From: "Kévin THIERRY" <kevin.thierry@kaiwen.me>
To: Gagan Goyal <gagsbond@gmail.com>
Cc: linux-wireless@vger.kernel.org, ronan lanoe <ronan.lanoe@gmail.com>
Subject: Re: Use of 5GHz frequencies with Wi-Fi Direct
Date: Thu, 04 Jul 2013 08:59:38 +0200 [thread overview]
Message-ID: <51D51D5A.6070700@kaiwen.me> (raw)
In-Reply-To: <CAChKcEnx12SE+qjYcp0yDpxB=w0gLKw9LM7z1=Dyz0=V91_TLw@mail.gmail.com>
[-- Attachment #1: Type: text/plain, Size: 7997 bytes --]
Hi Gagan,
Please find, attached to this mail, the full connection logs.
The peer device is a Samsung Galaxy Note 10.1 with support for 5GHz
channels.
Thanks,
Kevin
Le 04/07/2013 04:59, Gagan Goyal a écrit :
> It seems that peer device is configured to use 2.4 Ghz channel.
> Plz share the complete connection logs to confirm.
>
> //Gagan
>
> On 7/3/13, Kévin THIERRY <kevin.thierry@kaiwen.me> wrote:
>> I'm using an Atheros WB222 Wi-Fi card.
>>
>> $ iw list
>>
>> [...]
>> /Frequencies://
>> //* 5180 MHz [36] (15.0 dBm) (passive scanning, no IBSS)//
>> //* 5200 MHz [40] (15.0 dBm) (passive scanning, no IBSS)//
>> //* 5220 MHz [44] (15.0 dBm) (passive scanning, no IBSS)//
>> //* 5240 MHz [48] (15.0 dBm) (passive scanning, no IBSS)//
>> //* 5260 MHz [52] (17.0 dBm) (passive scanning, no IBSS, radar detection)//
>> //* 5280 MHz [56] (15.0 dBm) (passive scanning, no IBSS, radar detection)//
>> //* 5300 MHz [60] (15.0 dBm) (passive scanning, no IBSS, radar detection)//
>> //* 5320 MHz [64] (15.0 dBm) (passive scanning, no IBSS, radar detection)//
>> //* 5500 MHz [100] (disabled)//
>> //* 5520 MHz [104] (disabled)//
>> //* 5540 MHz [108] (disabled)//
>> //* 5560 MHz [112] (disabled)//
>> //* 5580 MHz [116] (disabled)//
>> //* 5600 MHz [120] (disabled)//
>> //* 5620 MHz [124] (disabled)//
>> //* 5640 MHz [128] (disabled)//
>> //* 5660 MHz [132] (disabled)//
>> //* 5680 MHz [136] (disabled)//
>> //* 5700 MHz [140] (disabled)//
>> //* 5745 MHz [149] (17.0 dBm) (passive scanning, no IBSS)//
>> //* 5765 MHz [153] (17.0 dBm) (passive scanning, no IBSS)//
>> //* 5785 MHz [157] (17.0 dBm) (passive scanning, no IBSS)//
>> //* 5805 MHz [161] (17.0 dBm) (passive scanning, no IBSS)//
>> //* 5825 MHz [165] (17.0 dBm) (passive scanning, no IBSS)/
>> [...]
>>
>>
>> wpa_supplicant config file :
>>
>> /ctrl_interface=/var/run/wpa_supplicant//
>> //ap_scan=1//
>> //device_name=kevin_PC//
>> //device_type=1-0050F204-1//
>> //p2p_oper_reg_class=115//
>> //p2p_oper_channel=36//
>> //country=US/
>>
>>
>> wpa_supplicant debug at start :
>>
>> /ctrl_interface='/var/run/wpa_supplicant'//
>> //ap_scan=1//
>> //device_name='kevin_PC'//
>> //p2p_oper_reg_class=115//
>> //p2p_oper_channel=36//
>> //country='US'//
>> //nl80211: interface wlan5 in phy phy0//
>> //rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0//
>> //rfkill: initial event: idx=1 type=2 op=0 soft=1 hard=0//
>> //nl80211: Set mode ifindex 4 iftype 2 (STATION)//
>> //nl80211: Subscribe to mgmt frames with non-AP handle 0x1e332f0//
>> //nl80211: Register frame type=0xd0 nl_handle=0x1e332f0//
>> //nl80211: Register frame match - hexdump(len=2): 04 0a//
>> //nl80211: Register frame type=0xd0 nl_handle=0x1e332f0//
>> //nl80211: Register frame match - hexdump(len=2): 04 0b//
>> //nl80211: Register frame type=0xd0 nl_handle=0x1e332f0//
>> //nl80211: Register frame match - hexdump(len=2): 04 0c//
>> //nl80211: Register frame type=0xd0 nl_handle=0x1e332f0//
>> //nl80211: Register frame match - hexdump(len=2): 04 0d//
>> //nl80211: Register frame type=0xd0 nl_handle=0x1e332f0//
>> //nl80211: Register frame match - hexdump(len=6): 04 09 50 6f 9a 09//
>> //nl80211: Register frame type=0xd0 nl_handle=0x1e332f0//
>> //nl80211: Register frame match - hexdump(len=5): 7f 50 6f 9a 09//
>> //nl80211: Register frame type=0xd0 nl_handle=0x1e332f0//
>> //nl80211: Register frame match - hexdump(len=1): 06//
>> //nl80211: Register frame type=0xd0 nl_handle=0x1e332f0//
>> //nl80211: Register frame match - hexdump(len=2): 0a 07//
>> //nl80211: Register frame type=0xd0 nl_handle=0x1e332f0//
>> //nl80211: Register frame match - hexdump(len=2): 0a 11//
>> //netlink: Operstate: linkmode=1, operstate=5//
>> //nl80211: Using driver-based off-channel TX//
>> //nl80211: TDLS supported//
>> //nl80211: TDLS external setup//
>> //nl80211: Use separate P2P group interface (driver advertised support)//
>> //nl80211: driver param='(null)'//
>> //nl80211: Regulatory information - country=US//
>> //nl80211: 2402-2472 @ 40 MHz//
>> //nl80211: 5170-5250 @ 40 MHz//
>> //nl80211: 5250-5330 @ 40 MHz//
>> //nl80211: 5490-5600 @ 40 MHz//
>> //nl80211: 5650-5710 @ 40 MHz//
>> //nl80211: 5735-5835 @ 40 MHz//
>> //nl80211: Added 802.11b mode based on 802.11g information//
>> //wlan5: Own MAC address: 00:0b:6b:7f:92:56//
>> //wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=0
>> set_tx=0 seq_len=0 key_len=0//
>> //wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=1
>> set_tx=0 seq_len=0 key_len=0//
>> //wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=2
>> set_tx=0 seq_len=0 key_len=0//
>> //wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=3
>> set_tx=0 seq_len=0 key_len=0//
>> //wlan5: RSN: flushing PMKID list in the driver//
>> //nl80211: Flush PMKIDs//
>> //wlan5: State: DISCONNECTED -> INACTIVE//
>> //WPS: Set UUID for interface wlan5//
>> //WPS: UUID based on MAC address - hexdump(len=16): 97 71 b0 a8 da ca 57
>> bf 99 80 01 b3 3f 50 26 de//
>> //EAPOL: SUPP_PAE entering state DISCONNECTED//
>> //EAPOL: Supplicant port status: Unauthorized//
>> //nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00//
>> //EAPOL: KEY_RX entering state NO_KEY_RECEIVE//
>> //EAPOL: SUPP_BE entering state INITIALIZE//
>> //EAP: EAP entering state DISABLED//
>> //EAPOL: Supplicant port status: Unauthorized//
>> //nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00//
>> //EAPOL: Supplicant port status: Unauthorized//
>> //nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00//
>> //P2P: Own listen channel: 1//
>> //P2P: Configured operating channel: 115:36//
>> //P2P: Add operating class 81//
>> //P2P: Channels - hexdump(len=12): 01 02 03 04 05 06 07 08 09 0a 0b 0d//
>> //wlan5: Added interface wlan5//
>> //wlan5: State: INACTIVE -> DISCONNECTED//
>> //wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)//
>> //netlink: Operstate: linkmode=-1, operstate=5//
>> //random: Got 18/20 bytes from /dev/random//
>> //RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])//
>> //RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added//
>> //nl80211: if_removed already cleared - ignore event//
>> //EAPOL: disable timer tick//
>> //EAPOL: Supplicant port status: Unauthorized//
>> //nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00//
>> //random: Got 2/2 bytes from /dev/random//
>> //nl80211: Ignore event for foreign ifindex 2/
>>
>>
>> It seems that the 5 GHz channels are added but the 2.4 GHz channels are
>> still there and used instead of the frequency 5180.
>>
>> Kévin
>>
>> Le 03/07/2013 11:59, Gagan Goyal a écrit :
>>> Hi Kevin,
>>>
>>> plz make sure that driver advertise the support for both the bands and
>>> provide all the supported frequencies.
>>>
>>> During Supplicant init, supplicant read the driver capabilities and
>>> along with other things the supported band and frequencies are stored.
>>>
>>> P2p global data is then initialized with same data.
>>>
>>> Cheers
>>>
>>> Gagan
>>>
>>> On 7/3/13, Kévin THIERRY <kevin.thierry@kaiwen.me> wrote:
>>>> Hi,
>>>>
>>>> Is there a way to force the use of 5GHz frequencies with Wi-Fi Direct ?
>>>> (Or define the 5GHz frequencies as preferred ?)
>>>>
>>>> I tried to add the freq_list option in wpa_supplicant config file
>>>> without success. (I think this option should be set in a network block
>>>> but there is no network block for Wi-Fi Direct...)
>>>> "freq_list=5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560
>>>> 5580 5600 5620 5640 5660 5680 5700 5745 5765 5785 5805 5825"
>>>>
>>>> Thanks,
>>>>
>>>> Kevin
>>>> --
>>>> To unsubscribe from this list: send the line "unsubscribe
>>>> linux-wireless"
>>>> in
>>>> the body of a message to majordomo@vger.kernel.org
>>>> More majordomo info at http://vger.kernel.org/majordomo-info.html
>>>>
>>
[-- Attachment #2: wpa_supplicant_debug --]
[-- Type: text/plain, Size: 163903 bytes --]
wpa_supplicant v2.1-devel
random: Trying to read entropy from /dev/random
Successfully initialized wpa_supplicant
Initializing interface 'wlan5' conf 'wpa.conf' driver 'nl80211' ctrl_interface 'N/A' bridge 'N/A'
Configuration file 'wpa.conf' -> '/home/eurogiciel/widi-new/wpa.conf'
Reading configuration file '/home/eurogiciel/widi-new/wpa.conf'
ctrl_interface='/var/run/wpa_supplicant'
ap_scan=1
device_name='kevin_PC'
p2p_oper_reg_class=115
p2p_oper_channel=36
country='US'
nl80211: interface wlan5 in phy phy0
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
rfkill: initial event: idx=1 type=2 op=0 soft=1 hard=0
nl80211: Set mode ifindex 4 iftype 2 (STATION)
nl80211: Subscribe to mgmt frames with non-AP handle 0x1fa52f0
nl80211: Register frame type=0xd0 nl_handle=0x1fa52f0
nl80211: Register frame match - hexdump(len=2): 04 0a
nl80211: Register frame type=0xd0 nl_handle=0x1fa52f0
nl80211: Register frame match - hexdump(len=2): 04 0b
nl80211: Register frame type=0xd0 nl_handle=0x1fa52f0
nl80211: Register frame match - hexdump(len=2): 04 0c
nl80211: Register frame type=0xd0 nl_handle=0x1fa52f0
nl80211: Register frame match - hexdump(len=2): 04 0d
nl80211: Register frame type=0xd0 nl_handle=0x1fa52f0
nl80211: Register frame match - hexdump(len=6): 04 09 50 6f 9a 09
nl80211: Register frame type=0xd0 nl_handle=0x1fa52f0
nl80211: Register frame match - hexdump(len=5): 7f 50 6f 9a 09
nl80211: Register frame type=0xd0 nl_handle=0x1fa52f0
nl80211: Register frame match - hexdump(len=1): 06
nl80211: Register frame type=0xd0 nl_handle=0x1fa52f0
nl80211: Register frame match - hexdump(len=2): 0a 07
nl80211: Register frame type=0xd0 nl_handle=0x1fa52f0
nl80211: Register frame match - hexdump(len=2): 0a 11
netlink: Operstate: linkmode=1, operstate=5
nl80211: Using driver-based off-channel TX
nl80211: TDLS supported
nl80211: TDLS external setup
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: driver param='(null)'
nl80211: Regulatory information - country=US
nl80211: 2402-2472 @ 40 MHz
nl80211: 5170-5250 @ 40 MHz
nl80211: 5250-5330 @ 40 MHz
nl80211: 5490-5600 @ 40 MHz
nl80211: 5650-5710 @ 40 MHz
nl80211: 5735-5835 @ 40 MHz
nl80211: Added 802.11b mode based on 802.11g information
wlan5: Own MAC address: 00:0b:6b:7f:92:56
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
wlan5: RSN: flushing PMKID list in the driver
nl80211: Flush PMKIDs
wlan5: State: DISCONNECTED -> INACTIVE
WPS: Set UUID for interface wlan5
WPS: UUID based on MAC address - hexdump(len=16): 97 71 b0 a8 da ca 57 bf 99 80 01 b3 3f 50 26 de
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
P2P: Own listen channel: 1
P2P: Configured operating channel: 115:36
P2P: Add operating class 81
P2P: Channels - hexdump(len=12): 01 02 03 04 05 06 07 08 09 0a 0b 0d
wlan5: Added interface wlan5
wlan5: State: INACTIVE -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
random: Got 20/20 bytes from /dev/random
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
nl80211: if_removed already cleared - ignore event
EAPOL: disable timer tick
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
RX ctrl_iface - hexdump_ascii(len=18):
53 45 54 20 77 69 66 69 5f 64 69 73 70 6c 61 79 SET wifi_display
20 30 0
wlan5: Control interface command 'SET wifi_display 0'
CTRL_IFACE SET 'wifi_display'='0'
WFD: Wi-Fi Display disabled
WFD: Update WFD IE
WFD: Wi-Fi Display disabled - do not include WFD IE
RX ctrl_iface - hexdump_ascii(len=35):
57 46 44 5f 53 55 42 45 4c 45 4d 5f 53 45 54 20 WFD_SUBELEM_SET
30 30 20 30 30 30 36 30 30 30 31 30 30 30 30 30 00 0006000100000
30 30 30 000
wlan5: Control interface command 'WFD_SUBELEM_SET 00 0006000100000000'
WFD: Set subelement 0
WFD: Update WFD IE
WFD: Wi-Fi Display disabled - do not include WFD IE
RX ctrl_iface - hexdump_ascii(len=24):
53 45 54 20 64 65 76 69 63 65 5f 6e 61 6d 65 20 SET device_name
6b 65 76 69 6e 2d 70 63 kevin-pc
wlan5: Control interface command 'SET device_name kevin-pc'
CTRL_IFACE SET 'device_name'='kevin-pc'
device_name='kevin-pc'
RX ctrl_iface - hexdump_ascii(len=17):
53 45 54 20 6d 6f 64 65 6c 5f 6e 61 6d 65 20 70 SET model_name p
63 c
wlan5: Control interface command 'SET model_name pc'
CTRL_IFACE SET 'model_name'='pc'
model_name='pc'
RX ctrl_iface - hexdump_ascii(len=30):
53 45 54 20 6d 61 6e 75 66 61 63 74 75 72 65 72 SET manufacturer
20 5b 70 6c 61 63 65 68 6f 6c 64 65 72 5d [placeholder]
wlan5: Control interface command 'SET manufacturer [placeholder]'
CTRL_IFACE SET 'manufacturer'='[placeholder]'
manufacturer='[placeholder]'
RX ctrl_iface - hexdump_ascii(len=24):
53 45 54 20 6d 6f 64 65 6c 5f 6e 75 6d 62 65 72 SET model_number
20 34 2e 30 2e 30 2e 30 4.0.0.0
wlan5: Control interface command 'SET model_number 4.0.0.0'
CTRL_IFACE SET 'model_number'='4.0.0.0'
model_number='4.0.0.0'
RX ctrl_iface - hexdump_ascii(len=31):
53 45 54 20 73 65 72 69 61 6c 5f 6e 75 6d 62 65 SET serial_numbe
72 20 5b 70 6c 61 63 65 68 6f 6c 64 65 72 5d r [placeholder]
wlan5: Control interface command 'SET serial_number [placeholder]'
CTRL_IFACE SET 'serial_number'='[placeholder]'
serial_number='[placeholder]'
RX ctrl_iface - hexdump_ascii(len=18):
53 45 54 20 77 69 66 69 5f 64 69 73 70 6c 61 79 SET wifi_display
20 31 1
wlan5: Control interface command 'SET wifi_display 1'
CTRL_IFACE SET 'wifi_display'='1'
WFD: Wi-Fi Display enabled
WFD: Update WFD IE
WFD: WFD IE for Beacon - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 01 00 00 00 00
WFD: WFD IE for (Re)Association Request - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 01 00 00 00 00
WFD: WFD IE for GO Negotiation - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 01 00 00 00 00
WFD: WFD IE for Provision Discovery Request - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 01 00 00 00 00
WFD: WFD IE for Probe Request - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 01 00 00 00 00
WFD: WFD IE for Probe Response - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 01 00 00 00 00
WFD: WFD IE for P2P Invitation - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 01 00 00 00 00
WFD: WFD IE for Provision Discovery Response - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 01 00 00 00 00
RX ctrl_iface - hexdump_ascii(len=10):
50 32 50 5f 43 41 4e 43 45 4c P2P_CANCEL
wlan5: Control interface command 'P2P_CANCEL'
P2P: Request to cancel group formation
P2P: Stopping find
P2P: Clear timeout (state=IDLE)
P2P: State IDLE -> IDLE
P2P: No ongoing group formation found
RX ctrl_iface - hexdump_ascii(len=22):
50 32 50 5f 47 52 4f 55 50 5f 52 45 4d 4f 56 45 P2P_GROUP_REMOVE
20 77 6c 61 6e 35 wlan5
wlan5: Control interface command 'P2P_GROUP_REMOVE wlan5'
P2P: P2P group interface not found
RX ctrl_iface - hexdump_ascii(len=10):
50 32 50 5f 4c 49 53 54 45 4e P2P_LISTEN
wlan5: Control interface command 'P2P_LISTEN'
P2P: Stopping find
P2P: Clear timeout (state=IDLE)
P2P: State IDLE -> IDLE
P2P: Going to listen(only) state
WPS: * Version (hardcoded 0x10)
WPS: * UUID-E
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Device Info
nl80211: Enable Probe Request reporting nl_preq=0x1fa68c0
nl80211: Register frame type=0x40 nl_handle=0x1fa68c0
nl80211: Register frame match - hexdump(len=0): [NULL]
nl80211: Remain-on-channel cookie 0xffff8804042eb280 for freq=2412 MHz duration=5000
P2P: State IDLE -> LISTEN_ONLY
RX ctrl_iface - hexdump_ascii(len=19):
53 45 54 20 70 32 70 5f 67 6f 5f 69 6e 74 65 6e SET p2p_go_inten
74 20 30 t 0
wlan5: Control interface command 'SET p2p_go_intent 0'
CTRL_IFACE SET 'p2p_go_intent'='0'
p2p_go_intent=0
RX ctrl_iface - hexdump_ascii(len=26):
53 45 54 20 70 65 72 73 69 73 74 65 6e 74 5f 72 SET persistent_r
65 63 6f 6e 6e 65 63 74 20 31 econnect 1
wlan5: Control interface command 'SET persistent_reconnect 1'
CTRL_IFACE SET 'persistent_reconnect'='1'
persistent_reconnect=1
RX ctrl_iface - hexdump_ascii(len=24):
53 45 54 20 64 65 76 69 63 65 5f 6e 61 6d 65 20 SET device_name
6b 65 76 69 6e 2d 70 63 kevin-pc
wlan5: Control interface command 'SET device_name kevin-pc'
CTRL_IFACE SET 'device_name'='kevin-pc'
device_name='kevin-pc'
RX ctrl_iface - hexdump_ascii(len=17):
53 45 54 20 6d 6f 64 65 6c 5f 6e 61 6d 65 20 70 SET model_name p
63 c
wlan5: Control interface command 'SET model_name pc'
CTRL_IFACE SET 'model_name'='pc'
model_name='pc'
RX ctrl_iface - hexdump_ascii(len=30):
53 45 54 20 6d 61 6e 75 66 61 63 74 75 72 65 72 SET manufacturer
20 5b 70 6c 61 63 65 68 6f 6c 64 65 72 5d [placeholder]
wlan5: Control interface command 'SET manufacturer [placeholder]'
CTRL_IFACE SET 'manufacturer'='[placeholder]'
manufacturer='[placeholder]'
RX ctrl_iface - hexdump_ascii(len=24):
53 45 54 20 6d 6f 64 65 6c 5f 6e 75 6d 62 65 72 SET model_number
20 34 2e 30 2e 30 2e 30 4.0.0.0
wlan5: Control interface command 'SET model_number 4.0.0.0'
CTRL_IFACE SET 'model_number'='4.0.0.0'
model_number='4.0.0.0'
RX ctrl_iface - hexdump_ascii(len=31):
53 45 54 20 73 65 72 69 61 6c 5f 6e 75 6d 62 65 SET serial_numbe
72 20 5b 70 6c 61 63 65 68 6f 6c 64 65 72 5d r [placeholder]
wlan5: Control interface command 'SET serial_number [placeholder]'
CTRL_IFACE SET 'serial_number'='[placeholder]'
serial_number='[placeholder]'
RX ctrl_iface - hexdump_ascii(len=35):
57 46 44 5f 53 55 42 45 4c 45 4d 5f 53 45 54 20 WFD_SUBELEM_SET
30 30 20 30 30 30 36 30 30 31 31 30 30 30 30 30 00 0006001100000
30 30 30 000
wlan5: Control interface command 'WFD_SUBELEM_SET 00 0006001100000000'
WFD: Set subelement 0
WFD: Update WFD IE
WFD: WFD IE for Beacon - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
WFD: WFD IE for (Re)Association Request - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
WFD: WFD IE for GO Negotiation - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
WFD: WFD IE for Provision Discovery Request - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
WFD: WFD IE for Probe Request - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
WFD: WFD IE for Probe Response - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
WFD: WFD IE for P2P Invitation - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
WFD: WFD IE for Provision Discovery Response - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
CTRL_IFACE monitor attached - hexdump(len=46): 2f 74 6d 70 2f 73 61 6d 70 6c 65 5f 77 69 64 69 5f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74 2e 54 6b 4d 4e 5a 54 2f 73 6f 63 6b 65 74 00
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=0 freq=2412 channel_type=0 duration=5000 cookie=0xffff8804042eb280 (match))
wlan5: Event REMAIN_ON_CHANNEL (22) received
Off-channel: Send Action callback (without_roc=0 pending_action_tx=(nil))
P2P: Starting Listen timeout(5,0) on freq=2412 based on callback
P2P: Set timeout (state=LISTEN_ONLY): 5.020000 sec
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=e0:2a:82:46:13:6e
nl80211: MLME event frame - hexdump(len=116): 40 00 00 00 ff ff ff ff ff ff e0 2a 82 46 13 6e ff ff ff ff ff ff 30 00 00 00 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c 2d 1a 3c 18 1f ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 01 dd 09 00 10 18 02 00 11 01 00 00 dd 1e 00 90 4c 33 3c 18 1f ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=e0:2a:82:46:13:6e
nl80211: MLME event frame - hexdump(len=116): 40 00 00 00 ff ff ff ff ff ff e0 2a 82 46 13 6e ff ff ff ff ff ff 40 00 00 00 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c 2d 1a 3c 18 1f ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 01 dd 09 00 10 18 02 00 11 01 00 00 dd 1e 00 90 4c 33 3c 18 1f ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=62:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=306): 40 00 00 00 ff ff ff ff ff ff 62 21 c0 99 88 b1 ff ff ff ff ff ff 20 1c 00 07 44 49 52 45 43 54 2d 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 01 dd 99 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 01 10 08 00 02 21 08 10 47 00 10 34 e6 cb 58 77 e0 5f db 94 f5 e0 e3 4d 80 d0 f9 10 54 00 08 00 0a 00 50 f2 04 00 05 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 13 53 41 4d 53 55 4e 47 5f 45 4c 45 43 54 52 4f 4e 49 43 53 10 23 00 0e 53 41 4d 53 55 4e 47 5f 4d 4f 42 49 4c 45 10 24 00 04 32 30 31 32 10 11 00 0c 41 6e 64 72 6f 69 64 5f 61 37 63 61 10 49 00 09 00 37 2a 00 01 20 03 01 01 dd 11 50 6f 9a 09 02 02 00 27 00 06 05 00 58 58 04 51 01 dd 0d 50 6f 9a 0a 00 00 06 01 10 c0 00 00 28 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
P2P: Parsing WPS IE
P2P: Config Methods (WPS): 0x2108
P2P: Device Password ID: 0
P2P: Primary Device Type (WPS): 10-0050F204-5
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 27 Group Capability 00
P2P: Attribute 6 length 5
P2P: * Listen Channel: Country XX(0x04) Regulatory Class 81 Channel Number 1
P2P: Created device entry based on Probe Req: 62:21:c0:99:88:b1 dev_capab=0x25 group_capab=0x0 name='Android_a7ca' listen_freq=2412
P2P: Parsing WPS IE
P2P: Config Methods (WPS): 0x2108
P2P: Device Password ID: 0
P2P: Primary Device Type (WPS): 10-0050F204-5
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 27 Group Capability 00
P2P: Attribute 6 length 5
P2P: * Listen Channel: Country XX(0x04) Regulatory Class 81 Channel Number 1
P2P: Reply to P2P Probe Request in Listen state
WPS: * Version (hardcoded 0x10)
WPS: * UUID-E
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Device Info
nl80211: CMD_FRAME freq=2412 wait=0 no_cck=1 no_ack=1 offchanok=1
nl80211: Frame TX command accepted (no ACK); cookie 0x0
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=e0:2a:82:46:13:6e
nl80211: MLME event frame - hexdump(len=116): 40 00 00 00 ff ff ff ff ff ff e0 2a 82 46 13 6e ff ff ff ff ff ff 50 00 00 00 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c 2d 1a 3c 18 1f ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 02 dd 09 00 10 18 02 00 11 01 00 00 dd 1e 00 90 4c 33 3c 18 1f ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=62:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=306): 40 00 00 00 ff ff ff ff ff ff 62 21 c0 99 88 b1 ff ff ff ff ff ff 50 1c 00 07 44 49 52 45 43 54 2d 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 01 dd 99 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 01 10 08 00 02 21 08 10 47 00 10 34 e6 cb 58 77 e0 5f db 94 f5 e0 e3 4d 80 d0 f9 10 54 00 08 00 0a 00 50 f2 04 00 05 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 13 53 41 4d 53 55 4e 47 5f 45 4c 45 43 54 52 4f 4e 49 43 53 10 23 00 0e 53 41 4d 53 55 4e 47 5f 4d 4f 42 49 4c 45 10 24 00 04 32 30 31 32 10 11 00 0c 41 6e 64 72 6f 69 64 5f 61 37 63 61 10 49 00 09 00 37 2a 00 01 20 03 01 01 dd 11 50 6f 9a 09 02 02 00 27 00 06 05 00 58 58 04 51 01 dd 0d 50 6f 9a 0a 00 00 06 01 10 c0 00 00 28 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
P2P: Parsing WPS IE
P2P: Config Methods (WPS): 0x2108
P2P: Device Password ID: 0
P2P: Primary Device Type (WPS): 10-0050F204-5
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 27 Group Capability 00
P2P: Attribute 6 length 5
P2P: * Listen Channel: Country XX(0x04) Regulatory Class 81 Channel Number 1
P2P: Parsing WPS IE
P2P: Config Methods (WPS): 0x2108
P2P: Device Password ID: 0
P2P: Primary Device Type (WPS): 10-0050F204-5
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 27 Group Capability 00
P2P: Attribute 6 length 5
P2P: * Listen Channel: Country XX(0x04) Regulatory Class 81 Channel Number 1
P2P: Reply to P2P Probe Request in Listen state
WPS: * Version (hardcoded 0x10)
WPS: * UUID-E
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Device Info
nl80211: CMD_FRAME freq=2412 wait=0 no_cck=1 no_ack=1 offchanok=1
nl80211: Frame TX command accepted (no ACK); cookie 0x0
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=18:f4:6a:88:56:a2
nl80211: MLME event frame - hexdump(len=45): 40 00 00 00 ff ff ff ff ff ff 18 f4 6a 88 56 a2 ff ff ff ff ff ff b0 16 00 00 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 7f 01 01
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=18:f4:6a:88:56:a2
nl80211: MLME event frame - hexdump(len=45): 40 00 00 00 ff ff ff ff ff ff 18 f4 6a 88 56 a2 ff ff ff ff ff ff c0 16 00 00 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 7f 01 01
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=62:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=306): 40 00 00 00 ff ff ff ff ff ff 62 21 c0 99 88 b1 ff ff ff ff ff ff 80 1c 00 07 44 49 52 45 43 54 2d 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 01 dd 99 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 01 10 08 00 02 21 08 10 47 00 10 34 e6 cb 58 77 e0 5f db 94 f5 e0 e3 4d 80 d0 f9 10 54 00 08 00 0a 00 50 f2 04 00 05 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 13 53 41 4d 53 55 4e 47 5f 45 4c 45 43 54 52 4f 4e 49 43 53 10 23 00 0e 53 41 4d 53 55 4e 47 5f 4d 4f 42 49 4c 45 10 24 00 04 32 30 31 32 10 11 00 0c 41 6e 64 72 6f 69 64 5f 61 37 63 61 10 49 00 09 00 37 2a 00 01 20 03 01 01 dd 11 50 6f 9a 09 02 02 00 27 00 06 05 00 58 58 04 51 01 dd 0d 50 6f 9a 0a 00 00 06 01 10 c0 00 00 28 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
P2P: Parsing WPS IE
P2P: Config Methods (WPS): 0x2108
P2P: Device Password ID: 0
P2P: Primary Device Type (WPS): 10-0050F204-5
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 27 Group Capability 00
P2P: Attribute 6 length 5
P2P: * Listen Channel: Country XX(0x04) Regulatory Class 81 Channel Number 1
P2P: Parsing WPS IE
P2P: Config Methods (WPS): 0x2108
P2P: Device Password ID: 0
P2P: Primary Device Type (WPS): 10-0050F204-5
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 27 Group Capability 00
P2P: Attribute 6 length 5
P2P: * Listen Channel: Country XX(0x04) Regulatory Class 81 Channel Number 1
P2P: Reply to P2P Probe Request in Listen state
WPS: * Version (hardcoded 0x10)
WPS: * UUID-E
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Device Info
nl80211: CMD_FRAME freq=2412 wait=0 no_cck=1 no_ack=1 offchanok=1
nl80211: Frame TX command accepted (no ACK); cookie 0x0
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=18:f4:6a:88:56:a2
nl80211: MLME event frame - hexdump(len=45): 40 00 00 00 ff ff ff ff ff ff 18 f4 6a 88 56 a2 ff ff ff ff ff ff 50 17 00 00 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 7f 01 01
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=62:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=306): 40 00 00 00 ff ff ff ff ff ff 62 21 c0 99 88 b1 ff ff ff ff ff ff b0 1c 00 07 44 49 52 45 43 54 2d 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 01 dd 99 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 01 10 08 00 02 21 08 10 47 00 10 34 e6 cb 58 77 e0 5f db 94 f5 e0 e3 4d 80 d0 f9 10 54 00 08 00 0a 00 50 f2 04 00 05 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 13 53 41 4d 53 55 4e 47 5f 45 4c 45 43 54 52 4f 4e 49 43 53 10 23 00 0e 53 41 4d 53 55 4e 47 5f 4d 4f 42 49 4c 45 10 24 00 04 32 30 31 32 10 11 00 0c 41 6e 64 72 6f 69 64 5f 61 37 63 61 10 49 00 09 00 37 2a 00 01 20 03 01 01 dd 11 50 6f 9a 09 02 02 00 27 00 06 05 00 58 58 04 51 01 dd 0d 50 6f 9a 0a 00 00 06 01 10 c0 00 00 28 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
P2P: Parsing WPS IE
P2P: Config Methods (WPS): 0x2108
P2P: Device Password ID: 0
P2P: Primary Device Type (WPS): 10-0050F204-5
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 27 Group Capability 00
P2P: Attribute 6 length 5
P2P: * Listen Channel: Country XX(0x04) Regulatory Class 81 Channel Number 1
P2P: Parsing WPS IE
P2P: Config Methods (WPS): 0x2108
P2P: Device Password ID: 0
P2P: Primary Device Type (WPS): 10-0050F204-5
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 27 Group Capability 00
P2P: Attribute 6 length 5
P2P: * Listen Channel: Country XX(0x04) Regulatory Class 81 Channel Number 1
P2P: Reply to P2P Probe Request in Listen state
WPS: * Version (hardcoded 0x10)
WPS: * UUID-E
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Device Info
nl80211: CMD_FRAME freq=2412 wait=0 no_cck=1 no_ack=1 offchanok=1
nl80211: Frame TX command accepted (no ACK); cookie 0x0
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=62:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=306): 40 00 00 00 ff ff ff ff ff ff 62 21 c0 99 88 b1 ff ff ff ff ff ff e0 1c 00 07 44 49 52 45 43 54 2d 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 01 dd 99 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 01 10 08 00 02 21 08 10 47 00 10 34 e6 cb 58 77 e0 5f db 94 f5 e0 e3 4d 80 d0 f9 10 54 00 08 00 0a 00 50 f2 04 00 05 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 13 53 41 4d 53 55 4e 47 5f 45 4c 45 43 54 52 4f 4e 49 43 53 10 23 00 0e 53 41 4d 53 55 4e 47 5f 4d 4f 42 49 4c 45 10 24 00 04 32 30 31 32 10 11 00 0c 41 6e 64 72 6f 69 64 5f 61 37 63 61 10 49 00 09 00 37 2a 00 01 20 03 01 01 dd 11 50 6f 9a 09 02 02 00 27 00 06 05 00 58 58 04 51 01 dd 0d 50 6f 9a 0a 00 00 06 01 10 c0 00 00 28 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
P2P: Parsing WPS IE
P2P: Config Methods (WPS): 0x2108
P2P: Device Password ID: 0
P2P: Primary Device Type (WPS): 10-0050F204-5
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 27 Group Capability 00
P2P: Attribute 6 length 5
P2P: * Listen Channel: Country XX(0x04) Regulatory Class 81 Channel Number 1
P2P: Parsing WPS IE
P2P: Config Methods (WPS): 0x2108
P2P: Device Password ID: 0
P2P: Primary Device Type (WPS): 10-0050F204-5
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 27 Group Capability 00
P2P: Attribute 6 length 5
P2P: * Listen Channel: Country XX(0x04) Regulatory Class 81 Channel Number 1
P2P: Reply to P2P Probe Request in Listen state
WPS: * Version (hardcoded 0x10)
WPS: * UUID-E
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Device Info
nl80211: CMD_FRAME freq=2412 wait=0 no_cck=1 no_ack=1 offchanok=1
nl80211: Frame TX command accepted (no ACK); cookie 0x0
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=62:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=306): 40 00 00 00 ff ff ff ff ff ff 62 21 c0 99 88 b1 ff ff ff ff ff ff 10 1d 00 07 44 49 52 45 43 54 2d 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 01 dd 99 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 01 10 08 00 02 21 08 10 47 00 10 34 e6 cb 58 77 e0 5f db 94 f5 e0 e3 4d 80 d0 f9 10 54 00 08 00 0a 00 50 f2 04 00 05 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 13 53 41 4d 53 55 4e 47 5f 45 4c 45 43 54 52 4f 4e 49 43 53 10 23 00 0e 53 41 4d 53 55 4e 47 5f 4d 4f 42 49 4c 45 10 24 00 04 32 30 31 32 10 11 00 0c 41 6e 64 72 6f 69 64 5f 61 37 63 61 10 49 00 09 00 37 2a 00 01 20 03 01 01 dd 11 50 6f 9a 09 02 02 00 27 00 06 05 00 58 58 04 51 01 dd 0d 50 6f 9a 0a 00 00 06 01 10 c0 00 00 28 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
P2P: Parsing WPS IE
P2P: Config Methods (WPS): 0x2108
P2P: Device Password ID: 0
P2P: Primary Device Type (WPS): 10-0050F204-5
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 27 Group Capability 00
P2P: Attribute 6 length 5
P2P: * Listen Channel: Country XX(0x04) Regulatory Class 81 Channel Number 1
P2P: Parsing WPS IE
P2P: Config Methods (WPS): 0x2108
P2P: Device Password ID: 0
P2P: Primary Device Type (WPS): 10-0050F204-5
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 27 Group Capability 00
P2P: Attribute 6 length 5
P2P: * Listen Channel: Country XX(0x04) Regulatory Class 81 Channel Number 1
P2P: Reply to P2P Probe Request in Listen state
WPS: * Version (hardcoded 0x10)
WPS: * UUID-E
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Device Info
nl80211: CMD_FRAME freq=2412 wait=0 no_cck=1 no_ack=1 offchanok=1
nl80211: Frame TX command accepted (no ACK); cookie 0x0
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=60:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=116): 40 00 00 00 ff ff ff ff ff ff 60 21 c0 99 88 b1 ff ff ff ff ff ff 40 1d 00 00 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 01 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=60:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=116): 40 00 00 00 ff ff ff ff ff ff 60 21 c0 99 88 b1 ff ff ff ff ff ff 50 1d 00 00 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 01 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=60:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=116): 40 00 00 00 ff ff ff ff ff ff 60 21 c0 99 88 b1 ff ff ff ff ff ff 60 1d 00 00 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 02 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=60:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=116): 40 00 00 00 ff ff ff ff ff ff 60 21 c0 99 88 b1 ff ff ff ff ff ff 70 1d 00 00 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 02 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=60:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=116): 40 00 00 00 ff ff ff ff ff ff 60 21 c0 99 88 b1 ff ff ff ff ff ff c0 1d 00 00 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 05 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=60:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=116): 40 00 00 00 ff ff ff ff ff ff 60 21 c0 99 88 b1 ff ff ff ff ff ff e0 1e 00 00 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 01 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=60:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=116): 40 00 00 00 ff ff ff ff ff ff 60 21 c0 99 88 b1 ff ff ff ff ff ff f0 1e 00 00 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 01 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=60:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=116): 40 00 00 00 ff ff ff ff ff ff 60 21 c0 99 88 b1 ff ff ff ff ff ff 00 1f 00 00 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 02 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=60:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=116): 40 00 00 00 ff ff ff ff ff ff 60 21 c0 99 88 b1 ff ff ff ff ff ff 10 1f 00 00 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 02 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=60:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=116): 40 00 00 00 ff ff ff ff ff ff 60 21 c0 99 88 b1 ff ff ff ff ff ff 60 1f 00 00 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 05 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=2c:d0:5a:06:a5:92
nl80211: MLME event frame - hexdump(len=73): 40 00 00 00 ff ff ff ff ff ff 2c d0 5a 06 a5 92 ff ff ff ff ff ff c0 ae 00 00 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 03 01 01 2d 1a 6e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=2c:d0:5a:06:a5:92
nl80211: MLME event frame - hexdump(len=73): 40 00 00 00 ff ff ff ff ff ff 2c d0 5a 06 a5 92 ff ff ff ff ff ff d0 ae 00 00 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 03 01 02 2d 1a 6e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=62:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=306): 40 00 00 00 ff ff ff ff ff ff 62 21 c0 99 88 b1 ff ff ff ff ff ff 60 20 00 07 44 49 52 45 43 54 2d 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 01 dd 99 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 01 10 08 00 02 21 08 10 47 00 10 34 e6 cb 58 77 e0 5f db 94 f5 e0 e3 4d 80 d0 f9 10 54 00 08 00 0a 00 50 f2 04 00 05 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 13 53 41 4d 53 55 4e 47 5f 45 4c 45 43 54 52 4f 4e 49 43 53 10 23 00 0e 53 41 4d 53 55 4e 47 5f 4d 4f 42 49 4c 45 10 24 00 04 32 30 31 32 10 11 00 0c 41 6e 64 72 6f 69 64 5f 61 37 63 61 10 49 00 09 00 37 2a 00 01 20 03 01 01 dd 11 50 6f 9a 09 02 02 00 27 00 06 05 00 58 58 04 51 01 dd 0d 50 6f 9a 0a 00 00 06 01 10 c0 00 00 28 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
P2P: Parsing WPS IE
P2P: Config Methods (WPS): 0x2108
P2P: Device Password ID: 0
P2P: Primary Device Type (WPS): 10-0050F204-5
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 27 Group Capability 00
P2P: Attribute 6 length 5
P2P: * Listen Channel: Country XX(0x04) Regulatory Class 81 Channel Number 1
P2P: Parsing WPS IE
P2P: Config Methods (WPS): 0x2108
P2P: Device Password ID: 0
P2P: Primary Device Type (WPS): 10-0050F204-5
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 27 Group Capability 00
P2P: Attribute 6 length 5
P2P: * Listen Channel: Country XX(0x04) Regulatory Class 81 Channel Number 1
P2P: Reply to P2P Probe Request in Listen state
WPS: * Version (hardcoded 0x10)
WPS: * UUID-E
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Device Info
nl80211: CMD_FRAME freq=2412 wait=0 no_cck=1 no_ack=1 offchanok=1
nl80211: Frame TX command accepted (no ACK); cookie 0x0
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=00:0b:6b:7f:92:56 A2=62:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=119): d0 00 3c 00 00 0b 6b 7f 92 56 62 21 c0 99 88 b1 00 0b 6b 7f 92 56 70 20 04 09 50 6f 9a 09 07 01 dd 2d 50 6f 9a 09 02 02 00 27 00 0d 21 00 62 21 c0 99 88 b1 01 88 00 0a 00 50 f2 04 00 05 00 10 11 00 0c 41 6e 64 72 6f 69 64 5f 61 37 63 61 dd 0a 00 50 f2 04 10 08 00 02 00 08 dd 0b 00 00 f0 0a 00 00 04 0a 31 a8 c0 dd 0d 50 6f 9a 0a 00 00 06 01 10 c0 00 00 28
nl80211: Frame event
wlan5: Event RX_ACTION (21) received
wlan5: Received Action frame: SA=62:21:c0:99:88:b1 Category=4 DataLen=94 freq=2412 MHz
P2P: RX P2P Public Action from 62:21:c0:99:88:b1
P2P: P2P Public Action contents - hexdump(len=89): 07 01 dd 2d 50 6f 9a 09 02 02 00 27 00 0d 21 00 62 21 c0 99 88 b1 01 88 00 0a 00 50 f2 04 00 05 00 10 11 00 0c 41 6e 64 72 6f 69 64 5f 61 37 63 61 dd 0a 00 50 f2 04 10 08 00 02 00 08 dd 0b 00 00 f0 0a 00 00 04 0a 31 a8 c0 dd 0d 50 6f 9a 0a 00 00 06 01 10 c0 00 00 28
P2P: Parsing the received message
P2P: * Dialog Token: 1
P2P: Parsing WPS IE
P2P: Config Methods (WPS): 0x8
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 27 Group Capability 00
P2P: Attribute 13 length 33
P2P: * Device Info: addr 62:21:c0:99:88:b1 primary device type 10-0050F204-5 device name 'Android_a7ca' config methods 0x188
P2P: Received Provision Discovery Request from 62:21:c0:99:88:b1 with config methods 0x8 (freq=2412)
P2P: Provision Discovery Request from unknown peer 62:21:c0:99:88:b1
P2P: Parsing WPS IE
P2P: Config Methods (WPS): 0x8
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 27 Group Capability 00
P2P: Attribute 13 length 33
P2P: * Device Info: addr 62:21:c0:99:88:b1 primary device type 10-0050F204-5 device name 'Android_a7ca' config methods 0x188
P2P: Update peer 62:21:c0:99:88:b1 config_methods 0x0 -> 0x188
P2P: Peer found with Listen frequency 2412 MHz (rx_time=1372920467.984941)
P2P-DEVICE-FOUND 62:21:c0:99:88:b1 p2p_dev_addr=62:21:c0:99:88:b1 pri_dev_type=10-0050F204-5 name='Android_a7ca' config_methods=0x188 dev_capab=0x25 group_capab=0x0
CTRL_IFACE monitor send - hexdump(len=46): 2f 74 6d 70 2f 73 61 6d 70 6c 65 5f 77 69 64 69 5f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74 2e 54 6b 4d 4e 5a 54 2f 73 6f 63 6b 65 74 00
P2P: Peer 62:21:c0:99:88:b1 requested us to show a PIN on display
P2P: * Dialog Token: 1
P2P: Sending Provision Discovery Response
Off-channel: Send action frame: freq=2412 dst=62:21:c0:99:88:b1 src=00:0b:6b:7f:92:56 bssid=00:0b:6b:7f:92:56 len=35
nl80211: Send Action frame (ifindex=4, freq=2412 MHz wait=200 ms no_cck=1)
nl80211: CMD_FRAME freq=2412 wait=200 no_cck=1 no_ack=0 offchanok=1
nl80211: Frame TX command accepted; cookie 0xffff8804077e0800
Get randomness: len=4 entropy=0
P2P-PROV-DISC-SHOW-PIN 62:21:c0:99:88:b1 13073176 p2p_dev_addr=62:21:c0:99:88:b1 pri_dev_type=10-0050F204-5 name='Android_a7ca' config_methods=0x188 dev_capab=0x27 group_capab=0x0
CTRL_IFACE monitor send - hexdump(len=46): 2f 74 6d 70 2f 73 61 6d 70 6c 65 5f 77 69 64 69 5f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74 2e 54 6b 4d 4e 5a 54 2f 73 6f 63 6b 65 74 00
nl80211: Event message available
nl80211: MLME event 60 on wlan5(00:0b:6b:7f:92:56) A1=62:21:c0:99:88:b1 A2=00:0b:6b:7f:92:56
nl80211: MLME event frame - hexdump(len=59): d0 00 ac 00 62 21 c0 99 88 b1 00 0b 6b 7f 92 56 00 0b 6b 7f 92 56 e0 1b 04 09 50 6f 9a 09 08 01 dd 0a 00 50 f2 04 10 08 00 02 00 08 dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
nl80211: Frame TX status event
nl80211: Action TX status: cookie=0ffff8804077e0800 (match) (ack=1)
wlan5: Event TX_STATUS (18) received
wlan5: EVENT_TX_STATUS dst=62:21:c0:99:88:b1 type=0 stype=13
Off-channel: TX status result=0 cb=0x423fe0
P2P: Action frame TX callback (state=0 freq=2412 dst=62:21:c0:99:88:b1 src=00:0b:6b:7f:92:56 bssid=00:0b:6b:7f:92:56 result=0
RX ctrl_iface - hexdump_ascii(len=46):
50 32 50 5f 43 4f 4e 4e 45 43 54 20 36 32 3a 32 P2P_CONNECT 62:2
31 3a 63 30 3a 39 39 3a 38 38 3a 62 31 20 31 33 1:c0:99:88:b1 13
30 37 33 31 37 36 20 64 69 73 70 6c 61 79 073176 display
wlan5: Control interface command 'P2P_CONNECT 62:21:c0:99:88:b1 13073176 display'
nl80211: Get shared freq for PHY phy0
nl80211: No shared interface for PHY (phy0) in associated state
P2P: Own frequency preference: 0 MHz
P2P: Create a new interface p2p-wlan5-0 for the group
nl80211: Create interface iftype 8 (P2P_CLIENT)
nl80211: New interface p2p-wlan5-0 created: ifindex=6
nl80211: Set TX rates failed: ret=-100 (Network is down)
nl80211: Allocate new address for P2P group interface
nl80211: Assigned new P2P Interface Address 02:0b:6b:7f:92:56
P2P: Created pending virtual interface p2p-wlan5-0 addr 02:0b:6b:7f:92:56
P2P: Request to start group negotiation - peer=62:21:c0:99:88:b1 GO Intent=0 Intended Interface Address=02:0b:6b:7f:92:56 wps_method=1 persistent_group=0 pd_before_go_neg=0
P2P: Own preference for operation channel: Operating Class 115 Channel 36
P2P: Stopping find
P2P: Clear timeout (state=LISTEN_ONLY)
P2P: State LISTEN_ONLY -> IDLE
P2P: Clear timeout (state=IDLE)
P2P: Clear drv_in_listen (2412)
nl80211: Cancel remain-on-channel with cookie 0xffff8804042eb280
nl80211: Disable Probe Request reporting nl_preq=0x1fa68c0
P2P: * Dialog Token: 1
P2P: * P2P IE header
P2P: * Capability dev=25 group=08
P2P: * GO Intent: Intent 0 Tie breaker 1
P2P: * Configuration Timeout: GO 100 (*10ms) client 20 (*10ms)
P2P: * Listen Channel: Regulatory Class 81 Channel 1
P2P: * Intended P2P Interface Address 02:0b:6b:7f:92:56
P2P: * Channel List - hexdump(len=17): 55 53 04 51 0c 01 02 03 04 05 06 07 08 09 0a 0b 0d
P2P: * Device Info
P2P: * Operating Channel: Regulatory Class 115 Channel 36
WPS: * Version (hardcoded 0x10)
P2P: WPS IE Device Password ID: 5
WPS: * Version2 (0x20)
P2P: Sending GO Negotiation Request
P2P: State IDLE -> CONNECT
Off-channel: Send action frame: freq=2412 dst=62:21:c0:99:88:b1 src=00:0b:6b:7f:92:56 bssid=62:21:c0:99:88:b1 len=147
nl80211: Send Action frame (ifindex=4, freq=2412 MHz wait=500 ms no_cck=1)
nl80211: CMD_FRAME freq=2412 wait=500 no_cck=1 no_ack=0 offchanok=1
nl80211: Frame TX command accepted; cookie 0xffff8803d954ad00
nl80211: Ignore event for foreign ifindex 6
nl80211: Ignore event for foreign ifindex 6
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=1 freq=2412 channel_type=0 duration=0 cookie=0xffff8804042eb280 (match))
wlan5: Event CANCEL_REMAIN_ON_CHANNEL (23) received
P2P: Cancel remain-on-channel callback (p2p_long_listen=0 ms pending_action_tx=0x1fa8bb0)
P2P: Driver ended Listen state (freq=2412)
nl80211: Event message available
nl80211: MLME event 60 on wlan5(00:0b:6b:7f:92:56) A1=62:21:c0:99:88:b1 A2=00:0b:6b:7f:92:56
nl80211: MLME event frame - hexdump(len=171): d0 00 ac 00 62 21 c0 99 88 b1 00 0b 6b 7f 92 56 62 21 c0 99 88 b1 f0 1b 04 09 50 6f 9a 09 00 01 dd 5f 50 6f 9a 09 02 02 00 25 08 04 01 00 01 05 02 00 64 14 06 05 00 55 53 04 51 01 09 06 00 02 0b 6b 7f 92 56 0b 11 00 55 53 04 51 0c 01 02 03 04 05 06 07 08 09 0a 0b 0d 0d 1d 00 00 0b 6b 7f 92 56 01 08 00 01 00 50 f2 04 00 01 00 10 11 00 08 6b 65 76 69 6e 2d 70 63 11 05 00 55 53 04 73 24 dd 19 00 50 f2 04 10 4a 00 01 10 10 12 00 02 00 05 10 49 00 06 00 37 2a 00 01 20 dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
nl80211: Frame TX status event
nl80211: Action TX status: cookie=0ffff8803d954ad00 (match) (ack=1)
wlan5: Event TX_STATUS (18) received
wlan5: EVENT_TX_STATUS dst=62:21:c0:99:88:b1 type=0 stype=13
Off-channel: TX status result=0 cb=0x423fe0
P2P: Action frame TX callback (state=1 freq=2412 dst=62:21:c0:99:88:b1 src=00:0b:6b:7f:92:56 bssid=62:21:c0:99:88:b1 result=0
P2P: GO Negotiation Request TX callback: success=1
P2P: State CONNECT -> CONNECT
P2P: Set timeout (state=CONNECT): 0.500000 sec
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=00:0b:6b:7f:92:56 A2=62:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=178): d0 00 3c 00 00 0b 6b 7f 92 56 62 21 c0 99 88 b1 62 21 c0 99 88 b1 80 20 04 09 50 6f 9a 09 01 01 dd 66 50 6f 9a 09 00 01 00 01 02 02 00 27 00 04 01 00 0e 05 02 00 64 14 11 05 00 58 58 04 73 30 09 06 00 62 21 c0 99 08 b1 0b 18 00 58 58 04 51 0d 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 73 04 24 28 2c 30 0d 21 00 62 21 c0 99 88 b1 01 88 00 0a 00 50 f2 04 00 05 00 10 11 00 0c 41 6e 64 72 6f 69 64 5f 61 37 63 61 dd 19 00 50 f2 04 10 4a 00 01 10 10 12 00 02 00 00 10 49 00 06 00 37 2a 00 01 20 dd 0d 50 6f 9a 0a 00 00 06 01 10 c0 00 00 28
nl80211: Frame event
wlan5: Event RX_ACTION (21) received
wlan5: Received Action frame: SA=62:21:c0:99:88:b1 Category=4 DataLen=153 freq=2412 MHz
P2P: RX P2P Public Action from 62:21:c0:99:88:b1
P2P: P2P Public Action contents - hexdump(len=148): 01 01 dd 66 50 6f 9a 09 00 01 00 01 02 02 00 27 00 04 01 00 0e 05 02 00 64 14 11 05 00 58 58 04 73 30 09 06 00 62 21 c0 99 08 b1 0b 18 00 58 58 04 51 0d 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 73 04 24 28 2c 30 0d 21 00 62 21 c0 99 88 b1 01 88 00 0a 00 50 f2 04 00 05 00 10 11 00 0c 41 6e 64 72 6f 69 64 5f 61 37 63 61 dd 19 00 50 f2 04 10 4a 00 01 10 10 12 00 02 00 00 10 49 00 06 00 37 2a 00 01 20 dd 0d 50 6f 9a 0a 00 00 06 01 10 c0 00 00 28
P2P: Received GO Negotiation Response from 62:21:c0:99:88:b1 (freq=2412)
P2P: Parsing the received message
P2P: * Dialog Token: 1
P2P: Parsing WPS IE
P2P: Device Password ID: 0
P2P: Parsing P2P IE
P2P: Attribute 0 length 1
P2P: * Status: 1
P2P: Attribute 2 length 2
P2P: * Device Capability 27 Group Capability 00
P2P: Attribute 4 length 1
P2P: * GO Intent: Intent 7 Tie breaker 0
P2P: Attribute 5 length 2
P2P: * Configuration Timeout
P2P: Attribute 17 length 5
P2P: * Operating Channel: Country XX(0x04) Regulatory Class 115 Channel Number 48
P2P: Attribute 9 length 6
P2P: * Intended P2P Interface Address: 62:21:c0:99:08:b1
P2P: Attribute 11 length 24
P2P: * Channel List: Country String 'XX(0x04)'
P2P: Channel List - hexdump(len=24): 58 58 04 51 0d 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 73 04 24 28 2c 30
P2P: Attribute 13 length 33
P2P: * Device Info: addr 62:21:c0:99:88:b1 primary device type 10-0050F204-5 device name 'Android_a7ca' config methods 0x188
P2P: GO Negotiation rejected: status 1
P2P: Wait for the peer to become ready for GO Negotiation
P2P: State CONNECT -> WAIT_PEER_IDLE
P2P: Set timeout (state=WAIT_PEER_IDLE): 0.000000 sec
Off-channel: Action frame sequence done notification
nl80211: Cancel TX frame wait: cookie=0xffff8803d954ad00
P2P: Timeout (state=WAIT_PEER_IDLE)
P2P: Go to Listen state while waiting for the peer to become ready for GO Negotiation
P2P: State WAIT_PEER_IDLE -> WAIT_PEER_CONNECT
P2P: Starting short listen state (state=WAIT_PEER_CONNECT)
WPS: * Version (hardcoded 0x10)
P2P: WPS IE Device Password ID: 5
WPS: * UUID-E
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Device Info
nl80211: Enable Probe Request reporting nl_preq=0x1fa68c0
nl80211: Register frame type=0x40 nl_handle=0x1fa68c0
nl80211: Register frame match - hexdump(len=0): [NULL]
nl80211: Remain-on-channel cookie 0xffff880405e77f80 for freq=2412 MHz duration=307
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=0 freq=2412 channel_type=0 duration=307 cookie=0xffff880405e77f80 (match))
wlan5: Event REMAIN_ON_CHANNEL (22) received
Off-channel: Send Action callback (without_roc=0 pending_action_tx=(nil))
P2P: Starting Listen timeout(0,307200) on freq=2412 based on callback
P2P: Set timeout (state=WAIT_PEER_CONNECT): 0.327200 sec
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=1 freq=2412 channel_type=0 duration=0 cookie=0xffff880405e77f80 (match))
wlan5: Event CANCEL_REMAIN_ON_CHANNEL (23) received
P2P: Cancel remain-on-channel callback (p2p_long_listen=0 ms pending_action_tx=(nil))
P2P: Driver ended Listen state (freq=2412)
P2P: Timeout (state=WAIT_PEER_CONNECT)
P2P: State WAIT_PEER_CONNECT -> WAIT_PEER_IDLE
P2P: Set timeout (state=WAIT_PEER_IDLE): 0.500000 sec
P2P: Timeout (state=WAIT_PEER_IDLE)
P2P: Go to Listen state while waiting for the peer to become ready for GO Negotiation
P2P: State WAIT_PEER_IDLE -> WAIT_PEER_CONNECT
P2P: Starting short listen state (state=WAIT_PEER_CONNECT)
WPS: * Version (hardcoded 0x10)
P2P: WPS IE Device Password ID: 5
WPS: * UUID-E
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Device Info
nl80211: Probe Request reporting already on! nl_preq=0x1fa68c0
nl80211: Remain-on-channel cookie 0xffff880405e77e80 for freq=2412 MHz duration=307
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=0 freq=2412 channel_type=0 duration=307 cookie=0xffff880405e77e80 (match))
wlan5: Event REMAIN_ON_CHANNEL (22) received
Off-channel: Send Action callback (without_roc=0 pending_action_tx=(nil))
P2P: Starting Listen timeout(0,307200) on freq=2412 based on callback
P2P: Set timeout (state=WAIT_PEER_CONNECT): 0.327200 sec
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=1 freq=2412 channel_type=0 duration=0 cookie=0xffff880405e77e80 (match))
wlan5: Event CANCEL_REMAIN_ON_CHANNEL (23) received
P2P: Cancel remain-on-channel callback (p2p_long_listen=0 ms pending_action_tx=(nil))
P2P: Driver ended Listen state (freq=2412)
P2P: Timeout (state=WAIT_PEER_CONNECT)
P2P: State WAIT_PEER_CONNECT -> WAIT_PEER_IDLE
P2P: Set timeout (state=WAIT_PEER_IDLE): 0.500000 sec
P2P: Timeout (state=WAIT_PEER_IDLE)
P2P: Go to Listen state while waiting for the peer to become ready for GO Negotiation
P2P: State WAIT_PEER_IDLE -> WAIT_PEER_CONNECT
P2P: Starting short listen state (state=WAIT_PEER_CONNECT)
WPS: * Version (hardcoded 0x10)
P2P: WPS IE Device Password ID: 5
WPS: * UUID-E
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Device Info
nl80211: Probe Request reporting already on! nl_preq=0x1fa68c0
nl80211: Remain-on-channel cookie 0xffff88034c994780 for freq=2412 MHz duration=307
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=0 freq=2412 channel_type=0 duration=307 cookie=0xffff88034c994780 (match))
wlan5: Event REMAIN_ON_CHANNEL (22) received
Off-channel: Send Action callback (without_roc=0 pending_action_tx=(nil))
P2P: Starting Listen timeout(0,307200) on freq=2412 based on callback
P2P: Set timeout (state=WAIT_PEER_CONNECT): 0.327200 sec
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=1 freq=2412 channel_type=0 duration=0 cookie=0xffff88034c994780 (match))
wlan5: Event CANCEL_REMAIN_ON_CHANNEL (23) received
P2P: Cancel remain-on-channel callback (p2p_long_listen=0 ms pending_action_tx=(nil))
P2P: Driver ended Listen state (freq=2412)
P2P: Timeout (state=WAIT_PEER_CONNECT)
P2P: State WAIT_PEER_CONNECT -> WAIT_PEER_IDLE
P2P: Set timeout (state=WAIT_PEER_IDLE): 0.500000 sec
P2P: Timeout (state=WAIT_PEER_IDLE)
P2P: Go to Listen state while waiting for the peer to become ready for GO Negotiation
P2P: State WAIT_PEER_IDLE -> WAIT_PEER_CONNECT
P2P: Starting short listen state (state=WAIT_PEER_CONNECT)
WPS: * Version (hardcoded 0x10)
P2P: WPS IE Device Password ID: 5
WPS: * UUID-E
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Device Info
nl80211: Probe Request reporting already on! nl_preq=0x1fa68c0
nl80211: Remain-on-channel cookie 0xffff88040831b500 for freq=2412 MHz duration=204
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=0 freq=2412 channel_type=0 duration=204 cookie=0xffff88040831b500 (match))
wlan5: Event REMAIN_ON_CHANNEL (22) received
Off-channel: Send Action callback (without_roc=0 pending_action_tx=(nil))
P2P: Starting Listen timeout(0,204800) on freq=2412 based on callback
P2P: Set timeout (state=WAIT_PEER_CONNECT): 0.224800 sec
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=1 freq=2412 channel_type=0 duration=0 cookie=0xffff88040831b500 (match))
wlan5: Event CANCEL_REMAIN_ON_CHANNEL (23) received
P2P: Cancel remain-on-channel callback (p2p_long_listen=0 ms pending_action_tx=(nil))
P2P: Driver ended Listen state (freq=2412)
P2P: Timeout (state=WAIT_PEER_CONNECT)
P2P: State WAIT_PEER_CONNECT -> WAIT_PEER_IDLE
P2P: Set timeout (state=WAIT_PEER_IDLE): 0.500000 sec
P2P: Timeout (state=WAIT_PEER_IDLE)
P2P: Go to Listen state while waiting for the peer to become ready for GO Negotiation
P2P: State WAIT_PEER_IDLE -> WAIT_PEER_CONNECT
P2P: Starting short listen state (state=WAIT_PEER_CONNECT)
WPS: * Version (hardcoded 0x10)
P2P: WPS IE Device Password ID: 5
WPS: * UUID-E
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Device Info
nl80211: Probe Request reporting already on! nl_preq=0x1fa68c0
nl80211: Remain-on-channel cookie 0xffff88034c8f2f00 for freq=2412 MHz duration=204
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=0 freq=2412 channel_type=0 duration=204 cookie=0xffff88034c8f2f00 (match))
wlan5: Event REMAIN_ON_CHANNEL (22) received
Off-channel: Send Action callback (without_roc=0 pending_action_tx=(nil))
P2P: Starting Listen timeout(0,204800) on freq=2412 based on callback
P2P: Set timeout (state=WAIT_PEER_CONNECT): 0.224800 sec
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=1 freq=2412 channel_type=0 duration=0 cookie=0xffff88034c8f2f00 (match))
wlan5: Event CANCEL_REMAIN_ON_CHANNEL (23) received
P2P: Cancel remain-on-channel callback (p2p_long_listen=0 ms pending_action_tx=(nil))
P2P: Driver ended Listen state (freq=2412)
P2P: Timeout (state=WAIT_PEER_CONNECT)
P2P: State WAIT_PEER_CONNECT -> WAIT_PEER_IDLE
P2P: Set timeout (state=WAIT_PEER_IDLE): 0.500000 sec
P2P: Timeout (state=WAIT_PEER_IDLE)
P2P: Go to Listen state while waiting for the peer to become ready for GO Negotiation
P2P: State WAIT_PEER_IDLE -> WAIT_PEER_CONNECT
P2P: Starting short listen state (state=WAIT_PEER_CONNECT)
WPS: * Version (hardcoded 0x10)
P2P: WPS IE Device Password ID: 5
WPS: * UUID-E
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Device Info
nl80211: Probe Request reporting already on! nl_preq=0x1fa68c0
nl80211: Remain-on-channel cookie 0xffff88034c994c00 for freq=2412 MHz duration=307
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=0 freq=2412 channel_type=0 duration=307 cookie=0xffff88034c994c00 (match))
wlan5: Event REMAIN_ON_CHANNEL (22) received
Off-channel: Send Action callback (without_roc=0 pending_action_tx=(nil))
P2P: Starting Listen timeout(0,307200) on freq=2412 based on callback
P2P: Set timeout (state=WAIT_PEER_CONNECT): 0.327200 sec
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=1 freq=2412 channel_type=0 duration=0 cookie=0xffff88034c994c00 (match))
wlan5: Event CANCEL_REMAIN_ON_CHANNEL (23) received
P2P: Cancel remain-on-channel callback (p2p_long_listen=0 ms pending_action_tx=(nil))
P2P: Driver ended Listen state (freq=2412)
P2P: Timeout (state=WAIT_PEER_CONNECT)
P2P: State WAIT_PEER_CONNECT -> WAIT_PEER_IDLE
P2P: Set timeout (state=WAIT_PEER_IDLE): 0.500000 sec
P2P: Timeout (state=WAIT_PEER_IDLE)
P2P: Go to Listen state while waiting for the peer to become ready for GO Negotiation
P2P: State WAIT_PEER_IDLE -> WAIT_PEER_CONNECT
P2P: Starting short listen state (state=WAIT_PEER_CONNECT)
WPS: * Version (hardcoded 0x10)
P2P: WPS IE Device Password ID: 5
WPS: * UUID-E
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Device Info
nl80211: Probe Request reporting already on! nl_preq=0x1fa68c0
nl80211: Remain-on-channel cookie 0xffff88034c8f2a80 for freq=2412 MHz duration=204
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=0 freq=2412 channel_type=0 duration=204 cookie=0xffff88034c8f2a80 (match))
wlan5: Event REMAIN_ON_CHANNEL (22) received
Off-channel: Send Action callback (without_roc=0 pending_action_tx=(nil))
P2P: Starting Listen timeout(0,204800) on freq=2412 based on callback
P2P: Set timeout (state=WAIT_PEER_CONNECT): 0.224800 sec
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=1 freq=2412 channel_type=0 duration=0 cookie=0xffff88034c8f2a80 (match))
wlan5: Event CANCEL_REMAIN_ON_CHANNEL (23) received
P2P: Cancel remain-on-channel callback (p2p_long_listen=0 ms pending_action_tx=(nil))
P2P: Driver ended Listen state (freq=2412)
P2P: Timeout (state=WAIT_PEER_CONNECT)
P2P: State WAIT_PEER_CONNECT -> WAIT_PEER_IDLE
P2P: Set timeout (state=WAIT_PEER_IDLE): 0.500000 sec
P2P: Timeout (state=WAIT_PEER_IDLE)
P2P: Go to Listen state while waiting for the peer to become ready for GO Negotiation
P2P: State WAIT_PEER_IDLE -> WAIT_PEER_CONNECT
P2P: Starting short listen state (state=WAIT_PEER_CONNECT)
WPS: * Version (hardcoded 0x10)
P2P: WPS IE Device Password ID: 5
WPS: * UUID-E
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Device Info
nl80211: Probe Request reporting already on! nl_preq=0x1fa68c0
nl80211: Remain-on-channel cookie 0xffff88034c994c00 for freq=2412 MHz duration=102
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=0 freq=2412 channel_type=0 duration=102 cookie=0xffff88034c994c00 (match))
wlan5: Event REMAIN_ON_CHANNEL (22) received
Off-channel: Send Action callback (without_roc=0 pending_action_tx=(nil))
P2P: Starting Listen timeout(0,102400) on freq=2412 based on callback
P2P: Set timeout (state=WAIT_PEER_CONNECT): 0.122400 sec
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=1 freq=2412 channel_type=0 duration=0 cookie=0xffff88034c994c00 (match))
wlan5: Event CANCEL_REMAIN_ON_CHANNEL (23) received
P2P: Cancel remain-on-channel callback (p2p_long_listen=0 ms pending_action_tx=(nil))
P2P: Driver ended Listen state (freq=2412)
P2P: Timeout (state=WAIT_PEER_CONNECT)
P2P: State WAIT_PEER_CONNECT -> WAIT_PEER_IDLE
P2P: Set timeout (state=WAIT_PEER_IDLE): 0.500000 sec
P2P: Timeout (state=WAIT_PEER_IDLE)
P2P: Go to Listen state while waiting for the peer to become ready for GO Negotiation
P2P: State WAIT_PEER_IDLE -> WAIT_PEER_CONNECT
P2P: Starting short listen state (state=WAIT_PEER_CONNECT)
WPS: * Version (hardcoded 0x10)
P2P: WPS IE Device Password ID: 5
WPS: * UUID-E
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Device Info
nl80211: Probe Request reporting already on! nl_preq=0x1fa68c0
nl80211: Remain-on-channel cookie 0xffff88034c8f2900 for freq=2412 MHz duration=204
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=0 freq=2412 channel_type=0 duration=204 cookie=0xffff88034c8f2900 (match))
wlan5: Event REMAIN_ON_CHANNEL (22) received
Off-channel: Send Action callback (without_roc=0 pending_action_tx=(nil))
P2P: Starting Listen timeout(0,204800) on freq=2412 based on callback
P2P: Set timeout (state=WAIT_PEER_CONNECT): 0.224800 sec
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=1 freq=2412 channel_type=0 duration=0 cookie=0xffff88034c8f2900 (match))
wlan5: Event CANCEL_REMAIN_ON_CHANNEL (23) received
P2P: Cancel remain-on-channel callback (p2p_long_listen=0 ms pending_action_tx=(nil))
P2P: Driver ended Listen state (freq=2412)
P2P: Timeout (state=WAIT_PEER_CONNECT)
P2P: State WAIT_PEER_CONNECT -> WAIT_PEER_IDLE
P2P: Set timeout (state=WAIT_PEER_IDLE): 0.500000 sec
P2P: Timeout (state=WAIT_PEER_IDLE)
P2P: Go to Listen state while waiting for the peer to become ready for GO Negotiation
P2P: State WAIT_PEER_IDLE -> WAIT_PEER_CONNECT
P2P: Starting short listen state (state=WAIT_PEER_CONNECT)
WPS: * Version (hardcoded 0x10)
P2P: WPS IE Device Password ID: 5
WPS: * UUID-E
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Device Info
nl80211: Probe Request reporting already on! nl_preq=0x1fa68c0
nl80211: Remain-on-channel cookie 0xffff88034c994d80 for freq=2412 MHz duration=307
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=0 freq=2412 channel_type=0 duration=307 cookie=0xffff88034c994d80 (match))
wlan5: Event REMAIN_ON_CHANNEL (22) received
Off-channel: Send Action callback (without_roc=0 pending_action_tx=(nil))
P2P: Starting Listen timeout(0,307200) on freq=2412 based on callback
P2P: Set timeout (state=WAIT_PEER_CONNECT): 0.327200 sec
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=1 freq=2412 channel_type=0 duration=0 cookie=0xffff88034c994d80 (match))
wlan5: Event CANCEL_REMAIN_ON_CHANNEL (23) received
P2P: Cancel remain-on-channel callback (p2p_long_listen=0 ms pending_action_tx=(nil))
P2P: Driver ended Listen state (freq=2412)
P2P: Timeout (state=WAIT_PEER_CONNECT)
P2P: State WAIT_PEER_CONNECT -> WAIT_PEER_IDLE
P2P: Set timeout (state=WAIT_PEER_IDLE): 0.500000 sec
P2P: Timeout (state=WAIT_PEER_IDLE)
P2P: Go to Listen state while waiting for the peer to become ready for GO Negotiation
P2P: State WAIT_PEER_IDLE -> WAIT_PEER_CONNECT
P2P: Starting short listen state (state=WAIT_PEER_CONNECT)
WPS: * Version (hardcoded 0x10)
P2P: WPS IE Device Password ID: 5
WPS: * UUID-E
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Device Info
nl80211: Probe Request reporting already on! nl_preq=0x1fa68c0
nl80211: Remain-on-channel cookie 0xffff88034c994400 for freq=2412 MHz duration=102
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=0 freq=2412 channel_type=0 duration=102 cookie=0xffff88034c994400 (match))
wlan5: Event REMAIN_ON_CHANNEL (22) received
Off-channel: Send Action callback (without_roc=0 pending_action_tx=(nil))
P2P: Starting Listen timeout(0,102400) on freq=2412 based on callback
P2P: Set timeout (state=WAIT_PEER_CONNECT): 0.122400 sec
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=62:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=306): 40 00 00 00 ff ff ff ff ff ff 62 21 c0 99 88 b1 ff ff ff ff ff ff 40 00 00 07 44 49 52 45 43 54 2d 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 01 dd 99 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 01 10 08 00 02 21 08 10 47 00 10 34 e6 cb 58 77 e0 5f db 94 f5 e0 e3 4d 80 d0 f9 10 54 00 08 00 0a 00 50 f2 04 00 05 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 13 53 41 4d 53 55 4e 47 5f 45 4c 45 43 54 52 4f 4e 49 43 53 10 23 00 0e 53 41 4d 53 55 4e 47 5f 4d 4f 42 49 4c 45 10 24 00 04 32 30 31 32 10 11 00 0c 41 6e 64 72 6f 69 64 5f 61 37 63 61 10 49 00 09 00 37 2a 00 01 20 03 01 01 dd 11 50 6f 9a 09 02 02 00 27 00 06 05 00 58 58 04 51 01 dd 0d 50 6f 9a 0a 00 00 06 01 10 c0 00 00 28 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
P2P: Parsing WPS IE
P2P: Config Methods (WPS): 0x2108
P2P: Device Password ID: 0
P2P: Primary Device Type (WPS): 10-0050F204-5
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 27 Group Capability 00
P2P: Attribute 6 length 5
P2P: * Listen Channel: Country XX(0x04) Regulatory Class 81 Channel Number 1
P2P: Parsing WPS IE
P2P: Config Methods (WPS): 0x2108
P2P: Device Password ID: 0
P2P: Primary Device Type (WPS): 10-0050F204-5
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 27 Group Capability 00
P2P: Attribute 6 length 5
P2P: * Listen Channel: Country XX(0x04) Regulatory Class 81 Channel Number 1
P2P: Reply to P2P Probe Request in Listen state
WPS: * Version (hardcoded 0x10)
P2P: WPS IE Device Password ID: 5
WPS: * UUID-E
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Device Info
nl80211: CMD_FRAME freq=2412 wait=0 no_cck=1 no_ack=1 offchanok=1
nl80211: Frame TX command accepted (no ACK); cookie 0x0
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=00:0b:6b:7f:92:56 A2=62:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=182): d0 00 3c 00 00 0b 6b 7f 92 56 62 21 c0 99 88 b1 00 0b 6b 7f 92 56 50 00 04 09 50 6f 9a 09 00 02 dd 6a 50 6f 9a 09 02 02 00 27 08 04 01 00 0f 05 02 00 64 14 06 05 00 58 58 04 51 01 09 06 00 62 21 c0 99 08 b1 0b 18 00 58 58 04 51 0d 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 73 04 24 28 2c 30 0d 21 00 62 21 c0 99 88 b1 01 08 00 0a 00 50 f2 04 00 05 00 10 11 00 0c 41 6e 64 72 6f 69 64 5f 61 37 63 61 11 05 00 58 58 04 73 30 dd 19 00 50 f2 04 10 4a 00 01 10 10 12 00 02 00 01 10 49 00 06 00 37 2a 00 01 20 dd 0d 50 6f 9a 0a 00 00 06 01 10 c0 00 00 28
nl80211: Frame event
wlan5: Event RX_ACTION (21) received
wlan5: Received Action frame: SA=62:21:c0:99:88:b1 Category=4 DataLen=157 freq=2412 MHz
P2P: RX P2P Public Action from 62:21:c0:99:88:b1
P2P: P2P Public Action contents - hexdump(len=152): 00 02 dd 6a 50 6f 9a 09 02 02 00 27 08 04 01 00 0f 05 02 00 64 14 06 05 00 58 58 04 51 01 09 06 00 62 21 c0 99 08 b1 0b 18 00 58 58 04 51 0d 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 73 04 24 28 2c 30 0d 21 00 62 21 c0 99 88 b1 01 08 00 0a 00 50 f2 04 00 05 00 10 11 00 0c 41 6e 64 72 6f 69 64 5f 61 37 63 61 11 05 00 58 58 04 73 30 dd 19 00 50 f2 04 10 4a 00 01 10 10 12 00 02 00 01 10 49 00 06 00 37 2a 00 01 20 dd 0d 50 6f 9a 0a 00 00 06 01 10 c0 00 00 28
P2P: Received GO Negotiation Request from 62:21:c0:99:88:b1(freq=2412)
P2P: Parsing the received message
P2P: * Dialog Token: 2
P2P: Parsing WPS IE
P2P: Device Password ID: 1
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 27 Group Capability 08
P2P: Attribute 4 length 1
P2P: * GO Intent: Intent 7 Tie breaker 1
P2P: Attribute 5 length 2
P2P: * Configuration Timeout
P2P: Attribute 6 length 5
P2P: * Listen Channel: Country XX(0x04) Regulatory Class 81 Channel Number 1
P2P: Attribute 9 length 6
P2P: * Intended P2P Interface Address: 62:21:c0:99:08:b1
P2P: Attribute 11 length 24
P2P: * Channel List: Country String 'XX(0x04)'
P2P: Channel List - hexdump(len=24): 58 58 04 51 0d 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 73 04 24 28 2c 30
P2P: Attribute 13 length 33
P2P: * Device Info: addr 62:21:c0:99:88:b1 primary device type 10-0050F204-5 device name 'Android_a7ca' config methods 0x108
P2P: Attribute 17 length 5
P2P: * Operating Channel: Country XX(0x04) Regulatory Class 115 Channel Number 48
P2P: Peer country - hexdump_ascii(len=3):
58 58 04 XX_
P2P: Own reg_classes 1 peer reg_classes 2 intersection reg_classes 1
P2P: Peer entered PIN on Keypad
P2P: Peer operating channel preference: 5240 MHz
P2P: GO Negotiation with 62:21:c0:99:88:b1
P2P: Stopping find
P2P: Clear timeout (state=WAIT_PEER_CONNECT)
P2P: State WAIT_PEER_CONNECT -> IDLE
P2P: Skip stop_listen since we are on correct channel for response
P2P: State IDLE -> GO_NEG
P2P: Clear timeout (state=GO_NEG)
P2P: Building GO Negotiation Response
P2P: * Dialog Token: 2
P2P: * P2P IE header
P2P: * Status: 0
P2P: * Capability dev=25 group=00
P2P: * GO Intent: Intent 0 Tie breaker 0
P2P: * Configuration Timeout: GO 100 (*10ms) client 20 (*10ms)
P2P: Omit Operating Channel attribute
P2P: * Intended P2P Interface Address 02:0b:6b:7f:92:56
P2P: * Channel List - hexdump(len=17): 55 53 04 51 0c 01 02 03 04 05 06 07 08 09 0a 0b 0d
P2P: * Device Info
WPS: * Version (hardcoded 0x10)
P2P: WPS IE Device Password ID: 5
WPS: * Version2 (0x20)
P2P: Sending GO Negotiation Response
Off-channel: Send action frame: freq=2412 dst=62:21:c0:99:88:b1 src=00:0b:6b:7f:92:56 bssid=00:0b:6b:7f:92:56 len=135
nl80211: Send Action frame (ifindex=4, freq=2412 MHz wait=500 ms no_cck=1)
nl80211: CMD_FRAME freq=2412 wait=500 no_cck=1 no_ack=0 offchanok=1
nl80211: Frame TX command accepted; cookie 0xffff880399356e00
nl80211: Event message available
nl80211: MLME event 60 on wlan5(00:0b:6b:7f:92:56) A1=62:21:c0:99:88:b1 A2=00:0b:6b:7f:92:56
nl80211: MLME event frame - hexdump(len=159): d0 00 ac 00 62 21 c0 99 88 b1 00 0b 6b 7f 92 56 00 0b 6b 7f 92 56 10 1c 04 09 50 6f 9a 09 01 02 dd 53 50 6f 9a 09 00 01 00 00 02 02 00 25 00 04 01 00 00 05 02 00 64 14 09 06 00 02 0b 6b 7f 92 56 0b 11 00 55 53 04 51 0c 01 02 03 04 05 06 07 08 09 0a 0b 0d 0d 1d 00 00 0b 6b 7f 92 56 01 08 00 01 00 50 f2 04 00 01 00 10 11 00 08 6b 65 76 69 6e 2d 70 63 dd 19 00 50 f2 04 10 4a 00 01 10 10 12 00 02 00 05 10 49 00 06 00 37 2a 00 01 20 dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
nl80211: Frame TX status event
nl80211: Action TX status: cookie=0ffff880399356e00 (match) (ack=1)
wlan5: Event TX_STATUS (18) received
wlan5: EVENT_TX_STATUS dst=62:21:c0:99:88:b1 type=0 stype=13
Off-channel: TX status result=0 cb=0x423fe0
P2P: Action frame TX callback (state=2 freq=2412 dst=62:21:c0:99:88:b1 src=00:0b:6b:7f:92:56 bssid=00:0b:6b:7f:92:56 result=0
P2P: GO Negotiation Response TX callback: success=1
P2P: State GO_NEG -> CONNECT
P2P: Set timeout (state=CONNECT): 0.500000 sec
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=00:0b:6b:7f:92:56 A2=62:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=121): d0 00 3c 00 00 0b 6b 7f 92 56 62 21 c0 99 88 b1 00 0b 6b 7f 92 56 60 00 04 09 50 6f 9a 09 02 02 dd 48 50 6f 9a 09 00 01 00 00 02 02 00 27 00 11 05 00 58 58 04 51 01 0b 11 00 58 58 04 51 0c 01 02 03 04 05 06 07 08 09 0a 0b 0d 0f 1c 00 62 21 c0 99 88 b1 44 49 52 45 43 54 2d 66 43 2d 41 6e 64 72 6f 69 64 5f 61 37 63 61 dd 0d 50 6f 9a 0a 00 00 06 01 10 c0 00 00 28
nl80211: Frame event
wlan5: Event RX_ACTION (21) received
wlan5: Received Action frame: SA=62:21:c0:99:88:b1 Category=4 DataLen=96 freq=2412 MHz
P2P: RX P2P Public Action from 62:21:c0:99:88:b1
P2P: P2P Public Action contents - hexdump(len=91): 02 02 dd 48 50 6f 9a 09 00 01 00 00 02 02 00 27 00 11 05 00 58 58 04 51 01 0b 11 00 58 58 04 51 0c 01 02 03 04 05 06 07 08 09 0a 0b 0d 0f 1c 00 62 21 c0 99 88 b1 44 49 52 45 43 54 2d 66 43 2d 41 6e 64 72 6f 69 64 5f 61 37 63 61 dd 0d 50 6f 9a 0a 00 00 06 01 10 c0 00 00 28
P2P: Received GO Negotiation Confirm from 62:21:c0:99:88:b1
P2P: Parsing the received message
P2P: * Dialog Token: 2
P2P: Parsing P2P IE
P2P: Attribute 0 length 1
P2P: * Status: 0
P2P: Attribute 2 length 2
P2P: * Device Capability 27 Group Capability 00
P2P: Attribute 17 length 5
P2P: * Operating Channel: Country XX(0x04) Regulatory Class 81 Channel Number 1
P2P: Attribute 11 length 17
P2P: * Channel List: Country String 'XX(0x04)'
P2P: Channel List - hexdump(len=17): 58 58 04 51 0c 01 02 03 04 05 06 07 08 09 0a 0b 0d
P2P: Attribute 15 length 28
P2P: * P2P Group ID: Device Address 62:21:c0:99:88:b1
P2P: * P2P Group ID: SSID - hexdump_ascii(len=22):
44 49 52 45 43 54 2d 66 43 2d 41 6e 64 72 6f 69 DIRECT-fC-Androi
64 5f 61 37 63 61 d_a7ca
P2P: 20 ms wait on current channel before starting group
P2P: GO Negotiation with 62:21:c0:99:88:b1 completed (peer will be GO)
P2P: Clear timeout (state=CONNECT)
P2P: State CONNECT -> PROVISIONING
nl80211: Cancel remain-on-channel with cookie 0xffff88034c994400
P2P-GO-NEG-SUCCESS
CTRL_IFACE monitor send - hexdump(len=46): 2f 74 6d 70 2f 73 61 6d 70 6c 65 5f 77 69 64 69 5f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74 2e 54 6b 4d 4e 5a 54 2f 73 6f 63 6b 65 74 00
Initializing interface 'p2p-wlan5-0' conf 'N/A' driver 'nl80211' ctrl_interface '/var/run/wpa_supplicant' bridge 'N/A'
nl80211: interface p2p-wlan5-0 in phy phy0
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
rfkill: initial event: idx=1 type=2 op=0 soft=1 hard=0
netlink: Operstate: linkmode=1, operstate=5
nl80211: Using driver-based off-channel TX
nl80211: TDLS supported
nl80211: TDLS external setup
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: driver param='(null)'
nl80211: Regulatory information - country=US
nl80211: 2402-2472 @ 40 MHz
nl80211: 5170-5250 @ 40 MHz
nl80211: 5250-5330 @ 40 MHz
nl80211: 5490-5600 @ 40 MHz
nl80211: 5650-5710 @ 40 MHz
nl80211: 5735-5835 @ 40 MHz
nl80211: Added 802.11b mode based on 802.11g information
p2p-wlan5-0: Own MAC address: 02:0b:6b:7f:92:56
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
p2p-wlan5-0: RSN: flushing PMKID list in the driver
nl80211: Flush PMKIDs
p2p-wlan5-0: State: DISCONNECTED -> INACTIVE
WPS: Set UUID for interface p2p-wlan5-0
WPS: UUID from the first interface - hexdump(len=16): 97 71 b0 a8 da ca 57 bf 99 80 01 b3 3f 50 26 de
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
Using existing control interface directory.
p2p-wlan5-0: Added interface p2p-wlan5-0
p2p-wlan5-0: State: INACTIVE -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
P2P: Start WPS Enrollee for peer 62:21:c0:99:08:b1
P2P: Start WPS Enrollee for SSID - hexdump_ascii(len=22):
44 49 52 45 43 54 2d 66 43 2d 41 6e 64 72 6f 69 DIRECT-fC-Androi
64 5f 61 37 63 61 d_a7ca
key_mgmt: 0x200
eap methods - hexdump(len=16): 2a 37 00 00 01 00 00 00 00 00 00 00 00 00 00 00
identity - hexdump_ascii(len=29):
57 46 41 2d 53 69 6d 70 6c 65 43 6f 6e 66 69 67 WFA-SimpleConfig
2d 45 6e 72 6f 6c 6c 65 65 2d 31 2d 30 -Enrollee-1-0
WPS: Use specific AP SSID - hexdump_ascii(len=22):
44 49 52 45 43 54 2d 66 43 2d 41 6e 64 72 6f 69 DIRECT-fC-Androi
64 5f 61 37 63 61 d_a7ca
phase1 - hexdump_ascii(len=24):
70 69 6e 3d 31 33 30 37 33 31 37 36 20 64 65 76 pin=13073176 dev
5f 70 77 5f 69 64 3d 30 _pw_id=0
p2p-wlan5-0: Setting scan request: 0 sec 0 usec
p2p-wlan5-0: State: DISCONNECTED -> SCANNING
P2P: Use specific SSID for scan during P2P group formation
p2p-wlan5-0: P2P: Scan only GO preferred frequency 5240 MHz
WPS: Building WPS IE for Probe Request
WPS: * Version (hardcoded 0x10)
WPS: * Request Type
WPS: * Config Methods (2108)
WPS: * UUID-E
WPS: * Primary Device Type
WPS: * RF Bands (3)
WPS: * Association State
WPS: * Configuration Error (0)
WPS: * Device Password ID (0)
WPS: * Manufacturer
WPS: * Model Name
WPS: * Model Number
WPS: * Device Name
WPS: * Version2 (0x20)
WPS: * Request to Enroll (1)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Listen Channel: Regulatory Class 81 Channel 1
p2p-wlan5-0: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=22):
44 49 52 45 43 54 2d 66 43 2d 41 6e 64 72 6f 69 DIRECT-fC-Androi
64 5f 61 37 63 61 d_a7ca
nl80211: Scan extra IEs - hexdump(len=144): dd 6c 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 01 10 08 00 02 21 08 10 47 00 10 97 71 b0 a8 da ca 57 bf 99 80 01 b3 3f 50 26 de 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 09 00 37 2a 00 01 20 03 01 01 dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 55 53 04 51 01
nl80211: Scan frequency 5240 MHz
nl80211: P2P probe - mask SuppRates
Scan requested (ret=0) - scan timeout 10 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
RTM_NEWLINK, IFLA_IFNAME: Interface 'p2p-wlan5-0' added
nl80211: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'p2p-wlan5-0' added
nl80211: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'p2p-wlan5-0' added
nl80211: if_removed already cleared - ignore event
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=1 freq=2412 channel_type=0 duration=0 cookie=0xffff88034c994400 (match))
wlan5: Event CANCEL_REMAIN_ON_CHANNEL (23) received
P2P: Cancel remain-on-channel callback (p2p_long_listen=0 ms pending_action_tx=(nil))
P2P: Driver ended Listen state (freq=2412)
nl80211: Event message available
p2p-wlan5-0: nl80211: Scan trigger
EAPOL: disable timer tick
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'p2p-wlan5-0' added
nl80211: if_removed already cleared - ignore event
nl80211: Event message available
p2p-wlan5-0: nl80211: New scan results available
p2p-wlan5-0: Event SCAN_RESULTS (3) received
nl80211: Received scan results (0 BSSes)
p2p-wlan5-0: WPS: Order scan results with WPS provisioning rules
p2p-wlan5-0: BSS: Start scan result update 1
BSS: last_scan_res_used=0/0 last_scan_full=0
p2p-wlan5-0: New scan results available
p2p-wlan5-0: No suitable network found
p2p-wlan5-0: Setting scan request: 0 sec 250000 usec
p2p-wlan5-0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
wlan5: Updating scan results from sibling
nl80211: Received scan results (0 BSSes)
wlan5: BSS: Start scan result update 1
BSS: last_scan_res_used=0/0 last_scan_full=0
wlan5: New scan results available
CTRL_IFACE monitor send - hexdump(len=46): 2f 74 6d 70 2f 73 61 6d 70 6c 65 5f 77 69 64 69 5f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74 2e 54 6b 4d 4e 5a 54 2f 73 6f 63 6b 65 74 00
wlan5: No suitable network found
wlan5: Short-circuit new scan request since there are no enabled networks
wlan5: State: DISCONNECTED -> INACTIVE
p2p-wlan5-0: P2P: Station mode scan operation not pending anymore (sta_scan_pending=0 p2p_cb_on_scan_complete=0)
P2P: Use specific SSID for scan during P2P group formation
p2p-wlan5-0: P2P: Scan only GO preferred frequency 5240 MHz
WPS: Building WPS IE for Probe Request
WPS: * Version (hardcoded 0x10)
WPS: * Request Type
WPS: * Config Methods (2108)
WPS: * UUID-E
WPS: * Primary Device Type
WPS: * RF Bands (3)
WPS: * Association State
WPS: * Configuration Error (0)
WPS: * Device Password ID (0)
WPS: * Manufacturer
WPS: * Model Name
WPS: * Model Number
WPS: * Device Name
WPS: * Version2 (0x20)
WPS: * Request to Enroll (1)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Listen Channel: Regulatory Class 81 Channel 1
p2p-wlan5-0: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=22):
44 49 52 45 43 54 2d 66 43 2d 41 6e 64 72 6f 69 DIRECT-fC-Androi
64 5f 61 37 63 61 d_a7ca
nl80211: Scan extra IEs - hexdump(len=144): dd 6c 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 01 10 08 00 02 21 08 10 47 00 10 97 71 b0 a8 da ca 57 bf 99 80 01 b3 3f 50 26 de 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 09 00 37 2a 00 01 20 03 01 01 dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 55 53 04 51 01
nl80211: Scan frequency 5240 MHz
nl80211: P2P probe - mask SuppRates
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
p2p-wlan5-0: nl80211: Scan trigger
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'p2p-wlan5-0' added
nl80211: if_removed already cleared - ignore event
nl80211: Event message available
p2p-wlan5-0: nl80211: New scan results available
p2p-wlan5-0: Event SCAN_RESULTS (3) received
nl80211: Received scan results (0 BSSes)
p2p-wlan5-0: WPS: Order scan results with WPS provisioning rules
p2p-wlan5-0: BSS: Start scan result update 2
BSS: last_scan_res_used=0/0 last_scan_full=0
p2p-wlan5-0: New scan results available
p2p-wlan5-0: No suitable network found
p2p-wlan5-0: Setting scan request: 0 sec 250000 usec
p2p-wlan5-0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
wlan5: Updating scan results from sibling
nl80211: Received scan results (0 BSSes)
wlan5: BSS: Start scan result update 2
BSS: last_scan_res_used=0/0 last_scan_full=0
wlan5: New scan results available
CTRL_IFACE monitor send - hexdump(len=46): 2f 74 6d 70 2f 73 61 6d 70 6c 65 5f 77 69 64 69 5f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74 2e 54 6b 4d 4e 5a 54 2f 73 6f 63 6b 65 74 00
wlan5: No suitable network found
wlan5: Short-circuit new scan request since there are no enabled networks
wlan5: State: INACTIVE -> INACTIVE
p2p-wlan5-0: P2P: Station mode scan operation not pending anymore (sta_scan_pending=0 p2p_cb_on_scan_complete=0)
P2P: Use specific SSID for scan during P2P group formation
p2p-wlan5-0: P2P: Scan only GO preferred frequency 5240 MHz
WPS: Building WPS IE for Probe Request
WPS: * Version (hardcoded 0x10)
WPS: * Request Type
WPS: * Config Methods (2108)
WPS: * UUID-E
WPS: * Primary Device Type
WPS: * RF Bands (3)
WPS: * Association State
WPS: * Configuration Error (0)
WPS: * Device Password ID (0)
WPS: * Manufacturer
WPS: * Model Name
WPS: * Model Number
WPS: * Device Name
WPS: * Version2 (0x20)
WPS: * Request to Enroll (1)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Listen Channel: Regulatory Class 81 Channel 1
p2p-wlan5-0: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=22):
44 49 52 45 43 54 2d 66 43 2d 41 6e 64 72 6f 69 DIRECT-fC-Androi
64 5f 61 37 63 61 d_a7ca
nl80211: Scan extra IEs - hexdump(len=144): dd 6c 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 01 10 08 00 02 21 08 10 47 00 10 97 71 b0 a8 da ca 57 bf 99 80 01 b3 3f 50 26 de 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 09 00 37 2a 00 01 20 03 01 01 dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 55 53 04 51 01
nl80211: Scan frequency 5240 MHz
nl80211: P2P probe - mask SuppRates
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
p2p-wlan5-0: nl80211: Scan trigger
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'p2p-wlan5-0' added
nl80211: if_removed already cleared - ignore event
nl80211: Event message available
p2p-wlan5-0: nl80211: New scan results available
p2p-wlan5-0: Event SCAN_RESULTS (3) received
nl80211: Received scan results (0 BSSes)
p2p-wlan5-0: WPS: Order scan results with WPS provisioning rules
p2p-wlan5-0: BSS: Start scan result update 3
BSS: last_scan_res_used=0/0 last_scan_full=0
p2p-wlan5-0: New scan results available
p2p-wlan5-0: No suitable network found
p2p-wlan5-0: Setting scan request: 0 sec 250000 usec
p2p-wlan5-0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
wlan5: Updating scan results from sibling
nl80211: Received scan results (0 BSSes)
wlan5: BSS: Start scan result update 3
BSS: last_scan_res_used=0/0 last_scan_full=0
wlan5: New scan results available
CTRL_IFACE monitor send - hexdump(len=46): 2f 74 6d 70 2f 73 61 6d 70 6c 65 5f 77 69 64 69 5f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74 2e 54 6b 4d 4e 5a 54 2f 73 6f 63 6b 65 74 00
wlan5: No suitable network found
wlan5: Short-circuit new scan request since there are no enabled networks
wlan5: State: INACTIVE -> INACTIVE
p2p-wlan5-0: P2P: Station mode scan operation not pending anymore (sta_scan_pending=0 p2p_cb_on_scan_complete=0)
P2P: Use specific SSID for scan during P2P group formation
p2p-wlan5-0: P2P: Scan only GO preferred frequency 5240 MHz
WPS: Building WPS IE for Probe Request
WPS: * Version (hardcoded 0x10)
WPS: * Request Type
WPS: * Config Methods (2108)
WPS: * UUID-E
WPS: * Primary Device Type
WPS: * RF Bands (3)
WPS: * Association State
WPS: * Configuration Error (0)
WPS: * Device Password ID (0)
WPS: * Manufacturer
WPS: * Model Name
WPS: * Model Number
WPS: * Device Name
WPS: * Version2 (0x20)
WPS: * Request to Enroll (1)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Listen Channel: Regulatory Class 81 Channel 1
p2p-wlan5-0: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=22):
44 49 52 45 43 54 2d 66 43 2d 41 6e 64 72 6f 69 DIRECT-fC-Androi
64 5f 61 37 63 61 d_a7ca
nl80211: Scan extra IEs - hexdump(len=144): dd 6c 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 01 10 08 00 02 21 08 10 47 00 10 97 71 b0 a8 da ca 57 bf 99 80 01 b3 3f 50 26 de 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 09 00 37 2a 00 01 20 03 01 01 dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 55 53 04 51 01
nl80211: Scan frequency 5240 MHz
nl80211: P2P probe - mask SuppRates
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
p2p-wlan5-0: nl80211: Scan trigger
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'p2p-wlan5-0' added
nl80211: if_removed already cleared - ignore event
nl80211: Event message available
p2p-wlan5-0: nl80211: New scan results available
p2p-wlan5-0: Event SCAN_RESULTS (3) received
nl80211: Received scan results (0 BSSes)
p2p-wlan5-0: WPS: Order scan results with WPS provisioning rules
p2p-wlan5-0: BSS: Start scan result update 4
BSS: last_scan_res_used=0/0 last_scan_full=0
p2p-wlan5-0: New scan results available
p2p-wlan5-0: No suitable network found
p2p-wlan5-0: Setting scan request: 0 sec 250000 usec
p2p-wlan5-0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
wlan5: Updating scan results from sibling
nl80211: Received scan results (0 BSSes)
wlan5: BSS: Start scan result update 4
BSS: last_scan_res_used=0/0 last_scan_full=0
wlan5: New scan results available
CTRL_IFACE monitor send - hexdump(len=46): 2f 74 6d 70 2f 73 61 6d 70 6c 65 5f 77 69 64 69 5f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74 2e 54 6b 4d 4e 5a 54 2f 73 6f 63 6b 65 74 00
wlan5: No suitable network found
wlan5: Short-circuit new scan request since there are no enabled networks
wlan5: State: INACTIVE -> INACTIVE
p2p-wlan5-0: P2P: Station mode scan operation not pending anymore (sta_scan_pending=0 p2p_cb_on_scan_complete=0)
P2P: Use specific SSID for scan during P2P group formation
p2p-wlan5-0: P2P: Scan only common channels
WPS: Building WPS IE for Probe Request
WPS: * Version (hardcoded 0x10)
WPS: * Request Type
WPS: * Config Methods (2108)
WPS: * UUID-E
WPS: * Primary Device Type
WPS: * RF Bands (3)
WPS: * Association State
WPS: * Configuration Error (0)
WPS: * Device Password ID (0)
WPS: * Manufacturer
WPS: * Model Name
WPS: * Model Number
WPS: * Device Name
WPS: * Version2 (0x20)
WPS: * Request to Enroll (1)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Listen Channel: Regulatory Class 81 Channel 1
p2p-wlan5-0: nl80211: scan request
nl80211: Scan SSID - hexdump_ascii(len=22):
44 49 52 45 43 54 2d 66 43 2d 41 6e 64 72 6f 69 DIRECT-fC-Androi
64 5f 61 37 63 61 d_a7ca
nl80211: Scan extra IEs - hexdump(len=144): dd 6c 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 01 10 08 00 02 21 08 10 47 00 10 97 71 b0 a8 da ca 57 bf 99 80 01 b3 3f 50 26 de 10 54 00 08 00 00 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 20 10 49 00 09 00 37 2a 00 01 20 03 01 01 dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 55 53 04 51 01
nl80211: Scan frequency 2412 MHz
nl80211: Scan frequency 2417 MHz
nl80211: Scan frequency 2422 MHz
nl80211: Scan frequency 2427 MHz
nl80211: Scan frequency 2432 MHz
nl80211: Scan frequency 2437 MHz
nl80211: Scan frequency 2442 MHz
nl80211: Scan frequency 2447 MHz
nl80211: Scan frequency 2452 MHz
nl80211: Scan frequency 2457 MHz
nl80211: Scan frequency 2462 MHz
nl80211: Scan frequency 2472 MHz
nl80211: P2P probe - mask SuppRates
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
p2p-wlan5-0: nl80211: Scan trigger
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'p2p-wlan5-0' added
nl80211: if_removed already cleared - ignore event
nl80211: Event message available
p2p-wlan5-0: nl80211: New scan results available
p2p-wlan5-0: Event SCAN_RESULTS (3) received
nl80211: Received scan results (1 BSSes)
p2p-wlan5-0: WPS: Order scan results with WPS provisioning rules
p2p-wlan5-0: BSS: Start scan result update 5
p2p-wlan5-0: BSS: Add new id 0 BSSID 62:21:c0:99:08:b1 SSID 'DIRECT-fC-Android_a7ca'
BSS: last_scan_res_used=1/32 last_scan_full=0
p2p-wlan5-0: New scan results available
WPS: AP 62:21:c0:99:08:b1 type 2 added
WPS: AP[0] 62:21:c0:99:08:b1 type=2 tries=0 last_attempt=-1 sec ago blacklist=0
p2p-wlan5-0: Selecting BSS from priority group 0
p2p-wlan5-0: 0: 62:21:c0:99:08:b1 ssid='DIRECT-fC-Android_a7ca' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-15 wps
selected based on WPS IE (Authorized MAC or Active PIN)
p2p-wlan5-0: selected BSS 62:21:c0:99:08:b1 ssid='DIRECT-fC-Android_a7ca'
p2p-wlan5-0: Considering connect request: reassociate: 1 selected: 62:21:c0:99:08:b1 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x1faae00 current_ssid=(nil)
p2p-wlan5-0: Request association with 62:21:c0:99:08:b1
p2p-wlan5-0: Automatic auth_alg selection: 0x1
WPS: Building WPS IE for (Re)Association Request
WPS: * Version (hardcoded 0x10)
WPS: * Request Type
WPS: * Version2 (0x20)
p2p-wlan5-0: WPA: clearing AP WPA IE
p2p-wlan5-0: WPA: clearing AP RSN IE
p2p-wlan5-0: WPA: clearing own WPA/RSN IE
P2P: * P2P IE header
P2P: * Capability dev=27 group=00
P2P: * Device Info
p2p-wlan5-0: Cancelling scan request
p2p-wlan5-0: P2P: Station mode scan operation not pending anymore (sta_scan_pending=0 p2p_cb_on_scan_complete=0)
p2p-wlan5-0: SME: Trying to authenticate with 62:21:c0:99:08:b1 (SSID='DIRECT-fC-Android_a7ca' freq=2412 MHz)
p2p-wlan5-0: No keys have been configured - skip key clearing
p2p-wlan5-0: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
nl80211: Set mode ifindex 6 iftype 8 (P2P_CLIENT)
nl80211: Subscribe to mgmt frames with non-AP handle 0x1fa8b10
nl80211: Register frame type=0xd0 nl_handle=0x1fa8b10
nl80211: Register frame match - hexdump(len=2): 04 0a
nl80211: Register frame type=0xd0 nl_handle=0x1fa8b10
nl80211: Register frame match - hexdump(len=2): 04 0b
nl80211: Register frame type=0xd0 nl_handle=0x1fa8b10
nl80211: Register frame match - hexdump(len=2): 04 0c
nl80211: Register frame type=0xd0 nl_handle=0x1fa8b10
nl80211: Register frame match - hexdump(len=2): 04 0d
nl80211: Register frame type=0xd0 nl_handle=0x1fa8b10
nl80211: Register frame match - hexdump(len=6): 04 09 50 6f 9a 09
nl80211: Register frame type=0xd0 nl_handle=0x1fa8b10
nl80211: Register frame match - hexdump(len=5): 7f 50 6f 9a 09
nl80211: Register frame type=0xd0 nl_handle=0x1fa8b10
nl80211: Register frame match - hexdump(len=1): 06
nl80211: Register frame type=0xd0 nl_handle=0x1fa8b10
nl80211: Register frame match - hexdump(len=2): 0a 07
nl80211: Register frame type=0xd0 nl_handle=0x1fa8b10
nl80211: Register frame match - hexdump(len=2): 0a 11
nl80211: Authenticate (ifindex=6)
* bssid=62:21:c0:99:08:b1
* freq=2412
* SSID - hexdump_ascii(len=22):
44 49 52 45 43 54 2d 66 43 2d 41 6e 64 72 6f 69 DIRECT-fC-Androi
64 5f 61 37 63 61 d_a7ca
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
RSN: Ignored PMKID candidate without preauth flag
nl80211: Event message available
nl80211: New station 62:21:c0:99:08:b1
nl80211: Event message available
nl80211: MLME event 37 on p2p-wlan5-0(02:0b:6b:7f:92:56) A1=02:0b:6b:7f:92:56 A2=62:21:c0:99:08:b1
nl80211: MLME event frame - hexdump(len=41): b0 00 3c 00 02 0b 6b 7f 92 56 62 21 c0 99 08 b1 62 21 c0 99 08 b1 20 02 00 00 02 00 00 00 dd 09 00 10 18 02 00 00 0c 00 00
nl80211: Authenticate event
p2p-wlan5-0: Event AUTH (11) received
p2p-wlan5-0: SME: Authentication response: peer=62:21:c0:99:08:b1 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 00 00 0c 00 00
p2p-wlan5-0: Trying to associate with 62:21:c0:99:08:b1 (SSID='DIRECT-fC-Android_a7ca' freq=2412 MHz)
p2p-wlan5-0: State: AUTHENTICATING -> ASSOCIATING
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
p2p-wlan5-0: WPA: clearing own WPA/RSN IE
nl80211: Associate (ifindex=6)
* bssid=62:21:c0:99:08:b1
* freq=2412
* SSID - hexdump_ascii(len=22):
44 49 52 45 43 54 2d 66 43 2d 41 6e 64 72 6f 69 DIRECT-fC-Androi
64 5f 61 37 63 61 d_a7ca
* IEs - hexdump(len=84): dd 18 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 01 10 49 00 06 00 37 2a 00 01 20 dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00 dd 29 50 6f 9a 09 02 02 00 27 00 0d 1d 00 00 0b 6b 7f 92 56 01 08 00 01 00 50 f2 04 00 01 00 10 11 00 08 6b 65 76 69 6e 2d 70 63
* P2P group
nl80211: Association request send successfully
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'p2p-wlan5-0' added
nl80211: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'p2p-wlan5-0' added
nl80211: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'p2p-wlan5-0' added
nl80211: if_removed already cleared - ignore event
nl80211: Event message available
nl80211: MLME event 38 on p2p-wlan5-0(02:0b:6b:7f:92:56) A1=02:0b:6b:7f:92:56 A2=62:21:c0:99:08:b1
nl80211: MLME event frame - hexdump(len=176): 10 00 3c 00 02 0b 6b 7f 92 56 62 21 c0 99 08 b1 62 21 c0 99 08 b1 30 02 31 04 00 00 01 c0 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 0d 50 6f 9a 0a 00 00 06 01 10 c0 00 00 28 dd 18 00 50 f2 04 10 4a 00 01 10 10 3b 00 01 03 10 49 00 06 00 37 2a 00 01 20 dd 09 00 10 18 02 00 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 64 00 00 27 a4 00 00 41 43 5e 00 61 32 2f 00 dd 04 50 6f 9a 09
nl80211: Associate event
p2p-wlan5-0: Event ASSOC (0) received
p2p-wlan5-0: Association info event
resp_ies - hexdump(len=146): 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 0d 50 6f 9a 0a 00 00 06 01 10 c0 00 00 28 dd 18 00 50 f2 04 10 4a 00 01 10 10 3b 00 01 03 10 49 00 06 00 37 2a 00 01 20 dd 09 00 10 18 02 00 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 64 00 00 27 a4 00 00 41 43 5e 00 61 32 2f 00 dd 04 50 6f 9a 09
p2p-wlan5-0: freq=2412 MHz
p2p-wlan5-0: State: ASSOCIATING -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
p2p-wlan5-0: Associated to a new BSS: BSSID=62:21:c0:99:08:b1
p2p-wlan5-0: No keys have been configured - skip key clearing
p2p-wlan5-0: Associated with 62:21:c0:99:08:b1
p2p-wlan5-0: WPA: Association event - clear replay counter
p2p-wlan5-0: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 62:21:c0:99:08:b1
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 62:21:c0:99:08:b1
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
p2p-wlan5-0: Setting authentication timeout: 10 sec 0 usec
p2p-wlan5-0: Cancelling scan request
p2p-wlan5-0: P2P: Station mode scan operation not pending anymore (sta_scan_pending=0 p2p_cb_on_scan_complete=0)
nl80211: Event message available
nl80211: Ignore connect event (cmd=46) when using userspace SME
nl80211: Event message available
nl80211: Regulatory domain change
p2p-wlan5-0: Event CHANNEL_LIST_CHANGED (31) received
nl80211: Regulatory information - country=GB
nl80211: 2402-2482 @ 40 MHz
nl80211: 5170-5250 @ 40 MHz
nl80211: 5250-5330 @ 40 MHz
nl80211: 5490-5710 @ 40 MHz
nl80211: Added 802.11b mode based on 802.11g information
P2P: Add operating class 81
P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
P2P: Update channel list
p2p-wlan5-0: RX EAPOL from 62:21:c0:99:08:b1
RX EAPOL - hexdump(len=9): 02 00 00 05 01 92 00 05 01
p2p-wlan5-0: Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=146 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
p2p-wlan5-0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: Status notification: started (param=)
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using real identity - hexdump_ascii(len=29):
57 46 41 2d 53 69 6d 70 6c 65 43 6f 6e 66 69 67 WFA-SimpleConfig
2d 45 6e 72 6f 6c 6c 65 65 2d 31 2d 30 -Enrollee-1-0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=62:21:c0:99:08:b1
TX EAPOL - hexdump(len=38): 01 00 00 22 02 92 00 22 01 57 46 41 2d 53 69 6d 70 6c 65 43 6f 6e 66 69 67 2d 45 6e 72 6f 6c 6c 65 65 2d 31 2d 30
EAPOL: SUPP_BE entering state RECEIVE
p2p-wlan5-0: RX EAPOL from 62:21:c0:99:08:b1
RX EAPOL - hexdump(len=18): 02 00 00 0e 01 93 00 0e fe 00 37 2a 00 00 00 01 01 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=147 method=254 vendor=14122 vendorMethod=1
EAP: EAP entering state GET_METHOD
p2p-wlan5-0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=14122 method=1
EAP: Status notification: accept proposed method (param=WSC)
EAP: Initialize selected EAP method: vendor 14122 method 1 (WSC)
WPS: AP PIN dev_password - hexdump(len=8): [REMOVED]
EAP-WSC: Fragment size limit 1398
p2p-wlan5-0: CTRL-EVENT-EAP-METHOD EAP vendor 14122 method 1 (WSC) selected
EAP: EAP entering state METHOD
EAP-WSC: Received packet: Op-Code 1 Flags 0x0 Message Length 0
EAP-WSC: Received start
EAP-WSC: WAIT_START -> MESG
Get randomness: len=16 entropy=2
WPS: Enrollee Nonce - hexdump(len=16): 6b 64 05 a1 88 05 17 2b 67 cc 78 5a af fe 74 35
WPS: Building Message M1
WPS: * Version (hardcoded 0x10)
WPS: * Message Type (4)
WPS: * UUID-E
WPS: * MAC Address (02:0b:6b:7f:92:56)
WPS: * Enrollee Nonce
WPS: * Public Key
WPS: Generate new DH keys
WPS: DH Private Key - hexdump(len=192): [REMOVED]
WPS: DH own Public Key - hexdump(len=192): 8f c7 40 08 e9 70 3d cf 8e 1b 02 f9 38 1b 30 bf a7 b8 20 9e 45 09 62 b0 87 9b e0 10 5d 3f 92 e0 f1 c8 e5 7d b1 1d f6 5c 93 14 32 f7 72 59 54 af ba e7 39 4a 67 cd 95 df 46 e0 42 f1 cf d5 b5 76 c4 d9 63 f0 8e 1a 61 fa 63 0d 98 1f 29 91 7c 38 1a 36 87 8d 79 b3 9d 80 ee 45 5b e0 25 be 79 3f 29 9a 7d e3 69 52 bf cf 32 52 4f 58 22 ba 5c e0 69 eb 5a 3a f6 50 c1 1e 16 32 68 5c a6 a3 6b 31 14 87 d3 02 36 dc 81 d7 7b b1 a0 e5 60 82 86 ff 6f 5c e0 0c bf 71 9c 6f d5 b7 2f 85 0b 11 78 39 ba b1 65 9c 81 78 bc f6 5e 47 f7 5f 7f 26 bd db d9 7d fa 13 7f e0 9f 03 d1 e8 b3 56 b6 7f 76 51
WPS: * Authentication Type Flags
WPS: * Encryption Type Flags
WPS: * Connection Type Flags
WPS: * Config Methods (2108)
WPS: * Wi-Fi Protected Setup State (1)
WPS: * Manufacturer
WPS: * Model Name
WPS: * Model Number
WPS: * Serial Number
WPS: * Primary Device Type
WPS: * Device Name
WPS: * RF Bands (3)
WPS: * Association State
WPS: * Device Password ID (0)
WPS: * Configuration Error (0)
WPS: * OS Version
WPS: * Version2 (0x20)
EAP-WSC: MESG -> MESG
EAP-WSC: Generating Response
EAP-WSC: Sending out 362 bytes (message sent completely)
EAP-WSC: MESG -> MESG
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=62:21:c0:99:08:b1
TX EAPOL - hexdump(len=380): 01 00 01 78 02 93 01 78 fe 00 37 2a 00 00 00 01 04 00 10 4a 00 01 10 10 22 00 01 04 10 47 00 10 97 71 b0 a8 da ca 57 bf 99 80 01 b3 3f 50 26 de 10 20 00 06 02 0b 6b 7f 92 56 10 1a 00 10 6b 64 05 a1 88 05 17 2b 67 cc 78 5a af fe 74 35 10 32 00 c0 8f c7 40 08 e9 70 3d cf 8e 1b 02 f9 38 1b 30 bf a7 b8 20 9e 45 09 62 b0 87 9b e0 10 5d 3f 92 e0 f1 c8 e5 7d b1 1d f6 5c 93 14 32 f7 72 59 54 af ba e7 39 4a 67 cd 95 df 46 e0 42 f1 cf d5 b5 76 c4 d9 63 f0 8e 1a 61 fa 63 0d 98 1f 29 91 7c 38 1a 36 87 8d 79 b3 9d 80 ee 45 5b e0 25 be 79 3f 29 9a 7d e3 69 52 bf cf 32 52 4f 58 22 ba 5c e0 69 eb 5a 3a f6 50 c1 1e 16 32 68 5c a6 a3 6b 31 14 87 d3 02 36 dc 81 d7 7b b1 a0 e5 60 82 86 ff 6f 5c e0 0c bf 71 9c 6f d5 b7 2f 85 0b 11 78 39 ba b1 65 9c 81 78 bc f6 5e 47 f7 5f 7f 26 bd db d9 7d fa 13 7f e0 9f 03 d1 e8 b3 56 b6 7f 76 51 10 04 00 02 00 3b 10 10 00 02 00 0d 10 0d 00 01 01 10 08 00 02 21 08 10 44 00 01 01 10 21 00 01 20 10 23 00 01 20 10 24 00 01 20 10 42 00 01 20 10 54 00 08 00 00 00 00 00 00 00 00 10 11 00 01 20 10 3c 00 01 03 10 02 00 02 00 00 10 12 00 02 00 00 10 09 00 02 00 00 10 2d 00 04 80 00 00 00 10 49 00 06 00 37 2a 00 01 20
EAPOL: SUPP_BE entering state RECEIVE
p2p-wlan5-0: RX EAPOL from 62:21:c0:99:08:b1
RX EAPOL - hexdump(len=449): 02 00 01 bd 01 94 01 bd fe 00 37 2a 00 00 00 01 04 00 10 4a 00 01 10 10 22 00 01 05 10 1a 00 10 6b 64 05 a1 88 05 17 2b 67 cc 78 5a af fe 74 35 10 39 00 10 e9 f3 fd c8 b8 99 de 1c 76 ea ea e8 27 15 bb 53 10 48 00 10 34 e6 cb 58 77 e0 5f db 94 f5 e0 e3 4d 80 d0 f9 10 32 00 c0 30 6c e3 31 25 66 a5 30 a4 45 c0 2f d9 36 c0 9a f9 55 c6 ed ad a9 c7 a2 e8 28 f6 06 a3 1d 13 e0 1e 3c 8d 3c 65 05 35 f7 0f 0f 1d 24 b9 9f 1b 6e d5 a3 56 85 1e 5d ad c0 16 cc cb 39 39 54 d9 3e 40 21 e8 e2 c2 a5 46 24 c2 db 3a b2 66 8b ef 7d 97 fb 31 2b 05 e3 15 0f 2a b8 cc b5 02 af 35 06 74 f0 a5 ac 23 3a 05 8b b6 33 51 9d 84 da 1f db 53 e0 bf 0a 84 d8 ef 0a 46 0c 79 49 6c 12 c8 99 ed 94 cc 75 15 f5 af ab 80 1c e8 b9 38 ec 11 03 47 84 4e 18 f1 6a d2 93 a5 ea 6d 31 18 d1 71 79 51 2e 86 41 5e 9f fe 7e a0 0e f7 8d dc 86 47 52 f8 ca a9 ce 42 ec f3 b7 97 ac 00 87 ed 41 e5 1a 10 04 00 02 00 3b 10 10 00 02 00 0d 10 0d 00 01 01 10 08 00 02 43 88 10 21 00 13 53 41 4d 53 55 4e 47 5f 45 4c 45 43 54 52 4f 4e 49 43 53 10 23 00 0e 53 41 4d 53 55 4e 47 5f 4d 4f 42 49 4c 45 10 24 00 04 32 30 31 32 10 42 00 08 31 39 36 39 31 31 30 31 10 54 00 08 00 0a 00 50 f2 04 00 05 10 11 00 0c 41 6e 64 72 6f 69 64 5f 61 37 63 61 10 3c 00 01 01 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 2d 00 04 80 00 00 00 10 49 00 06 00 37 2a 00 01 20 10 05 00 08 96 f9 19 ca 99 f3 a6 20
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=148 method=254 vendor=14122 vendorMethod=1
EAP: EAP entering state METHOD
EAP-WSC: Received packet: Op-Code 4 Flags 0x0 Message Length 0
WPS: Processing received message (len=431 op_code=4)
WPS: Received WSC_MSG
WPS: Received M2
WPS: Registrar Nonce - hexdump(len=16): e9 f3 fd c8 b8 99 de 1c 76 ea ea e8 27 15 bb 53
WPS: UUID-R - hexdump(len=16): 34 e6 cb 58 77 e0 5f db 94 f5 e0 e3 4d 80 d0 f9
WPS: Device Password ID 0
WPS: DH Private Key - hexdump(len=192): [REMOVED]
WPS: DH peer Public Key - hexdump(len=192): 30 6c e3 31 25 66 a5 30 a4 45 c0 2f d9 36 c0 9a f9 55 c6 ed ad a9 c7 a2 e8 28 f6 06 a3 1d 13 e0 1e 3c 8d 3c 65 05 35 f7 0f 0f 1d 24 b9 9f 1b 6e d5 a3 56 85 1e 5d ad c0 16 cc cb 39 39 54 d9 3e 40 21 e8 e2 c2 a5 46 24 c2 db 3a b2 66 8b ef 7d 97 fb 31 2b 05 e3 15 0f 2a b8 cc b5 02 af 35 06 74 f0 a5 ac 23 3a 05 8b b6 33 51 9d 84 da 1f db 53 e0 bf 0a 84 d8 ef 0a 46 0c 79 49 6c 12 c8 99 ed 94 cc 75 15 f5 af ab 80 1c e8 b9 38 ec 11 03 47 84 4e 18 f1 6a d2 93 a5 ea 6d 31 18 d1 71 79 51 2e 86 41 5e 9f fe 7e a0 0e f7 8d dc 86 47 52 f8 ca a9 ce 42 ec f3 b7 97 ac 00 87 ed 41 e5 1a
WPS: DH shared key - hexdump(len=192): [REMOVED]
WPS: DHKey - hexdump(len=32): [REMOVED]
WPS: KDK - hexdump(len=32): [REMOVED]
WPS: AuthKey - hexdump(len=32): [REMOVED]
WPS: KeyWrapKey - hexdump(len=16): [REMOVED]
WPS: EMSK - hexdump(len=32): [REMOVED]
WPS: Manufacturer - hexdump_ascii(len=19):
53 41 4d 53 55 4e 47 5f 45 4c 45 43 54 52 4f 4e SAMSUNG_ELECTRON
49 43 53 ICS
WPS: Model Name - hexdump_ascii(len=14):
53 41 4d 53 55 4e 47 5f 4d 4f 42 49 4c 45 SAMSUNG_MOBILE
WPS: Model Number - hexdump_ascii(len=4):
32 30 31 32 2012
WPS: Serial Number - hexdump_ascii(len=8):
31 39 36 39 31 31 30 31 19691101
WPS: Primary Device Type: 10-0050F204-5
WPS: Device Name - hexdump_ascii(len=12):
41 6e 64 72 6f 69 64 5f 61 37 63 61 Android_a7ca
EAP-WSC: MESG -> MESG
WPS: Building Message M3
WPS: Device Password - hexdump_ascii(len=8): [REMOVED]
WPS: PSK1 - hexdump(len=16): [REMOVED]
WPS: PSK2 - hexdump(len=16): [REMOVED]
WPS: * Version (hardcoded 0x10)
WPS: * Message Type (7)
WPS: * Registrar Nonce
Get randomness: len=32 entropy=0
WPS: E-S1 - hexdump(len=16): bd 18 5c c7 2d 64 47 6d 90 8f bd e9 b4 bf 28 4e
WPS: E-S2 - hexdump(len=16): c6 27 07 a1 37 36 e5 9f f2 cc 7b 0a df 57 26 fe
WPS: * E-Hash1
WPS: E-Hash1 - hexdump(len=32): 18 88 99 1d 8b 22 74 ec 27 6a c0 05 2c bc 7e 1d 11 89 69 35 fc 52 8e 2b af 56 79 4f e0 8b 23 0e
WPS: * E-Hash2
WPS: E-Hash2 - hexdump(len=32): 70 1b d8 e9 bb 0e 43 f4 bd 00 c3 62 ee e7 d2 41 ff 1a e7 55 09 29 04 61 8f 2c 82 16 a1 15 e1 ed
WPS: * Version2 (0x20)
WPS: * Authenticator
EAP-WSC: MESG -> MESG
EAP-WSC: Generating Response
EAP-WSC: Sending out 124 bytes (message sent completely)
EAP-WSC: MESG -> MESG
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=62:21:c0:99:08:b1
TX EAPOL - hexdump(len=142): 01 00 00 8a 02 94 00 8a fe 00 37 2a 00 00 00 01 04 00 10 4a 00 01 10 10 22 00 01 07 10 39 00 10 e9 f3 fd c8 b8 99 de 1c 76 ea ea e8 27 15 bb 53 10 14 00 20 18 88 99 1d 8b 22 74 ec 27 6a c0 05 2c bc 7e 1d 11 89 69 35 fc 52 8e 2b af 56 79 4f e0 8b 23 0e 10 15 00 20 70 1b d8 e9 bb 0e 43 f4 bd 00 c3 62 ee e7 d2 41 ff 1a e7 55 09 29 04 61 8f 2c 82 16 a1 15 e1 ed 10 49 00 06 00 37 2a 00 01 20 10 05 00 08 8d 96 38 38 61 9e 7f 10
EAPOL: SUPP_BE entering state RECEIVE
p2p-wlan5-0: RX EAPOL from 62:21:c0:99:08:b1
RX EAPOL - hexdump(len=210): 02 00 00 ce 01 95 00 ce fe 00 37 2a 00 00 00 01 04 00 10 4a 00 01 10 10 22 00 01 08 10 1a 00 10 6b 64 05 a1 88 05 17 2b 67 cc 78 5a af fe 74 35 10 3d 00 20 d7 56 31 67 ab 08 b7 77 bb bc 28 e6 da 61 01 2f 68 97 3f d0 d5 c2 4d 53 29 59 71 e5 62 15 33 43 10 3e 00 20 7c 81 8f c4 43 a6 e1 d1 99 47 6f 7b a7 d9 29 bf a1 89 0f 4c da 25 c6 a3 38 80 71 78 b0 3c 90 dd 10 18 00 40 97 26 c5 19 d8 5e cb dd 0e 5d 33 55 dc 44 32 0f cf 08 c6 e6 82 5b 0d a1 39 9d f0 33 76 01 fe 47 61 17 83 ab 18 c0 b9 64 8e f9 b1 bf d4 52 65 3a 90 62 fe 7d cf e9 f2 e2 a8 56 c6 1a 02 3f 68 b2 10 49 00 06 00 37 2a 00 01 20 10 05 00 08 11 5f 94 9d 1e 3c 6a d6
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=149 method=254 vendor=14122 vendorMethod=1
EAP: EAP entering state METHOD
EAP-WSC: Received packet: Op-Code 4 Flags 0x0 Message Length 0
WPS: Processing received message (len=192 op_code=4)
WPS: Received WSC_MSG
WPS: Received M4
WPS: R-Hash1 - hexdump(len=32): d7 56 31 67 ab 08 b7 77 bb bc 28 e6 da 61 01 2f 68 97 3f d0 d5 c2 4d 53 29 59 71 e5 62 15 33 43
WPS: R-Hash2 - hexdump(len=32): 7c 81 8f c4 43 a6 e1 d1 99 47 6f 7b a7 d9 29 bf a1 89 0f 4c da 25 c6 a3 38 80 71 78 b0 3c 90 dd
WPS: Encrypted Settings - hexdump(len=64): 97 26 c5 19 d8 5e cb dd 0e 5d 33 55 dc 44 32 0f cf 08 c6 e6 82 5b 0d a1 39 9d f0 33 76 01 fe 47 61 17 83 ab 18 c0 b9 64 8e f9 b1 bf d4 52 65 3a 90 62 fe 7d cf e9 f2 e2 a8 56 c6 1a 02 3f 68 b2
WPS: Decrypted Encrypted Settings - hexdump(len=48): [REMOVED]
WPS: Processing decrypted Encrypted Settings attribute
WPS: R-SNonce1 - hexdump(len=16): [REMOVED]
WPS: Registrar proved knowledge of the first half of the device password
EAP-WSC: MESG -> MESG
WPS: Building Message M5
WPS: * Version (hardcoded 0x10)
WPS: * Message Type (9)
WPS: * Registrar Nonce
WPS: * E-SNonce1
WPS: * Key Wrap Authenticator
WPS: * Encrypted Settings
Get randomness: len=16 entropy=0
WPS: * Version2 (0x20)
WPS: * Authenticator
EAP-WSC: MESG -> MESG
EAP-WSC: Generating Response
EAP-WSC: Sending out 120 bytes (message sent completely)
EAP-WSC: MESG -> MESG
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=62:21:c0:99:08:b1
TX EAPOL - hexdump(len=138): 01 00 00 86 02 95 00 86 fe 00 37 2a 00 00 00 01 04 00 10 4a 00 01 10 10 22 00 01 09 10 39 00 10 e9 f3 fd c8 b8 99 de 1c 76 ea ea e8 27 15 bb 53 10 18 00 40 64 22 bd af 84 52 47 21 c0 38 36 fe 43 e8 27 83 98 e3 15 db 88 bf 54 b5 63 4b 68 1d 51 78 09 7b 81 73 ed dc 15 74 36 ed e8 57 a7 ef be 0a 26 e9 d9 56 a8 6c 7d 47 24 fe a9 36 f4 0f 9f ab be e0 10 49 00 06 00 37 2a 00 01 20 10 05 00 08 c3 ab cb 02 d7 40 8c eb
EAPOL: SUPP_BE entering state RECEIVE
p2p-wlan5-0: RX EAPOL from 62:21:c0:99:08:b1
RX EAPOL - hexdump(len=138): 02 00 00 86 01 96 00 86 fe 00 37 2a 00 00 00 01 04 00 10 4a 00 01 10 10 22 00 01 0a 10 1a 00 10 6b 64 05 a1 88 05 17 2b 67 cc 78 5a af fe 74 35 10 18 00 40 f7 3d 7f 8e 5f 1b 2a b9 72 a4 65 fb a1 1c b7 da df e1 c4 30 63 11 00 e0 7f 53 f8 d1 8e 62 ed a0 b0 c4 07 3f e1 af f0 6a b3 b4 75 17 1b 86 d9 d2 de 73 cd 4b 1e 6f 20 1e 68 ec cc 17 65 fe aa 45 10 49 00 06 00 37 2a 00 01 20 10 05 00 08 4a e4 59 eb 4a 7d 1f 67
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=150 method=254 vendor=14122 vendorMethod=1
EAP: EAP entering state METHOD
EAP-WSC: Received packet: Op-Code 4 Flags 0x0 Message Length 0
WPS: Processing received message (len=120 op_code=4)
WPS: Received WSC_MSG
WPS: Received M6
WPS: Encrypted Settings - hexdump(len=64): f7 3d 7f 8e 5f 1b 2a b9 72 a4 65 fb a1 1c b7 da df e1 c4 30 63 11 00 e0 7f 53 f8 d1 8e 62 ed a0 b0 c4 07 3f e1 af f0 6a b3 b4 75 17 1b 86 d9 d2 de 73 cd 4b 1e 6f 20 1e 68 ec cc 17 65 fe aa 45
WPS: Decrypted Encrypted Settings - hexdump(len=48): [REMOVED]
WPS: Processing decrypted Encrypted Settings attribute
WPS: R-SNonce2 - hexdump(len=16): [REMOVED]
WPS: Registrar proved knowledge of the second half of the device password
EAP-WSC: MESG -> MESG
WPS: Building Message M7
WPS: * Version (hardcoded 0x10)
WPS: * Message Type (11)
WPS: * Registrar Nonce
WPS: * E-SNonce2
WPS: * Key Wrap Authenticator
WPS: * Encrypted Settings
Get randomness: len=16 entropy=0
WPS: * Version2 (0x20)
WPS: * Authenticator
EAP-WSC: MESG -> MESG
EAP-WSC: Generating Response
EAP-WSC: Sending out 120 bytes (message sent completely)
EAP-WSC: MESG -> MESG
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=62:21:c0:99:08:b1
TX EAPOL - hexdump(len=138): 01 00 00 86 02 96 00 86 fe 00 37 2a 00 00 00 01 04 00 10 4a 00 01 10 10 22 00 01 0b 10 39 00 10 e9 f3 fd c8 b8 99 de 1c 76 ea ea e8 27 15 bb 53 10 18 00 40 7e d2 df e4 7d 47 52 62 85 dd 4e ab 0a 21 8f 92 dc f5 87 a2 fa af 61 02 5d 47 cf 66 a2 25 b4 29 17 31 6a 53 6a 25 39 63 c9 a8 40 5e c8 f8 eb 1d ce 56 53 eb 23 d9 95 a1 b1 f9 93 4c 98 9e 8a 50 10 49 00 06 00 37 2a 00 01 20 10 05 00 08 29 df 12 6c 49 87 fd b9
EAPOL: SUPP_BE entering state RECEIVE
p2p-wlan5-0: RX EAPOL from 62:21:c0:99:08:b1
RX EAPOL - hexdump(len=234): 02 00 00 e6 01 97 00 e6 fe 00 37 2a 00 00 00 01 04 00 10 4a 00 01 10 10 22 00 01 0c 10 1a 00 10 6b 64 05 a1 88 05 17 2b 67 cc 78 5a af fe 74 35 10 18 00 a0 8b 5a 41 70 40 1f d6 75 50 53 da 6e ce 4f c3 d6 a6 ea 90 75 b1 0c 03 ba 81 8e e2 22 80 f5 37 1c a0 7d 5c fd e8 a1 f6 93 74 3f b8 44 75 b7 07 a9 3b 0b 35 96 95 48 61 2b 4f 67 2d 16 01 a6 3c c0 e2 63 8f ce e2 97 a0 ff d4 f0 bc af 90 f3 0b a6 31 ba 14 5a 2a 86 b2 cd 86 dc de 7c 9e 7c e2 f9 04 81 fc 12 af f7 8d 0a b7 36 5f 33 35 2a 8e 05 4e 2b 68 4a be de ca ff ed 36 33 91 67 27 35 dc 38 6a e1 3c 80 44 45 40 c6 6a 8d 6e fe e9 ee 5c 62 79 b0 44 e1 34 74 66 dd 42 07 45 80 87 f0 b3 10 49 00 06 00 37 2a 00 01 20 10 05 00 08 7f 2f d1 2d 0d b8 2a 71
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=151 method=254 vendor=14122 vendorMethod=1
EAP: EAP entering state METHOD
EAP-WSC: Received packet: Op-Code 4 Flags 0x0 Message Length 0
WPS: Processing received message (len=216 op_code=4)
WPS: Received WSC_MSG
WPS: Received M8
WPS: Encrypted Settings - hexdump(len=160): 8b 5a 41 70 40 1f d6 75 50 53 da 6e ce 4f c3 d6 a6 ea 90 75 b1 0c 03 ba 81 8e e2 22 80 f5 37 1c a0 7d 5c fd e8 a1 f6 93 74 3f b8 44 75 b7 07 a9 3b 0b 35 96 95 48 61 2b 4f 67 2d 16 01 a6 3c c0 e2 63 8f ce e2 97 a0 ff d4 f0 bc af 90 f3 0b a6 31 ba 14 5a 2a 86 b2 cd 86 dc de 7c 9e 7c e2 f9 04 81 fc 12 af f7 8d 0a b7 36 5f 33 35 2a 8e 05 4e 2b 68 4a be de ca ff ed 36 33 91 67 27 35 dc 38 6a e1 3c 80 44 45 40 c6 6a 8d 6e fe e9 ee 5c 62 79 b0 44 e1 34 74 66 dd 42 07 45 80 87 f0 b3
WPS: Decrypted Encrypted Settings - hexdump(len=144): [REMOVED]
WPS: Processing decrypted Encrypted Settings attribute
WPS: Received Credential
WPS: Process Credential
WPS: Network Index: 1
WPS: SSID - hexdump_ascii(len=22):
44 49 52 45 43 54 2d 66 43 2d 41 6e 64 72 6f 69 DIRECT-fC-Androi
64 5f 61 37 63 61 d_a7ca
WPS: Authentication Type: 0x20
WPS: Encryption Type: 0x8
WPS: Network Key - hexdump(len=64): [REMOVED]
WPS: MAC Address 02:0b:6b:7f:92:56
p2p-wlan5-0: WPS-CRED-RECEIVED
WPS: Received Credential attribute - hexdump(len=125): [REMOVED]
WPS: SSID - hexdump_ascii(len=22):
44 49 52 45 43 54 2d 66 43 2d 41 6e 64 72 6f 69 DIRECT-fC-Androi
64 5f 61 37 63 61 d_a7ca
WPS: Authentication Type 0x20
WPS: Encryption Type 0x8
WPS: Network Key Index 0
WPS: Network Key - hexdump(len=64): [REMOVED]
WPS: MAC Address 02:0b:6b:7f:92:56
WPS: Replace WPS network block based on the received credential
WPS: The AP was not found from BSS table - use credential as-is
EAP-WSC: MESG -> MESG
WPS: Building Message WSC_Done
WPS: * Version (hardcoded 0x10)
WPS: * Message Type (15)
WPS: * Enrollee Nonce
WPS: * Registrar Nonce
WPS: * Version2 (0x20)
p2p-wlan5-0: WPS-SUCCESS
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 21 Group Capability 49
P2P: Attribute 13 length 33
P2P: * Device Info: addr 62:21:c0:99:88:b1 primary device type 10-0050F204-5 device name 'Android_a7ca' config methods 0x188
P2P: Attribute 14 length 0
P2P: * Group Info
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 21 Group Capability 49
P2P: Attribute 13 length 33
P2P: * Device Info: addr 62:21:c0:99:88:b1 primary device type 10-0050F204-5 device name 'Android_a7ca' config methods 0x188
P2P: Attribute 14 length 0
P2P: * Group Info
P2P: Checking whether group is persistent: group_capab=0x49
P2P: GO Device Address 62:21:c0:99:88:b1
P2P: BSS 62:21:c0:99:08:b1 group_capab=0x49 go_dev_addr=62:21:c0:99:88:b1
P2P: Group Formation completed successfully with 62:21:c0:99:08:b1
P2P: Clear timeout (state=PROVISIONING)
P2P: State PROVISIONING -> IDLE
P2P-GROUP-FORMATION-SUCCESS
CTRL_IFACE monitor send - hexdump(len=46): 2f 74 6d 70 2f 73 61 6d 70 6c 65 5f 77 69 64 69 5f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74 2e 54 6b 4d 4e 5a 54 2f 73 6f 63 6b 65 74 00
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 21 Group Capability 49
P2P: Attribute 13 length 33
P2P: * Device Info: addr 62:21:c0:99:88:b1 primary device type 10-0050F204-5 device name 'Android_a7ca' config methods 0x188
P2P: Attribute 14 length 0
P2P: * Group Info
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 21 Group Capability 49
P2P: Attribute 13 length 33
P2P: * Device Info: addr 62:21:c0:99:88:b1 primary device type 10-0050F204-5 device name 'Android_a7ca' config methods 0x188
P2P: Attribute 14 length 0
P2P: * Group Info
P2P: Checking whether group is persistent: group_capab=0x49
P2P: GO Device Address 62:21:c0:99:88:b1
P2P: BSS 62:21:c0:99:08:b1 group_capab=0x49 go_dev_addr=62:21:c0:99:88:b1
EAP-WSC: MESG -> MESG
EAP-WSC: Generating Response
EAP-WSC: Sending out 60 bytes (message sent completely)
EAP-WSC: MESG -> FAIL
EAP: method process -> ignore=FALSE methodState=DONE decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=62:21:c0:99:08:b1
TX EAPOL - hexdump(len=78): 01 00 00 4a 02 97 00 4a fe 00 37 2a 00 00 00 01 05 00 10 4a 00 01 10 10 22 00 01 0f 10 1a 00 10 6b 64 05 a1 88 05 17 2b 67 cc 78 5a af fe 74 35 10 39 00 10 e9 f3 fd c8 b8 99 de 1c 76 ea ea e8 27 15 bb 53 10 49 00 06 00 37 2a 00 01 20
EAPOL: SUPP_BE entering state RECEIVE
p2p-wlan5-0: RX EAPOL from 62:21:c0:99:08:b1
RX EAPOL - hexdump(len=8): 02 00 00 04 04 97 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: Status notification: completion (param=failure)
EAP: EAP entering state FAILURE
p2p-wlan5-0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 62:21:c0:99:08:b1
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed unsuccessfully
WPS: Network configuration replaced - try to associate with the received credential (freq=2412)
p2p-wlan5-0: Request to deauthenticate - bssid=62:21:c0:99:08:b1 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED
wpa_driver_nl80211_deauthenticate(addr=62:21:c0:99:08:b1 reason_code=3)
p2p-wlan5-0: Event DEAUTH (12) received
p2p-wlan5-0: Deauthentication notification
p2p-wlan5-0: * reason 3 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
p2p-wlan5-0: CTRL-EVENT-DISCONNECTED bssid=62:21:c0:99:08:b1 reason=3 locally_generated=1
p2p-wlan5-0: Auto connect enabled: try to reconnect (wps=1 wpa_state=6)
p2p-wlan5-0: Setting scan request: 0 sec 100000 usec
Added BSSID 62:21:c0:99:08:b1 into blacklist
p2p-wlan5-0: Blacklist count 1 --> request scan in 100 ms
p2p-wlan5-0: Setting scan request: 0 sec 100000 usec
p2p-wlan5-0: P2P: Station mode scan operation not pending anymore (sta_scan_pending=0 p2p_cb_on_scan_complete=0)
p2p-wlan5-0: Disconnect event - remove keys
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x1fa9540 key_idx=0 set_tx=0 seq_len=0 key_len=0
addr=62:21:c0:99:08:b1
p2p-wlan5-0: State: ASSOCIATED -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
P2P: Do not use P2P group idle timeout while waiting for initial 4-way handshake to complete
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
p2p-wlan5-0: No keys have been configured - skip key clearing
p2p-wlan5-0: State: DISCONNECTED -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
WPS: Checking whether fast association without a new scan can be used
p2p-wlan5-0: Selecting BSS from priority group 0
p2p-wlan5-0: 0: 62:21:c0:99:08:b1 ssid='DIRECT-fC-Android_a7ca' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-15 wps
p2p-wlan5-0: skip - blacklisted (count=1 limit=0)
p2p-wlan5-0: No APs found - clear blacklist and try again
Removed BSSID 62:21:c0:99:08:b1 from blacklist (clear)
p2p-wlan5-0: Selecting BSS from priority group 0
p2p-wlan5-0: 0: 62:21:c0:99:08:b1 ssid='DIRECT-fC-Android_a7ca' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-15 wps
p2p-wlan5-0: selected based on RSN IE
p2p-wlan5-0: selected BSS 62:21:c0:99:08:b1 ssid='DIRECT-fC-Android_a7ca'
p2p-wlan5-0: Selecting BSS from priority group 0
p2p-wlan5-0: 0: 62:21:c0:99:08:b1 ssid='DIRECT-fC-Android_a7ca' wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-15 wps
p2p-wlan5-0: selected based on RSN IE
p2p-wlan5-0: selected BSS 62:21:c0:99:08:b1 ssid='DIRECT-fC-Android_a7ca'
p2p-wlan5-0: Considering connect request: reassociate: 1 selected: 62:21:c0:99:08:b1 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: DISCONNECTED ssid=0x1faae00 current_ssid=(nil)
p2p-wlan5-0: Request association with 62:21:c0:99:08:b1
p2p-wlan5-0: Automatic auth_alg selection: 0x1
p2p-wlan5-0: Overriding auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
RSN: Search for BSSID 62:21:c0:99:08:b1
RSN: No PMKSA cache entry found
p2p-wlan5-0: RSN: using IEEE 802.11i/D9.0
p2p-wlan5-0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
p2p-wlan5-0: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
p2p-wlan5-0: WPA: using GTK CCMP
p2p-wlan5-0: WPA: using PTK CCMP
p2p-wlan5-0: WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
P2P: * P2P IE header
P2P: * Capability dev=27 group=00
P2P: * Device Info
p2p-wlan5-0: Cancelling scan request
p2p-wlan5-0: P2P: Station mode scan operation not pending anymore (sta_scan_pending=0 p2p_cb_on_scan_complete=0)
p2p-wlan5-0: SME: Trying to authenticate with 62:21:c0:99:08:b1 (SSID='DIRECT-fC-Android_a7ca' freq=2412 MHz)
p2p-wlan5-0: No keys have been configured - skip key clearing
p2p-wlan5-0: State: DISCONNECTED -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
nl80211: Authenticate (ifindex=6)
* bssid=62:21:c0:99:08:b1
* freq=2412
* SSID - hexdump_ascii(len=22):
44 49 52 45 43 54 2d 66 43 2d 41 6e 64 72 6f 69 DIRECT-fC-Androi
64 5f 61 37 63 61 d_a7ca
* IEs - hexdump(len=0): [NULL]
* Auth Type 0
nl80211: Authentication request send successfully
nl80211: Event message available
nl80211: Delete station 62:21:c0:99:08:b1
nl80211: Event message available
nl80211: MLME event 39 on p2p-wlan5-0(02:0b:6b:7f:92:56) A1=62:21:c0:99:08:b1 A2=02:0b:6b:7f:92:56
nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 62 21 c0 99 08 b1 02 0b 6b 7f 92 56 62 21 c0 99 08 b1 00 00 03 00
nl80211: Deauthenticate event
p2p-wlan5-0: Event DEAUTH (12) received
p2p-wlan5-0: Deauthentication notification
p2p-wlan5-0: * reason 3 (locally generated)
p2p-wlan5-0: * address 62:21:c0:99:08:b1
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
p2p-wlan5-0: CTRL-EVENT-DISCONNECTED bssid=62:21:c0:99:08:b1 reason=3 locally_generated=1
p2p-wlan5-0: Auto connect enabled: try to reconnect (wps=0 wpa_state=4)
p2p-wlan5-0: Do not request new immediate scan
Added BSSID 62:21:c0:99:08:b1 into blacklist
p2p-wlan5-0: Blacklist count 2 --> request scan in 500 ms
p2p-wlan5-0: Setting scan request: 0 sec 500000 usec
p2p-wlan5-0: P2P: Station mode scan operation not pending anymore (sta_scan_pending=0 p2p_cb_on_scan_complete=0)
p2p-wlan5-0: Disconnect event - remove keys
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x1fa9540 key_idx=0 set_tx=0 seq_len=0 key_len=0
addr=00:00:00:00:00:00
p2p-wlan5-0: State: AUTHENTICATING -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
p2p-wlan5-0: SME: Allow pending authentication to proceed after disconnection event
p2p-wlan5-0: State: DISCONNECTED -> AUTHENTICATING
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'p2p-wlan5-0' added
nl80211: if_removed already cleared - ignore event
nl80211: Event message available
nl80211: Ignore disconnect event when using userspace SME
nl80211: Event message available
nl80211: New station 62:21:c0:99:08:b1
nl80211: Event message available
nl80211: MLME event 37 on p2p-wlan5-0(02:0b:6b:7f:92:56) A1=02:0b:6b:7f:92:56 A2=62:21:c0:99:08:b1
nl80211: MLME event frame - hexdump(len=41): b0 00 3c 00 02 0b 6b 7f 92 56 62 21 c0 99 08 b1 62 21 c0 99 08 b1 a0 02 00 00 02 00 00 00 dd 09 00 10 18 02 00 00 0c 00 00
nl80211: Authenticate event
p2p-wlan5-0: Event AUTH (11) received
p2p-wlan5-0: SME: Authentication response: peer=62:21:c0:99:08:b1 auth_type=0 auth_transaction=2 status_code=0
SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02 00 00 0c 00 00
p2p-wlan5-0: Trying to associate with 62:21:c0:99:08:b1 (SSID='DIRECT-fC-Android_a7ca' freq=2412 MHz)
p2p-wlan5-0: State: AUTHENTICATING -> ASSOCIATING
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Associate (ifindex=6)
* bssid=62:21:c0:99:08:b1
* freq=2412
* SSID - hexdump_ascii(len=22):
44 49 52 45 43 54 2d 66 43 2d 41 6e 64 72 6f 69 DIRECT-fC-Androi
64 5f 61 37 63 61 d_a7ca
* IEs - hexdump(len=80): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00 dd 29 50 6f 9a 09 02 02 00 27 00 0d 1d 00 00 0b 6b 7f 92 56 01 08 00 01 00 50 f2 04 00 01 00 10 11 00 08 6b 65 76 69 6e 2d 70 63
* pairwise=0xfac04
* group=0xfac04
* P2P group
nl80211: Association request send successfully
nl80211: Event message available
nl80211: Regulatory domain change
p2p-wlan5-0: Event CHANNEL_LIST_CHANGED (31) received
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz
nl80211: 2457-2482 @ 20 MHz
nl80211: 2474-2494 @ 20 MHz
nl80211: 5170-5250 @ 40 MHz
nl80211: 5735-5835 @ 40 MHz
nl80211: Added 802.11b mode based on 802.11g information
P2P: Add operating class 81
P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
P2P: Update channel list
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'p2p-wlan5-0' added
nl80211: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'p2p-wlan5-0' added
nl80211: if_removed already cleared - ignore event
nl80211: Event message available
nl80211: MLME event 38 on p2p-wlan5-0(02:0b:6b:7f:92:56) A1=02:0b:6b:7f:92:56 A2=62:21:c0:99:08:b1
nl80211: MLME event frame - hexdump(len=176): 10 00 3c 00 02 0b 6b 7f 92 56 62 21 c0 99 08 b1 62 21 c0 99 08 b1 b0 02 31 04 00 00 01 c0 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 0d 50 6f 9a 0a 00 00 06 01 10 c0 00 00 28 dd 18 00 50 f2 04 10 4a 00 01 10 10 3b 00 01 03 10 49 00 06 00 37 2a 00 01 20 dd 09 00 10 18 02 00 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 64 00 00 27 a4 00 00 41 43 5e 00 61 32 2f 00 dd 04 50 6f 9a 09
nl80211: Associate event
p2p-wlan5-0: Event ASSOC (0) received
p2p-wlan5-0: Association info event
resp_ies - hexdump(len=146): 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 08 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 0d 50 6f 9a 0a 00 00 06 01 10 c0 00 00 28 dd 18 00 50 f2 04 10 4a 00 01 10 10 3b 00 01 03 10 49 00 06 00 37 2a 00 01 20 dd 09 00 10 18 02 00 00 0c 00 00 dd 18 00 50 f2 02 01 01 84 00 03 64 00 00 27 a4 00 00 41 43 5e 00 61 32 2f 00 dd 04 50 6f 9a 09
p2p-wlan5-0: freq=2412 MHz
p2p-wlan5-0: State: ASSOCIATING -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
p2p-wlan5-0: Associated to a new BSS: BSSID=62:21:c0:99:08:b1
p2p-wlan5-0: No keys have been configured - skip key clearing
p2p-wlan5-0: Associated with 62:21:c0:99:08:b1
p2p-wlan5-0: WPA: Association event - clear replay counter
p2p-wlan5-0: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 62:21:c0:99:08:b1
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 62:21:c0:99:08:b1
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
p2p-wlan5-0: Setting authentication timeout: 10 sec 0 usec
p2p-wlan5-0: Cancelling scan request
p2p-wlan5-0: P2P: Station mode scan operation not pending anymore (sta_scan_pending=0 p2p_cb_on_scan_complete=0)
nl80211: Event message available
nl80211: Ignore connect event (cmd=46) when using userspace SME
nl80211: Event message available
nl80211: Regulatory domain change
p2p-wlan5-0: Event CHANNEL_LIST_CHANGED (31) received
nl80211: Regulatory information - country=US
nl80211: 2402-2472 @ 40 MHz
nl80211: 5170-5250 @ 40 MHz
nl80211: 5250-5330 @ 40 MHz
nl80211: 5490-5600 @ 40 MHz
nl80211: 5650-5710 @ 40 MHz
nl80211: 5735-5835 @ 40 MHz
nl80211: Added 802.11b mode based on 802.11g information
P2P: Add operating class 81
P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
P2P: Update channel list
nl80211: Event message available
nl80211: Regulatory domain change
p2p-wlan5-0: Event CHANNEL_LIST_CHANGED (31) received
nl80211: Regulatory information - country=GB
nl80211: 2402-2482 @ 40 MHz
nl80211: 5170-5250 @ 40 MHz
nl80211: 5250-5330 @ 40 MHz
nl80211: 5490-5710 @ 40 MHz
nl80211: Added 802.11b mode based on 802.11g information
P2P: Add operating class 81
P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
P2P: Update channel list
p2p-wlan5-0: RX EAPOL from 62:21:c0:99:08:b1
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 67 66 bd 2c 37 f9 5c 35 40 9e cf 1b 61 86 d0 3d 38 e9 7b a1 10 38 ac 5b 1b 8e fd 49 41 66 23 27 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
p2p-wlan5-0: Setting authentication timeout: 10 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
p2p-wlan5-0: IEEE 802.1X RX: version=2 type=3 length=95
p2p-wlan5-0: EAPOL-Key type=2
p2p-wlan5-0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
p2p-wlan5-0: key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 67 66 bd 2c 37 f9 5c 35 40 9e cf 1b 61 86 d0 3d 38 e9 7b a1 10 38 ac 5b 1b 8e fd 49 41 66 23 27
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 67 66 bd 2c 37 f9 5c 35 40 9e cf 1b 61 86 d0 3d 38 e9 7b a1 10 38 ac 5b 1b 8e fd 49 41 66 23 27 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
p2p-wlan5-0: State: ASSOCIATED -> 4WAY_HANDSHAKE
p2p-wlan5-0: WPA: RX message 1 of 4-Way Handshake from 62:21:c0:99:08:b1 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
Get randomness: len=32 entropy=1
WPA: Renewed SNonce - hexdump(len=32): d3 c2 e7 ac 0e 53 af 0f 75 13 c3 d1 9a c6 00 12 cc 5a f5 d3 f2 37 cf 41 60 7b be ab c0 08 87 55
WPA: PTK derivation - A1=02:0b:6b:7f:92:56 A2=62:21:c0:99:08:b1
WPA: Nonce1 - hexdump(len=32): d3 c2 e7 ac 0e 53 af 0f 75 13 c3 d1 9a c6 00 12 cc 5a f5 d3 f2 37 cf 41 60 7b be ab c0 08 87 55
WPA: Nonce2 - hexdump(len=32): 67 66 bd 2c 37 f9 5c 35 40 9e cf 1b 61 86 d0 3d 38 e9 7b a1 10 38 ac 5b 1b 8e fd 49 41 66 23 27
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
p2p-wlan5-0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 5b 7d 84 c5 4a 6f 06 17 07 d0 4d 21 e7 17 ac 35
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 d3 c2 e7 ac 0e 53 af 0f 75 13 c3 d1 9a c6 00 12 cc 5a f5 d3 f2 37 cf 41 60 7b be ab c0 08 87 55 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5b 7d 84 c5 4a 6f 06 17 07 d0 4d 21 e7 17 ac 35 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
p2p-wlan5-0: RX EAPOL from 62:21:c0:99:08:b1
RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 67 66 bd 2c 37 f9 5c 35 40 9e cf 1b 61 86 d0 3d 38 e9 7b a1 10 38 ac 5b 1b 8e fd 49 41 66 23 27 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e6 83 5c 0b 60 99 aa c0 fc 36 13 58 b8 27 24 fa 00 38 e7 bb bd a3 24 3e 66 f4 54 b3 a2 99 69 2b 7a f1 b5 f4 77 e1 87 ae 03 ca ed e2 eb 89 e7 0a 02 0c c2 f7 98 67 5a d5 bc d3 57 3d 0d 55 5b c1 e4 fc 0d fc b7 8f d1 a8 e9 3d
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
p2p-wlan5-0: IEEE 802.1X RX: version=2 type=3 length=151
p2p-wlan5-0: EAPOL-Key type=2
p2p-wlan5-0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
p2p-wlan5-0: key_length=16 key_data_length=56
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 67 66 bd 2c 37 f9 5c 35 40 9e cf 1b 61 86 d0 3d 38 e9 7b a1 10 38 ac 5b 1b 8e fd 49 41 66 23 27
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): e6 83 5c 0b 60 99 aa c0 fc 36 13 58 b8 27 24 fa
WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 67 66 bd 2c 37 f9 5c 35 40 9e cf 1b 61 86 d0 3d 38 e9 7b a1 10 38 ac 5b 1b 8e fd 49 41 66 23 27 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e6 83 5c 0b 60 99 aa c0 fc 36 13 58 b8 27 24 fa 00 38 e7 bb bd a3 24 3e 66 f4 54 b3 a2 99 69 2b 7a f1 b5 f4 77 e1 87 ae 03 ca ed e2 eb 89 e7 0a 02 0c c2 f7 98 67 5a d5 bc d3 57 3d 0d 55 5b c1 e4 fc 0d fc b7 8f d1 a8 e9 3d
RSN: encrypted key data - hexdump(len=56): e7 bb bd a3 24 3e 66 f4 54 b3 a2 99 69 2b 7a f1 b5 f4 77 e1 87 ae 03 ca ed e2 eb 89 e7 0a 02 0c c2 f7 98 67 5a d5 bc d3 57 3d 0d 55 5b c1 e4 fc 0d fc b7 8f d1 a8 e9 3d
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
p2p-wlan5-0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
p2p-wlan5-0: WPA: RX message 3 of 4-Way Handshake from 62:21:c0:99:08:b1 (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 c9 06 7b c6 46 5e 72 fa 2a 29 66 da 13 80 ea ff dd 00
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
p2p-wlan5-0: WPA: Sending EAPOL-Key 4/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 84 42 d9 78 a4 2b fc 74 d3 ff 3f 6c 53 6c c8 b6
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 84 42 d9 78 a4 2b fc 74 d3 ff 3f 6c 53 6c c8 b6 00 00
p2p-wlan5-0: WPA: Installing PTK to the driver
wpa_driver_nl80211_set_key: ifindex=6 alg=3 addr=0x1faa158 key_idx=0 set_tx=1 seq_len=6 key_len=16
addr=62:21:c0:99:08:b1
EAPOL: External notification - portValid=1
p2p-wlan5-0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
p2p-wlan5-0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_nl80211_set_key: ifindex=6 alg=3 addr=0x4a6636 key_idx=1 set_tx=0 seq_len=6 key_len=16
broadcast key
p2p-wlan5-0: WPA: Key negotiation completed with 62:21:c0:99:08:b1 [PTK=CCMP GTK=CCMP]
p2p-wlan5-0: Cancelling authentication timeout
Removed BSSID 62:21:c0:99:08:b1 from blacklist
p2p-wlan5-0: State: GROUP_HANDSHAKE -> COMPLETED
p2p-wlan5-0: CTRL-EVENT-CONNECTED - Connection to 62:21:c0:99:08:b1 completed [id=0 id_str=]
wpa_driver_nl80211_set_operstate: operstate 0->1 (UP)
netlink: Operstate: linkmode=-1, operstate=6
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 21 Group Capability 49
P2P: Attribute 13 length 33
P2P: * Device Info: addr 62:21:c0:99:88:b1 primary device type 10-0050F204-5 device name 'Android_a7ca' config methods 0x188
P2P: Attribute 14 length 0
P2P: * Group Info
P2P: Parsing P2P IE
P2P: Attribute 2 length 2
P2P: * Device Capability 21 Group Capability 49
P2P: Attribute 13 length 33
P2P: * Device Info: addr 62:21:c0:99:88:b1 primary device type 10-0050F204-5 device name 'Android_a7ca' config methods 0x188
P2P: Attribute 14 length 0
P2P: * Group Info
P2P: Checking whether group is persistent: group_capab=0x49
P2P: GO Device Address 62:21:c0:99:88:b1
P2P: BSS 62:21:c0:99:08:b1 group_capab=0x49 go_dev_addr=62:21:c0:99:88:b1
P2P-GROUP-STARTED p2p-wlan5-0 client ssid="DIRECT-fC-Android_a7ca" freq=2412 psk=6cdd0179f543dac4eed2aa00b905049640e9ab2f98c87df5d8db7e96616783f3 go_dev_addr=62:21:c0:99:88:b1
CTRL_IFACE monitor send - hexdump(len=46): 2f 74 6d 70 2f 73 61 6d 70 6c 65 5f 77 69 64 69 5f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74 2e 54 6b 4d 4e 5a 54 2f 73 6f 63 6b 65 74 00
p2p-wlan5-0: P2P: Station mode scan operation not pending anymore (sta_scan_pending=0 p2p_cb_on_scan_complete=0)
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Supplicant port status: Authorized
nl80211: Set supplicant port authorized for 62:21:c0:99:08:b1
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'p2p-wlan5-0' added
nl80211: if_removed already cleared - ignore event
RX ctrl_iface - hexdump_ascii(len=26):
50 32 50 5f 50 45 45 52 20 36 32 3a 32 31 3a 63 P2P_PEER 62:21:c
30 3a 39 39 3a 38 38 3a 62 31 0:99:88:b1
wlan5: Control interface command 'P2P_PEER 62:21:c0:99:88:b1'
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'p2p-wlan5-0' added
nl80211: if_removed already cleared - ignore event
EAPOL: startWhen --> 0
EAPOL: disable timer tick
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=60:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=116): 40 00 00 00 ff ff ff ff ff ff 60 21 c0 99 88 b1 ff ff ff ff ff ff 20 0a 00 00 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 01 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=60:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=116): 40 00 00 00 ff ff ff ff ff ff 60 21 c0 99 88 b1 ff ff ff ff ff ff 30 0a 00 00 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 01 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=60:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=116): 40 00 00 00 ff ff ff ff ff ff 60 21 c0 99 88 b1 ff ff ff ff ff ff 40 0a 00 00 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 02 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
nl80211: Event message available
nl80211: MLME event 59 on wlan5(00:0b:6b:7f:92:56) A1=ff:ff:ff:ff:ff:ff A2=60:21:c0:99:88:b1
nl80211: MLME event frame - hexdump(len=116): 40 00 00 00 ff ff ff ff ff ff 60 21 c0 99 88 b1 ff ff ff ff ff ff 50 0a 00 00 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c 2d 1a 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 01 02 dd 09 00 10 18 02 00 00 00 00 00 dd 1e 00 90 4c 33 20 10 1a ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
nl80211: Frame event
wlan5: Event RX_MGMT (20) received
RX ctrl_iface - hexdump_ascii(len=18):
53 45 54 20 77 69 66 69 5f 64 69 73 70 6c 61 79 SET wifi_display
20 31 1
wlan5: Control interface command 'SET wifi_display 1'
CTRL_IFACE SET 'wifi_display'='1'
WFD: Wi-Fi Display enabled
WFD: Update WFD IE
WFD: WFD IE for Beacon - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
WFD: WFD IE for (Re)Association Request - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
WFD: WFD IE for GO Negotiation - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
WFD: WFD IE for Provision Discovery Request - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
WFD: WFD IE for Probe Request - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
WFD: WFD IE for Probe Response - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
WFD: WFD IE for P2P Invitation - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
WFD: WFD IE for Provision Discovery Response - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
RX ctrl_iface - hexdump_ascii(len=10):
50 32 50 5f 43 41 4e 43 45 4c P2P_CANCEL
wlan5: Control interface command 'P2P_CANCEL'
P2P: Request to cancel group formation
P2P: Stopping find
P2P: Clear timeout (state=IDLE)
P2P: State IDLE -> IDLE
P2P: Clear timeout (state=IDLE)
nl80211: Disable Probe Request reporting nl_preq=0x1fa68c0
P2P: No ongoing group formation found
RX ctrl_iface - hexdump_ascii(len=28):
50 32 50 5f 47 52 4f 55 50 5f 52 45 4d 4f 56 45 P2P_GROUP_REMOVE
20 70 32 70 2d 77 6c 61 6e 35 2d 30 p2p-wlan5-0
wlan5: Control interface command 'P2P_GROUP_REMOVE p2p-wlan5-0'
p2p-wlan5-0: Request to deauthenticate - bssid=62:21:c0:99:08:b1 pending_bssid=00:00:00:00:00:00 reason=3 state=COMPLETED
wpa_driver_nl80211_deauthenticate(addr=62:21:c0:99:08:b1 reason_code=3)
p2p-wlan5-0: Event DEAUTH (12) received
p2p-wlan5-0: Deauthentication notification
p2p-wlan5-0: * reason 3 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
p2p-wlan5-0: CTRL-EVENT-DISCONNECTED bssid=62:21:c0:99:08:b1 reason=3 locally_generated=1
p2p-wlan5-0: Auto connect disabled: do not try to re-connect
p2p-wlan5-0: Ignore connection failure indication since interface has been put into disconnected state
p2p-wlan5-0: Disconnect event - remove keys
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=6 alg=0 addr=0x1fa9540 key_idx=0 set_tx=0 seq_len=0 key_len=0
addr=62:21:c0:99:08:b1
p2p-wlan5-0: State: COMPLETED -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 1->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
P2P: Set P2P group idle timeout to 10 seconds
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
p2p-wlan5-0: No keys have been configured - skip key clearing
p2p-wlan5-0: State: DISCONNECTED -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
P2P-GROUP-REMOVED p2p-wlan5-0 client reason=REQUESTED
CTRL_IFACE monitor send - hexdump(len=46): 2f 74 6d 70 2f 73 61 6d 70 6c 65 5f 77 69 64 69 5f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74 2e 54 6b 4d 4e 5a 54 2f 73 6f 63 6b 65 74 00
P2P: Cancelled P2P group idle timeout
P2P: Remove group interface p2p-wlan5-0
p2p-wlan5-0: Removing interface p2p-wlan5-0
p2p-wlan5-0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=DISCONNECTED
p2p-wlan5-0: No keys have been configured - skip key clearing
p2p-wlan5-0: State: DISCONNECTED -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
p2p-wlan5-0: No keys have been configured - skip key clearing
EAP: deinitialize previously used EAP method (254, WSC) at EAP deinit
p2p-wlan5-0: BSS: Remove id 0 BSSID 62:21:c0:99:08:b1 SSID 'DIRECT-fC-Android_a7ca' due to wpa_bss_flush
p2p-wlan5-0: Cancelling scan request
p2p-wlan5-0: P2P: Station mode scan operation not pending anymore (sta_scan_pending=0 p2p_cb_on_scan_complete=0)
p2p-wlan5-0: Cancelling authentication timeout
netlink: Operstate: linkmode=0, operstate=6
nl80211: Set mode ifindex 6 iftype 2 (STATION)
nl80211: Unsubscribe mgmt frames handle 0x1fa8b10 (mode change)
Control interface directory not empty - leaving it behind
nl80211: wpa_driver_nl80211_if_remove(type=4 ifname=p2p-wlan5-0) ifindex=6
nl80211: Remove interface ifindex=6
nl80211: Ignore event for foreign ifindex 6
nl80211: Ignore event for foreign ifindex 6
nl80211: Ignore event for foreign ifindex 6
nl80211: Ignore event for foreign ifindex 6
nl80211: Ignore dellink event for foreign ifindex 6
nl80211: Event message available
nl80211: Event message available
nl80211: Event message available
nl80211: Event message available
nl80211: Regulatory domain change
wlan5: Event CHANNEL_LIST_CHANGED (31) received
nl80211: Regulatory information - country=US
nl80211: 2402-2472 @ 40 MHz
nl80211: 5170-5250 @ 40 MHz
nl80211: 5250-5330 @ 40 MHz
nl80211: 5490-5600 @ 40 MHz
nl80211: 5650-5710 @ 40 MHz
nl80211: 5735-5835 @ 40 MHz
nl80211: Added 802.11b mode based on 802.11g information
P2P: Add operating class 81
P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
P2P: Update channel list
nl80211: Event message available
nl80211: Regulatory domain change
wlan5: Event CHANNEL_LIST_CHANGED (31) received
nl80211: Regulatory information - country=US
nl80211: 2402-2472 @ 40 MHz
nl80211: 5170-5250 @ 40 MHz
nl80211: 5250-5330 @ 40 MHz
nl80211: 5490-5600 @ 40 MHz
nl80211: 5650-5710 @ 40 MHz
nl80211: 5735-5835 @ 40 MHz
nl80211: Added 802.11b mode based on 802.11g information
P2P: Add operating class 81
P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
P2P: Update channel list
RX ctrl_iface - hexdump_ascii(len=10):
50 32 50 5f 4c 49 53 54 45 4e P2P_LISTEN
wlan5: Control interface command 'P2P_LISTEN'
P2P: Stopping find
P2P: Clear timeout (state=IDLE)
P2P: State IDLE -> IDLE
P2P: Going to listen(only) state
WPS: * Version (hardcoded 0x10)
WPS: * UUID-E
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Device Info
nl80211: Enable Probe Request reporting nl_preq=0x1fa8730
nl80211: Register frame type=0x40 nl_handle=0x1fa8730
nl80211: Register frame match - hexdump(len=0): [NULL]
nl80211: Remain-on-channel cookie 0xffff880406407f00 for freq=2412 MHz duration=5000
P2P: State IDLE -> LISTEN_ONLY
RX ctrl_iface - hexdump_ascii(len=19):
53 45 54 20 70 32 70 5f 67 6f 5f 69 6e 74 65 6e SET p2p_go_inten
74 20 30 t 0
wlan5: Control interface command 'SET p2p_go_intent 0'
CTRL_IFACE SET 'p2p_go_intent'='0'
p2p_go_intent=0
RX ctrl_iface - hexdump_ascii(len=26):
53 45 54 20 70 65 72 73 69 73 74 65 6e 74 5f 72 SET persistent_r
65 63 6f 6e 6e 65 63 74 20 31 econnect 1
wlan5: Control interface command 'SET persistent_reconnect 1'
CTRL_IFACE SET 'persistent_reconnect'='1'
persistent_reconnect=1
RX ctrl_iface - hexdump_ascii(len=24):
53 45 54 20 64 65 76 69 63 65 5f 6e 61 6d 65 20 SET device_name
6b 65 76 69 6e 2d 70 63 kevin-pc
wlan5: Control interface command 'SET device_name kevin-pc'
CTRL_IFACE SET 'device_name'='kevin-pc'
device_name='kevin-pc'
RX ctrl_iface - hexdump_ascii(len=17):
53 45 54 20 6d 6f 64 65 6c 5f 6e 61 6d 65 20 70 SET model_name p
63 c
wlan5: Control interface command 'SET model_name pc'
CTRL_IFACE SET 'model_name'='pc'
model_name='pc'
RX ctrl_iface - hexdump_ascii(len=30):
53 45 54 20 6d 61 6e 75 66 61 63 74 75 72 65 72 SET manufacturer
20 5b 70 6c 61 63 65 68 6f 6c 64 65 72 5d [placeholder]
wlan5: Control interface command 'SET manufacturer [placeholder]'
CTRL_IFACE SET 'manufacturer'='[placeholder]'
manufacturer='[placeholder]'
RX ctrl_iface - hexdump_ascii(len=24):
53 45 54 20 6d 6f 64 65 6c 5f 6e 75 6d 62 65 72 SET model_number
20 34 2e 30 2e 30 2e 30 4.0.0.0
wlan5: Control interface command 'SET model_number 4.0.0.0'
CTRL_IFACE SET 'model_number'='4.0.0.0'
model_number='4.0.0.0'
RX ctrl_iface - hexdump_ascii(len=31):
53 45 54 20 73 65 72 69 61 6c 5f 6e 75 6d 62 65 SET serial_numbe
72 20 5b 70 6c 61 63 65 68 6f 6c 64 65 72 5d r [placeholder]
wlan5: Control interface command 'SET serial_number [placeholder]'
CTRL_IFACE SET 'serial_number'='[placeholder]'
serial_number='[placeholder]'
RX ctrl_iface - hexdump_ascii(len=35):
57 46 44 5f 53 55 42 45 4c 45 4d 5f 53 45 54 20 WFD_SUBELEM_SET
30 30 20 30 30 30 36 30 30 31 31 30 30 30 30 30 00 0006001100000
30 30 30 000
wlan5: Control interface command 'WFD_SUBELEM_SET 00 0006001100000000'
WFD: Set subelement 0
WFD: Update WFD IE
WFD: WFD IE for Beacon - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
WFD: WFD IE for (Re)Association Request - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
WFD: WFD IE for GO Negotiation - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
WFD: WFD IE for Provision Discovery Request - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
WFD: WFD IE for Probe Request - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
WFD: WFD IE for Probe Response - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
WFD: WFD IE for P2P Invitation - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
WFD: WFD IE for Provision Discovery Response - hexdump(len=15): dd 0d 50 6f 9a 0a 00 00 06 00 11 00 00 00 00
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=0 freq=2412 channel_type=0 duration=5000 cookie=0xffff880406407f00 (match))
wlan5: Event REMAIN_ON_CHANNEL (22) received
Off-channel: Send Action callback (without_roc=0 pending_action_tx=(nil))
P2P: Starting Listen timeout(5,0) on freq=2412 based on callback
P2P: Set timeout (state=LISTEN_ONLY): 5.020000 sec
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=1 freq=2412 channel_type=0 duration=0 cookie=0xffff880406407f00 (match))
wlan5: Event CANCEL_REMAIN_ON_CHANNEL (23) received
P2P: Cancel remain-on-channel callback (p2p_long_listen=3600000 ms pending_action_tx=(nil))
P2P: Driver ended Listen state (freq=2412)
P2P: Continuing long Listen state
P2P: Going to listen(only) state
WPS: * Version (hardcoded 0x10)
WPS: * UUID-E
WPS: * Version2 (0x20)
P2P: * P2P IE header
P2P: * Capability dev=25 group=00
P2P: * Device Info
nl80211: Probe Request reporting already on! nl_preq=0x1fa8730
nl80211: Remain-on-channel cookie 0xffff8803acc14f00 for freq=2412 MHz duration=5000
P2P: State LISTEN_ONLY -> LISTEN_ONLY
P2P: Timeout (state=LISTEN_ONLY)
nl80211: Event message available
nl80211: Remain-on-channel event (cancel=0 freq=2412 channel_type=0 duration=5000 cookie=0xffff8803acc14f00 (match))
wlan5: Event REMAIN_ON_CHANNEL (22) received
Off-channel: Send Action callback (without_roc=0 pending_action_tx=(nil))
P2P: Starting Listen timeout(5,0) on freq=2412 based on callback
P2P: Set timeout (state=LISTEN_ONLY): 5.020000 sec
^CP2P: Stopping find
P2P: Clear timeout (state=LISTEN_ONLY)
P2P: State LISTEN_ONLY -> IDLE
P2P: Clear timeout (state=IDLE)
P2P: Clear drv_in_listen (2412)
nl80211: Cancel remain-on-channel with cookie 0xffff8803acc14f00
nl80211: Disable Probe Request reporting nl_preq=0x1fa8730
P2P-DEVICE-LOST p2p_dev_addr=62:21:c0:99:88:b1
CTRL_IFACE monitor send - hexdump(len=46): 2f 74 6d 70 2f 73 61 6d 70 6c 65 5f 77 69 64 69 5f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74 2e 54 6b 4d 4e 5a 54 2f 73 6f 63 6b 65 74 00
CTRL_IFACE monitor[0]: 111 - Connection refused
wlan5: Removing interface wlan5
wlan5: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=INACTIVE
wlan5: No keys have been configured - skip key clearing
wlan5: State: INACTIVE -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
wlan5: No keys have been configured - skip key clearing
wlan5: Cancelling scan request
wlan5: P2P: Station mode scan operation not pending anymore (sta_scan_pending=0 p2p_cb_on_scan_complete=0)
wlan5: Cancelling authentication timeout
netlink: Operstate: linkmode=0, operstate=6
nl80211: Set mode ifindex 4 iftype 2 (STATION)
nl80211: Unsubscribe mgmt frames handle 0x1fa52f0 (mode change)
wlan5: CTRL-EVENT-TERMINATING
CTRL_IFACE monitor send - hexdump(len=46): 2f 74 6d 70 2f 73 61 6d 70 6c 65 5f 77 69 64 69 5f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74 2e 54 6b 4d 4e 5a 54 2f 73 6f 63 6b 65 74 00
CTRL_IFACE monitor[0]: 111 - Connection refused
CTRL_IFACE wait for attached monitors to receive messages
prev parent reply other threads:[~2013-07-04 7:00 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-07-03 8:37 Use of 5GHz frequencies with Wi-Fi Direct Kévin THIERRY
2013-07-03 9:30 ` Gagan Goyal
2013-07-03 9:59 ` Gagan Goyal
2013-07-03 12:27 ` Kévin THIERRY
2013-07-04 2:59 ` Gagan Goyal
2013-07-04 6:59 ` Kévin THIERRY [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=51D51D5A.6070700@kaiwen.me \
--to=kevin.thierry@kaiwen.me \
--cc=gagsbond@gmail.com \
--cc=linux-wireless@vger.kernel.org \
--cc=ronan.lanoe@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).