list
 >  rtwn0: Add radio work 'scan'@0xb3661f40
 >  rtwn0: First radio work item in the queue - schedule start
 > immediately rtwn0: Starting radio work 'scan'@0xb3661f40 after
 > 0.000137 second wait wpa_driver_bsd_set_wpa: enabled=1
 >  wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 >  EAPOL: startWhen --> 0
 >  EAPOL: disable timer tick
 >  rtwn0: Event SCAN_RESULTS (3) received
 >  Received 808 bytes of scan results (10 BSSes)
 >  rtwn0: BSS: Start scan result update 11
 >  BSS: last_scan_res_used=10/32
 >  rtwn0: New scan results available (own=0 ext=0)
 >  rtwn0: Radio work 'scan'@0xb3661f40 done in 4.884383 seconds
 >  rtwn0: radio_work_free('scan'@0xb3661f40): num_active_works --> 0
 >  rtwn0: Postpone network selection by 89 seconds since all networks
 > are disabled 
 >  --MP_/=AqH6GaA0+Un68Q7y46V_tI--
 >  
 > 
 



Home | Main Index | Thread Index | Old Index