• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
__aeabi_unwind_cpp_pr0 __aeabi_unwind_cpp_pr1 __stack_chk_fail __stack_chk_guard atoi bcmp bin_clear_free eap_server_get_type fclose fgets fopen free freq_range_list_parse getgrnam hexstr2bin hostapd_acl_comp hostapd_add_acl_maclist hostapd_config_check hostapd_config_clear_wpa_psk hostapd_config_defaults hostapd_config_defaults_bss hostapd_config_free hostapd_config_free_eap_user hostapd_config_free_eap_users hostapd_config_read hostapd_config_wmm_ac hostapd_parse_ip_addr hostapd_remove_acl_mac hostapd_set_iface hostapd_set_security_params hwaddr_aton malloc memcmp memcpy memmove memset os_memdup os_readfile os_strlcpy os_zalloc qsort realloc strchr strcmp strdup strlen strncmp strstr strtol strtoul uuid_str2bin wpa_config_parse_string wpa_drivers wpa_parse_cipher wpa_printf wpabuf_free wpabuf_parse_bin wps_dev_type_str2bin __errno_location ap_for_each_sta ap_get_sta ap_sta_add ap_sta_deauthenticate ap_sta_disconnect bind close ctrl_iface_attach ctrl_iface_detach ctrl_iface_level debug_level_str driver_flag_to_string eapol_auth_reauthenticate eapol_auth_set_conf eloop_register_read_sock eloop_terminate eloop_unregister_read_sock freeaddrinfo gai_strerror getaddrinfo hex2byte hostapd_add_iface hostapd_chan_switch_vht_config hostapd_ctrl_iface_deauthenticate hostapd_ctrl_iface_deinit hostapd_ctrl_iface_disassociate hostapd_ctrl_iface_init hostapd_ctrl_iface_pmksa_add hostapd_ctrl_iface_pmksa_flush hostapd_ctrl_iface_pmksa_list hostapd_ctrl_iface_poll_sta hostapd_ctrl_iface_sta hostapd_ctrl_iface_sta_first hostapd_ctrl_iface_sta_next hostapd_ctrl_iface_status hostapd_ctrl_iface_stop_ap hostapd_disable_iface hostapd_drv_sta_deauth hostapd_enable_iface hostapd_global_ctrl_iface_deinit hostapd_global_ctrl_iface_init hostapd_maclist_found hostapd_neighbor_remove hostapd_neighbor_set hostapd_new_assoc_sta hostapd_parse_csa_settings hostapd_reload_iface hostapd_remove_iface hostapd_send_beacon_req hostapd_send_lci_req hostapd_send_range_req hostapd_setup_wpa_psk hostapd_switch_channel hostapd_wps_add_pin hostapd_wps_ap_pin_disable hostapd_wps_ap_pin_get hostapd_wps_ap_pin_random hostapd_wps_ap_pin_set hostapd_wps_button_pushed hostapd_wps_cancel hostapd_wps_config_ap ieee802_11_get_mib ieee802_11_send_sa_query_req ieee802_11_set_beacon ieee802_11_update_beacons ieee802_1x_erp_flush ieee802_1x_get_mib isblank os_get_random os_get_reltime recvfrom sendmsg sendto snprintf sockaddr_print socket ssid_parse sta_track_expire str_starts str_to_debug_level str_token strcasecmp strerror tls_get_library_version wpa_auth_get_pmk wpa_cipher_txt wpa_debug_level wpa_debug_reopen_file wpa_debug_timestamp wpa_get_mib wpa_hexdump_ascii wpa_hexdump_ascii_key wpa_msg_register_cb wpa_snprintf_hex wpa_ssid_txt wpa_write_ciphers wpabuf_alloc wps_ei_str wps_pin_valid eap_server_identity_register eap_server_register_methods eap_server_wsc_register ap_main closelog eap_server_unregister_methods eloop_cancel_timeout eloop_destroy eloop_init eloop_register_signal eloop_register_signal_terminate eloop_register_timeout eloop_run eloop_sock_requeue exit fwrite getopt hostapd_drv_none hostapd_for_each_interface hostapd_get_ext_capa hostapd_init hostapd_interface_deinit_free hostapd_interface_init_bss hostapd_logger_register_cb hostapd_periodic_iface hostapd_reload_config hostapd_setup_interface openlog optarg optind os_daemonize os_daemonize_terminate os_program_deinit os_program_init os_rel2abs_path puts set_running_hostap stderr strtok_r syslog uuid_bin2str uuid_gen_mac_addr wpa_debug_close_file wpa_debug_open_file wpa_debug_print_timestamp wpa_debug_setup_stdout wpa_debug_show_keys wpa_get_wowlan_triggers wpa_msg_register_ifname_cb hostapd_config_free_bss hostapd_config_free_radius_attr hostapd_config_get_radius_attr hostapd_get_psk hostapd_get_vlan_id_ifname hostapd_mac_comp hostapd_parse_radius_attr hostapd_rate_found hostapd_sae_pw_id_in_use hostapd_vlan_valid pbkdf2_sha1 str_clear_free wpa_hexdump_key wpa_select_ap_group_cipher wpabuf_alloc_copy wpabuf_put freq_range_list_includes hostapd_add_sta_node hostapd_add_tspec hostapd_build_ap_extra_ies hostapd_driver_commit hostapd_driver_get_scan_results hostapd_driver_scan hostapd_driver_set_noa hostapd_drv_do_acs hostapd_drv_send_action hostapd_drv_send_action_addr3_ap hostapd_drv_send_mlme hostapd_drv_send_mlme_csa hostapd_drv_set_key hostapd_drv_set_qos_map hostapd_drv_sta_disassoc hostapd_drv_update_dh_ie hostapd_drv_wnm_oper hostapd_eid_adv_proto hostapd_eid_ext_capab hostapd_eid_interworking hostapd_eid_roaming_consortium hostapd_eid_time_adv hostapd_eid_time_zone hostapd_flush hostapd_free_ap_extra_ies hostapd_get_hw_feature_data hostapd_get_seqnum hostapd_get_ssid hostapd_if_add hostapd_if_remove hostapd_reset_ap_wps_ie hostapd_set_ap_wps_ie hostapd_set_authorized hostapd_set_country hostapd_set_drv_ieee8021x hostapd_set_frag hostapd_set_freq hostapd_set_freq_params hostapd_set_generic_elem hostapd_set_ieee8021x hostapd_set_privacy hostapd_set_rts hostapd_set_ssid hostapd_set_sta_flags hostapd_set_tx_queue_params hostapd_set_wds_sta hostapd_sta_add hostapd_sta_assoc hostapd_sta_auth hostapd_sta_flags_to_drv hostapd_sta_set_airtime_weight hostapd_sta_set_flags hostapd_start_dfs_cac hostapd_vlan_if_add hostapd_vlan_if_remove int_array_add_unique wpabuf_resize wps_build_assoc_resp_ie ap_list_deinit ap_list_init ap_list_process_beacon ap_list_timer hostapd_ht_operation_update merge_byte_arrays ap_sta_clear_disconnect_timeouts hostapd_logger mlme_associate_indication mlme_authenticate_indication mlme_deauthenticate_indication mlme_deletekeys_request mlme_disassociate_indication mlme_michaelmicfailure_indication mlme_reassociate_indication wpa_remove_ptk get_ie hostapd_clean_rrm hostapd_free_neighbor_db hostapd_handle_radio_measurement hostapd_neighbor_get hostapd_rrm_beacon_req_tx_status os_get_time wpa_msg authsrv_deinit authsrv_init handle_probe_req hostapd_eid_ext_supp_rates hostapd_eid_fils_indic hostapd_eid_ht_capabilities hostapd_eid_ht_operation hostapd_eid_owe_trans hostapd_eid_owe_trans_len hostapd_eid_secondary_channel hostapd_eid_supp_rates hostapd_eid_wmm hostapd_is_dfs_required hostapd_own_capab_info ieee80211_freq_to_channel_ext ieee802_11_allowed_address ieee802_11_build_ap_params ieee802_11_free_ap_params ieee802_11_parse_elems ieee802_11_set_beacons ieee802_11_vendor_ie_concat p2p_group_match_dev_id p2p_group_match_dev_type sta_track_add sta_track_del sta_track_seen_on supp_rates_11b_only wpa_auth_get_wpa_ie wpa_msg_ctrl bss_load_update_deinit bss_load_update_init ap_sta_disassociate ap_sta_flags_txt ap_sta_wpa_get_keyid hostapd_free_stas hostapd_p2p_get_mib_sta hostapd_state_text hostapd_wps_get_mib_sta ieee802_11_get_mib_sta ieee802_1x_get_mib_sta sscanf wpa_auth_pmksa_add2 wpa_auth_pmksa_flush wpa_auth_pmksa_list wpa_get_mib_sta chan_bw_allowed chan_pri_allowed hostapd_csa_in_progress hostapd_dfs_complete_cac hostapd_dfs_nop_finished hostapd_dfs_pre_cac_expired hostapd_dfs_radar_detected hostapd_dfs_start_cac hostapd_handle_dfs hostapd_handle_dfs_offload hostapd_set_state hostapd_setup_interface_complete ieee80211_freq_to_chan ieee80211_is_dfs num_chan_to_bw ap_check_sa_query_timeout ap_copy_sta_supp_op_classes ap_free_sta ap_sta_no_session_timeout ap_sta_set_authorized ap_sta_start_sa_query channel_width_to_string event_to_string get_hdr_bssid hostapd_channel_list_updated hostapd_check_acl hostapd_cleanup_cs_params hostapd_client_poll_ok hostapd_eapol_tx_status hostapd_eid_assoc_comeback_time hostapd_event_ch_switch hostapd_event_connect_failed_reason hostapd_event_get_survey hostapd_event_sta_low_ack hostapd_event_sta_opmode_changed hostapd_get_iface hostapd_hw_get_channel hostapd_neighbor_set_own_report hostapd_notif_assoc hostapd_notif_disassoc hostapd_probe_req_rx hostapd_reconfig_encryption hostapd_switch_channel_fallback hostapd_tx_status ht40_intolerant_add ieee802_11_mgmt ieee802_11_mgmt_cb ieee802_11_rx_from_unknown ieee802_1x_notify_port_enabled ieee802_1x_notify_pre_auth ieee802_1x_receive michael_mic_failure p2p_get_go_dev_addr p2p_group_notif_assoc wpa_auth_reconfig_group_keys wpa_auth_sm_event wpa_auth_sta_init wpa_auth_uses_mfp wpa_hexdump wpa_supplicant_event_global_hapd wpa_supplicant_event_hapd wpa_validate_wpa_ie wps_is_20 hostapd_get_eap_user ap_handle_timer ap_ht2040_timeout hostapd_acl_deinit hostapd_acl_init hostapd_alloc_bss_data hostapd_alloc_iface hostapd_check_ht_capab hostapd_deinit_wpa hostapd_deinit_wps hostapd_free_hw_features hostapd_get_hw_features hostapd_hw_get_freq hostapd_hw_mode_txt hostapd_init_wps hostapd_init_wps_complete hostapd_interface_deinit hostapd_interface_free hostapd_p2p_non_p2p_sta_connected hostapd_prepare_rates hostapd_prune_associations hostapd_reconfig_wpa hostapd_select_hw_mode hostapd_setup_wpa hostapd_stop_setup_timers hostapd_update_wps ieee802_1x_init ieee802_1x_new_station inc_byte_array wpa_auth_sta_associated wpa_deinit wpa_init_keys allowed_ht40_channel_pair check_40mhz_2g4 check_40mhz_5g hostapd_acs_completed hw_get_chan hw_get_channel_chan hw_get_freq wpa_scan_results_free add_multi_ap_ie ap_sta_bind_vlan ap_sta_deauth_cb ap_sta_disassoc_cb ap_sta_ip6addr_del ap_sta_session_timeout ap_sta_set_vlan copy_sta_ht_capab hostapd_2040_coex_action hostapd_allowed_address hostapd_eid_bss_max_idle_period hostapd_eid_multi_ap hostapd_eid_qos_map_set hostapd_eid_wmm_valid hostapd_free_psk_list hostapd_get_aid hostapd_get_ht_capab hostapd_wmm_action ieee802_11_sa_query_action ieee802_1x_eapol_tx_status ieee802_1x_free_station ieee802_1x_tx_status os_memcmp_const p2p_group_assoc_resp_ie rc4_skip update_ht_state wpa_auth_get_pairwise wpa_auth_set_auth_alg wpa_auth_sta_fils_tk_already_set wpa_auth_sta_ft_tk_already_set wpa_auth_sta_no_wpa ht40_intolerant_remove ap_sta_stop_sa_query hostapd_update_time_adv os_gmtime ap_sta_delayed_1x_auth_fail_disconnect ap_sta_pending_delayed_1x_auth_fail_disconnect dup_binstr eap_get_identity eap_server_clear_identity eap_server_get_name eap_sm_notify_cached eapol_auth_alloc eapol_auth_deinit eapol_auth_free eapol_auth_init eapol_auth_step hmac_md5 hostapd_wps_eap_completed ieee802_1x_abort_auth ieee802_1x_alloc_eapol_sm ieee802_1x_deinit ieee802_1x_get_identity ieee802_1x_get_key ieee802_1x_get_radius_class ieee802_1x_get_radius_cui ieee802_1x_notify_port_valid ieee802_1x_set_sta_authorized pmksa_cache_to_eapol_data radius_mode_txt radius_sta_rate wpa_auth_eapol_key_tx_status wpa_auth_pairwise_set wpa_auth_pmksa_add wpa_auth_sm_notify wpa_auth_sta_clear_pmksa wpa_auth_sta_get_pmksa wpa_auth_sta_key_mgmt wpa_get_ntp_timestamp wpa_receive ieee80211_get_phy_type wpabuf_dup pmksa_cache_add_okc pmksa_cache_auth_add pmksa_cache_auth_add_entry pmksa_cache_auth_create_entry pmksa_cache_auth_deinit pmksa_cache_auth_flush pmksa_cache_auth_get pmksa_cache_auth_init pmksa_cache_auth_list pmksa_cache_auth_radius_das_disconnect pmksa_cache_free_entry pmksa_cache_get_okc rsn_pmkid ap_get_sta_p2p ap_sta_hash_add ap_sta_replenish_timeout ap_sta_session_warning_timeout ap_sta_wps_cancel eloop_is_timeout_registered eloop_replenish_timeout hostapd_p2p_non_p2p_sta_disconnected os_random p2p_group_get_dev_addr p2p_group_notif_disassoc p2p_parse_dev_addr_in_p2p_ie wpa_auth_get_ip_addr wpa_auth_sta_deinit wpa_msg_no_global ieee80211_tkip_countermeasures_deinit wpa_auth_countermeasures_start wpa_auth_sta_local_mic_failure_report wpa_gtk_rekey hostapd_register_probereq_cb wmm_process_tspec __wpa_send_eapol aes_wrap bitfield_alloc bitfield_clear bitfield_free bitfield_get_first_zero bitfield_set eloop_deplete_timeout forced_memzero sha1_prf sha256_prf vsnprintf wpa_add_kde wpa_akm_to_suite wpa_auth_add_sae_pmkid wpa_auth_ensure_group wpa_auth_for_each_auth wpa_auth_for_each_sta wpa_auth_gen_wpa_ie wpa_auth_logger wpa_auth_pmksa_add_preauth wpa_auth_pmksa_add_sae wpa_auth_pmksa_get wpa_auth_pmksa_remove wpa_auth_pmksa_set_to_sm wpa_auth_radius_das_disconnect_pmksa wpa_auth_release_group wpa_auth_set_ptk_rekey_timer wpa_auth_sta_set_vlan wpa_auth_sta_wpa_version wpa_auth_uses_ft_sae wpa_auth_uses_sae wpa_auth_vlogger wpa_cipher_key_len wpa_cipher_to_alg wpa_cipher_to_suite wpa_compare_rsn_ie wpa_eapol_key_mic wpa_init wpa_mic_len wpa_parse_kde_ies wpa_pmk_to_ptk wpa_reconfig wpa_use_aes_key_wrap wpa_use_akm_defined wpa_use_cmac l2_packet_send rsn_cipher_put_suites wpa_cipher_put_suites wpa_default_rsn_cipher wpa_parse_wpa_ie_rsn wpa_parse_wpa_ie_wpa wpa_pick_pairwise_cipher wpa_write_rsn_ie getnameinfo get_pri_sec_chan hw_get_channel_freq set_disable_ht40 country_to_global_op_class fc2str get_ie_ext get_oper_class get_vendor_ie global_op_class global_op_class_size ieee80211_chan_to_freq ieee80211_chaninfo_to_channel ieee802_11_ext_capab ieee802_11_ie_count ieee802_11_parse_candidate_list mb_ies_by_info mb_ies_info_by_ies mbo_add_ie oper_class_bw_to_int reason2str status2str hmac_sha1 hmac_sha1_vector hmac_sha256_vector omac1_aes_128 wpa_cipher_rsc_len wpa_cipher_valid_group wpa_cipher_valid_mgmt_group wpa_cipher_valid_pairwise wpa_key_mgmt_txt wpa_pick_group_cipher Td0 Td4s Te0 aes_decrypt aes_decrypt_deinit aes_decrypt_init rijndaelKeySetupEnc aes_encrypt aes_encrypt_deinit aes_encrypt_init rcons omac1_aes_128_vector omac1_aes_256 omac1_aes_vector aes_unwrap MD5Final MD5Init MD5Update SHA1Final SHA1Init SHA1Update crypto_global_deinit crypto_global_init crypto_hash_finish crypto_hash_init crypto_hash_update sha256_done sha256_init sha256_process sha384_done sha384_init sha384_process sha512_done sha512_init sha512_process __hide_aliasing_typecast md5_vector hmac_md5_vector SHA1Transform sha1_vector sha256_vector sha256_prf_bits hmac_sha256 sha384_vector sha512_vector tls_connection_client_hello_ext tls_connection_decrypt tls_connection_deinit tls_connection_enable_workaround tls_connection_encrypt tls_connection_established tls_connection_export_key tls_connection_get_eap_fast_key tls_connection_get_failed tls_connection_get_random tls_connection_get_read_alerts tls_connection_get_success_data tls_connection_get_write_alerts tls_connection_handshake tls_connection_init tls_connection_peer_serial_num tls_connection_remove_session tls_connection_resumed tls_connection_server_handshake tls_connection_set_cipher_list tls_connection_set_params tls_connection_set_success_data tls_connection_set_success_data_resumed tls_connection_set_verify tls_connection_shutdown tls_deinit tls_get_cipher tls_get_errors tls_get_version tls_global_set_params tls_global_set_verify tls_init channel_width_to_int ht_supported vht_supported wpa_driver_nl80211_ops eap_get_id eap_get_type eap_hdr_len_valid eap_hdr_validate eap_msg_alloc eap_update_len eap_allowed_method eap_clear_config_otp eap_get_config eap_get_config_blob eap_get_config_fragment_size eap_get_config_identity eap_get_config_new_password eap_get_config_otp eap_get_config_password eap_get_config_password2 eap_get_config_phase1 eap_get_config_phase2 eap_get_eapKeyData eap_get_eapRespData eap_get_eapSessionId eap_get_phase2_type eap_get_phase2_types eap_invalidate_cached_session eap_is_wps_pbc_enrollee eap_is_wps_pin_enrollee eap_key_available eap_notify_lower_layer_success eap_notify_pending eap_notify_success eap_peer_erp_free_keys eap_peer_erp_init eap_peer_finish eap_peer_get_eap_method eap_peer_get_methods eap_peer_get_type eap_peer_sm_deinit eap_peer_sm_init eap_peer_sm_step eap_peer_was_failure_expected eap_register_scard_ctx eap_set_anon_id eap_set_config_blob eap_set_external_sim eap_set_fast_reauth eap_set_force_disabled eap_set_workaround eap_sm_abort eap_sm_buildIdentity eap_sm_get_method_name eap_sm_get_status eap_sm_notify_ctrl_attached eap_sm_request_identity eap_sm_request_new_password eap_sm_request_otp eap_sm_request_passphrase eap_sm_request_password eap_sm_request_pin eap_sm_request_sim eap_sm_set_ext_pw_ctx eap_get_name eap_get_names eap_get_names_as_string_array eap_peer_method_alloc eap_peer_method_register eap_peer_unregister_methods eap_erp_update_identity eap_get_imsi eap_get_interface eap_get_method eap_get_serial_num eap_log_msg eap_server_get_eap_method eap_server_sm_deinit eap_server_sm_init eap_server_sm_step eap_sm_method_pending eap_sm_pending_cb eap_sm_process_nak eap_user_free eap_user_get rand eap_server_method_alloc eap_server_method_register printf_encode eapol_auth_eap_pending_cb eapol_sm_build_erp_reauth_start eapol_sm_configure eapol_sm_deinit eapol_sm_erp_flush eapol_sm_failed eapol_sm_get_erp_info eapol_sm_get_key eapol_sm_get_method_name eapol_sm_get_mib eapol_sm_get_session_id eapol_sm_get_status eapol_sm_init eapol_sm_invalidate_cached_session eapol_sm_notify_cached eapol_sm_notify_config eapol_sm_notify_ctrl_attached eapol_sm_notify_ctrl_response eapol_sm_notify_eap_fail eapol_sm_notify_eap_success eapol_sm_notify_logoff eapol_sm_notify_lower_layer_success eapol_sm_notify_pmkid_attempt eapol_sm_notify_portControl eapol_sm_notify_portEnabled eapol_sm_notify_portValid eapol_sm_notify_tx_eapol_key eapol_sm_process_erp_finish eapol_sm_register_scard_ctx eapol_sm_request_reauth eapol_sm_rx_eapol eapol_sm_set_ext_pw_ctx eapol_sm_step eapol_sm_update_erp_next_seq_num htons if_nametoindex inet_ntoa ioctl l2_packet_deinit l2_packet_get_ip_addr l2_packet_get_own_addr l2_packet_init l2_packet_init_bridge l2_packet_notify_auth_start l2_packet_receive l2_packet_set_packet_filter send setsockopt pmksa_cache_add pmksa_cache_add_entry pmksa_cache_clear_current pmksa_cache_deinit pmksa_cache_flush pmksa_cache_get pmksa_cache_get_current pmksa_cache_get_opportunistic pmksa_cache_head pmksa_cache_init pmksa_cache_list pmksa_cache_set_current pmksa_candidate_add pmksa_candidate_free rsn_preauth_candidate_process rsn_preauth_deinit rsn_preauth_get_status rsn_preauth_in_progress rsn_preauth_init rsn_preauth_scan_result rsn_preauth_scan_results wpa_parse_wpa_ie wpa_eapol_key_send wpa_fils_is_completed wpa_gen_wpa_ie wpa_sm_aborted_cached wpa_sm_deinit wpa_sm_drop_sa wpa_sm_get_key_mgmt wpa_sm_get_mib wpa_sm_get_p2p_ip_addr wpa_sm_get_status wpa_sm_has_ptk wpa_sm_init wpa_sm_key_request wpa_sm_notify_assoc wpa_sm_notify_disassoc wpa_sm_ocv_enabled wpa_sm_parse_own_wpa_ie wpa_sm_pmf_enabled wpa_sm_pmksa_cache_add wpa_sm_pmksa_cache_add_entry wpa_sm_pmksa_cache_flush wpa_sm_pmksa_cache_head wpa_sm_pmksa_cache_list wpa_sm_pmksa_exists wpa_sm_rx_eapol wpa_sm_set_ap_rsn_ie wpa_sm_set_ap_wpa_ie wpa_sm_set_assoc_wpa_ie wpa_sm_set_assoc_wpa_ie_default wpa_sm_set_config wpa_sm_set_eapol wpa_sm_set_fast_reauth wpa_sm_set_fils_cache_id wpa_sm_set_ifname wpa_sm_set_own_addr wpa_sm_set_param wpa_sm_set_pmk wpa_sm_set_pmk_from_pmksa wpa_sm_set_ptk_kck_kek wpa_sm_set_rx_replay_ctr wpa_sm_set_scard_ctx wpa_sm_update_replay_ctr wpa_supplicant_parse_ies wpa_supplicant_send_2_of_4 wpa_supplicant_send_4_of_4 __select_time64 alarm eloop_cancel_timeout_one eloop_register_signal_reconfig eloop_register_sock eloop_terminated eloop_unregister_sock eloop_wait_for_read_sock signal bitfield_is_set buf_shift_right cstr_token freq_range_list_str get_param has_ctrl_char has_newline hwaddr_aton2 hwaddr_compact_aton hwaddr_mask_txt hwaddr_masked_aton int_array_concat int_array_len int_array_sort_unique is_ctrl_char is_hex printf_decode random_mac_addr random_mac_addr_keep_oui rssi_to_rcpi strrchr utf8_escape utf8_unescape wpa_scnprintf wpa_snprintf_hex_sep wpa_snprintf_hex_uppercase hostapd_ip_txt inet_aton __clock_gettime64 __gettimeofday_time64 __gmtime64 __localtime64 __mktime64 access calloc daemon execv fdatasync fflush fileno fork fprintf fread fseek ftell getcwd getpid os_exec os_fdatasync os_file_exists os_mktime os_setenv os_sleep os_unsetenv perror random setenv sleep unlink unsetenv usleep waitpid ieee80211_radiotap_iterator_init ieee80211_radiotap_iterator_next fcntl fdopen fputc open printf putchar setvbuf stdout vfprintf vprintf wpa_msg_global wpa_msg_global_ctrl wpa_msg_global_only abort wpabuf_alloc_ext_data wpabuf_clear_free wpabuf_concat wpabuf_printf wpabuf_zeropad set_running_wpa wpa_main wpa_supplicant_add_iface wpa_supplicant_deinit wpa_supplicant_full_license1 wpa_supplicant_full_license2 wpa_supplicant_full_license3 wpa_supplicant_full_license4 wpa_supplicant_full_license5 wpa_supplicant_init wpa_supplicant_license wpa_supplicant_run wpa_supplicant_version wpa_blacklist_add wpa_blacklist_clear wpa_blacklist_del wpa_blacklist_get calculate_update_time hw_magiclink_bss_add p2p_parse_dev_addr radio_work_pending wpa_bss_anqp_alloc wpa_bss_anqp_unshare_alloc wpa_bss_deinit wpa_bss_ext_capab wpa_bss_flush wpa_bss_flush_by_age wpa_bss_get wpa_bss_get_bit_rates wpa_bss_get_bssid wpa_bss_get_bssid_latest wpa_bss_get_id wpa_bss_get_id_range wpa_bss_get_ie wpa_bss_get_max_rate wpa_bss_get_p2p_dev_addr wpa_bss_get_vendor_ie wpa_bss_get_vendor_ie_beacon wpa_bss_get_vendor_ie_multi wpa_bss_get_vendor_ie_multi_beacon wpa_bss_init wpa_bss_remove wpa_bss_update_end wpa_bss_update_scan_res wpa_bss_update_start wpa_scan_get_ie wpa_scan_get_vendor_ie wpa_scan_get_vendor_ie_multi wpa_supplicant_filter_bssid_match wpas_notify_bss_added wpas_notify_bss_freq_changed wpas_notify_bss_ies_changed wpas_notify_bss_mode_changed wpas_notify_bss_privacy_changed wpas_notify_bss_rates_changed wpas_notify_bss_removed wpas_notify_bss_rsnie_changed wpas_notify_bss_seen wpas_notify_bss_signal_changed wpas_notify_bss_wpaie_changed wpas_notify_bss_wps_changed wps_is_addr_authorized wps_is_selected_pbc_registrar inet_ntop wpa_config_add_cred wpa_config_add_network wpa_config_add_prio_network wpa_config_alloc_empty wpa_config_debug_dump_networks wpa_config_dump_values wpa_config_flush_blobs wpa_config_foreach_network wpa_config_free wpa_config_free_cred wpa_config_free_ssid wpa_config_get wpa_config_get_all wpa_config_get_cred wpa_config_get_cred_no_key wpa_config_get_global_field_name wpa_config_get_network wpa_config_get_no_key wpa_config_get_num_global_field_names wpa_config_get_value wpa_config_process_global wpa_config_remove_cred wpa_config_remove_network wpa_config_set wpa_config_set_cred wpa_config_set_network_defaults wpa_config_set_quoted wpa_config_update_prio_list wpa_config_update_psk wpa_config_read wpa_config_write ap_ctrl_iface_chanswitch ap_ctrl_iface_sta ap_ctrl_iface_sta_deauthenticate ap_ctrl_iface_sta_disassociate ap_ctrl_iface_sta_first ap_ctrl_iface_sta_next ap_ctrl_iface_wpa_get_status disallowed_bssid disallowed_ssid free_bss_tmp_disallowed hw_magiclink_ctrl_iface_update_network hw_magiclink_p2p_ctrl_connect ibss_rsn_start p2p_flush p2p_get_peer_info p2p_get_peer_info_txt p2p_get_state_txt p2p_group_get_client_interface_addr p2p_set_client_discoverability p2p_set_disc_int p2p_set_listen_channel p2p_set_managed_oper p2p_set_override_pref_op_chan p2p_set_peer_filter p2p_set_ssid_postfix radio_add_work radio_remove_works radio_work_done scan_only_handler strncasecmp wpa_supplicant_add_network wpa_supplicant_ap_wps_pbc wpa_supplicant_ap_wps_pin wpa_supplicant_cancel_sched_scan wpa_supplicant_connect wpa_supplicant_ctrl_iface_ctrl_rsp_handle wpa_supplicant_ctrl_iface_process wpa_supplicant_deauthenticate wpa_supplicant_disable_network wpa_supplicant_enable_network wpa_supplicant_event wpa_supplicant_get_iface wpa_supplicant_global_ctrl_iface_process wpa_supplicant_reload_configuration wpa_supplicant_remove_iface wpa_supplicant_remove_network wpa_supplicant_req_scan wpa_supplicant_select_network wpa_supplicant_set_ap_scan wpa_supplicant_set_bss_expiration_age wpa_supplicant_set_bss_expiration_count wpa_supplicant_set_scan_interval wpa_supplicant_set_state wpa_supplicant_state_txt wpa_supplicant_stop_countermeasures wpa_supplicant_terminate_proc wpa_supplicant_update_channel_list wpa_supplicant_update_config wpas_abort_ongoing_scan wpas_ap_pmksa_cache_flush wpas_ap_pmksa_cache_list wpas_ap_stop_ap wpas_ctrl_radio_work_flush wpas_disable_mac_addr_randomization wpas_enable_mac_addr_randomization wpas_network_reenabled wpas_notify_network_bssid_set_changed wpas_notify_network_removed wpas_notify_network_type_changed wpas_notify_resume wpas_notify_suspend wpas_p2p_cancel wpas_p2p_connect wpas_p2p_ext_listen wpas_p2p_find wpas_p2p_get_persistent wpas_p2p_group_add wpas_p2p_group_add_persistent wpas_p2p_group_remove wpas_p2p_invite wpas_p2p_invite_group wpas_p2p_listen wpas_p2p_lo_start wpas_p2p_lo_stop wpas_p2p_presence_req wpas_p2p_prov_disc wpas_p2p_reject wpas_p2p_remove_client wpas_p2p_scan_result_text wpas_p2p_sd_cancel_request wpas_p2p_sd_request wpas_p2p_sd_request_asp wpas_p2p_sd_request_upnp wpas_p2p_sd_response wpas_p2p_sd_service_update wpas_p2p_search_delay wpas_p2p_service_add_asp wpas_p2p_service_add_bonjour wpas_p2p_service_add_upnp wpas_p2p_service_del_asp wpas_p2p_service_del_bonjour wpas_p2p_service_del_upnp wpas_p2p_service_flush wpas_p2p_service_flush_asp wpas_p2p_service_p2ps_id_exists wpas_p2p_set_cross_connect wpas_p2p_set_noa wpas_p2p_stop_find wpas_p2p_unauthorize wpas_p2p_update_channel_list wpas_request_connection wpas_request_disconnection wpas_rrm_send_neighbor_rep_request wpas_start_pno wpas_stop_pno wpas_vendor_elem wpas_vendor_elem_remove wpas_vendor_elem_update wpas_wmm_ac_addts wpas_wmm_ac_delts wpas_wmm_ac_status wpas_wps_ap_pin_disable wpas_wps_ap_pin_get wpas_wps_ap_pin_random wpas_wps_ap_pin_set wpas_wps_cancel wpas_wps_scan_result_text wpas_wps_start_pbc wpas_wps_start_pin wpas_wps_start_reg wps_dev_type_bin2str wps_generate_pin wps_is_selected_pin_registrar wps_pin_str_valid wps_registrar_flush htonl ntohs wpa_supplicant_ctrl_iface_deinit wpa_supplicant_ctrl_iface_init wpa_supplicant_ctrl_iface_wait wpa_supplicant_global_ctrl_iface_deinit wpa_supplicant_global_ctrl_iface_init eap_peer_wsc_register eap_register_methods ap_client_poll_ok ap_eapol_tx_status ap_mgmt_rx ap_mgmt_tx_cb ap_rx_from_unknown_sta ap_tx_status free_hw_features gas_query_rx ibss_rsn_deinit ibss_rsn_handle_auth ibss_rsn_init ibss_rsn_set_psk ibss_rsn_stop offchannel_cancel_remain_on_channel_cb offchannel_remain_on_channel_cb offchannel_send_action_tx_status p2p_in_progress p2p_stop_find radio_work_check_next run_mode wmm_ac_notify_assoc wmm_ac_restore_tspecs wmm_ac_rx_action wnm_bss_keep_alive_deinit wpa_clear_keys wpa_is_bss_tmp_disallowed wpa_scan_res_match wpa_set_wep_keys wpa_supplicant_ap_deinit wpa_supplicant_associate wpa_supplicant_cancel_auth_timeout wpa_supplicant_cancel_scan wpa_supplicant_ctrl_req_to_string wpa_supplicant_driver_init wpa_supplicant_enabled_networks wpa_supplicant_event_global wpa_supplicant_fast_associate wpa_supplicant_get_scan_results wpa_supplicant_get_ssid wpa_supplicant_initiate_eapol wpa_supplicant_mark_disassoc wpa_supplicant_notify_scanning wpa_supplicant_pick_network wpa_supplicant_req_auth_timeout wpa_supplicant_req_sched_scan wpa_supplicant_rsn_supp_set_config wpa_supplicant_rx_eapol wpa_supplicant_scard_init wpa_supplicant_set_default_scan_ies wpa_supplicant_set_non_wpa_policy wpa_supplicant_set_suites wpa_supplicant_set_wpa_none_key wpa_supplicant_update_mac_addr wpa_supplicant_update_scan_results wpas_ap_ch_switch wpas_ap_event_dfs_cac_aborted wpas_ap_event_dfs_cac_finished wpas_ap_event_dfs_cac_nop_finished wpas_ap_event_dfs_cac_started wpas_ap_event_dfs_radar_detected wpas_auth_failed wpas_auth_timeout_restart wpas_beacon_rep_scan_process wpas_clear_temp_disabled wpas_connection_failed wpas_driver_bss_selection wpas_get_ssid_pmf wpas_network_disabled wpas_notify_assoc_status_code wpas_notify_auth_changed wpas_notify_auth_status_code wpas_notify_bssid_changed wpas_notify_disconnect_reason wpas_notify_network_changed wpas_notify_network_request wpas_notify_preq wpas_notify_scan_done wpas_notify_scan_results wpas_notify_session_length wpas_notify_wps_event_pbc_overlap wpas_p2p_4way_hs_failed wpas_p2p_add_p2pdev_interface wpas_p2p_cancel_remain_on_channel_cb wpas_p2p_deauth_notif wpas_p2p_disassoc_notif wpas_p2p_disconnect wpas_p2p_interface_unavailable wpas_p2p_pbc_overlap_cb wpas_p2p_probe_req_rx wpas_p2p_remain_on_channel_cb wpas_p2p_rx_action wpas_p2p_scan_no_go_seen wpas_p2p_update_best_channels wpas_rrm_handle_link_measurement_request wpas_rrm_handle_radio_measurement_request wpas_rrm_process_neighbor_rep wpas_rrm_reset wpas_scan_restart_sched_scan wpas_scan_scheduled wpas_send_ctrl_req wpas_temp_disabled wpas_wps_notify_assoc wpas_wps_pbc_overlap wpas_wps_reenable_networks_pending wpas_wps_scan_pbc_overlap wpas_wps_searching wpas_wps_ssid_bss_match wpas_wps_ssid_wildcard_ok wpas_wps_update_ap_info ibss_rsn_rx_eapol wpas_notify_ap_scan_changed wpas_notify_blob_added wpas_notify_blob_removed wpas_notify_bss_tm_status wpas_notify_certification wpas_notify_debug_level_changed wpas_notify_debug_show_keys_changed wpas_notify_debug_timestamp_changed wpas_notify_eap_error wpas_notify_eap_status wpas_notify_iface_added wpas_notify_iface_removed wpas_notify_network_added wpas_notify_network_enabled_changed wpas_notify_network_selected wpas_notify_p2p_device_found wpas_notify_p2p_device_lost wpas_notify_p2p_find_stopped wpas_notify_p2p_go_neg_completed wpas_notify_p2p_go_neg_req wpas_notify_p2p_group_formation_failure wpas_notify_p2p_group_removed wpas_notify_p2p_group_started wpas_notify_p2p_invitation_received wpas_notify_p2p_invitation_result wpas_notify_p2p_provision_discovery wpas_notify_p2p_sd_request wpas_notify_p2p_sd_response wpas_notify_p2p_wps_failed wpas_notify_persistent_group_added wpas_notify_persistent_group_removed wpas_notify_roam_complete wpas_notify_roam_time wpas_notify_scanning wpas_notify_sta_authorized wpas_notify_state_changed wpas_notify_supplicant_deinitialized wpas_notify_supplicant_initialized wpas_notify_wps_credential wpas_notify_wps_event_fail wpas_notify_wps_event_m2d wpas_notify_wps_event_success wpas_p2p_network_removed wpas_p2p_notif_connected wpas_p2p_notif_disconnected wpas_p2p_notify_ap_sta_authorized wpas_wps_notify_scan_results get_mode verify_channel wpas_supp_op_class_ie wpa_supplicant_trigger_scan wpas_clear_beacon_rep_data wpas_p2p_in_progress wpas_rrm_refuse_request filter_scan_res get_shared_radio_freqs magiclink_prepare_scan p2p_scan_ie_buf_len scan_est_throughput scan_snr wpa_scan_clone_params wpa_scan_free_params wpa_scan_get_vendor_ie_beacon wpa_supplicant_cancel_delayed_sched_scan wpa_supplicant_delayed_sched_scan wpa_supplicant_update_scan_int wpas_build_ext_capab wpas_is_p2p_prioritized wpas_mac_addr_rand_scan_clear wpas_mac_addr_rand_scan_set wpas_p2p_scan_ie wpas_scan_reset_sched_scan wpas_sched_scan_plans_set wpas_update_random_addr_disassoc wpas_wps_get_req_type wps_ap_priority_compar wps_build_probe_req_ie wmm_ac_clear_saved_tspecs wmm_ac_notify_disassoc wmm_ac_save_tspecs add_freq ap_periodic dump_freq_data gas_query_deinit gas_query_init get_shared_radio_freqs_data hw_magiclink_connect_timeout ibss_mesh_setup_freq offchannel_deinit p2p_expire_peers p2p_get_cross_connect_disallowed p2p_set_vendor_elems radio_remove_pending_work wpa_bss_tmp_disallow wpa_supplicant_ap_rx_eapol wpa_supplicant_clear_status wpa_supplicant_create_ap wpa_supplicant_ctrl_req_from_string wpa_supplicant_get_eap_mode wpa_supplicant_init_eapol wpa_supplicant_init_wpa wpa_supplicant_reinit_autoscan wpa_supplicant_set_debug_params wpas_connect_work_done wpas_connect_work_free wpas_flush_fils_hlp_req wpas_freq_to_band wpas_get_bands wpas_init_ext_pw wpas_p2p_ap_setup_failed wpas_p2p_assoc_req_ie wpas_p2p_completed wpas_p2p_deinit wpas_p2p_deinit_iface wpas_p2p_handle_frequency_conflicts wpas_p2p_indicate_state_change wpas_p2p_init wpas_p2p_update_config wpas_set_pkcs11_engine_and_module_path wpas_update_random_addr wpas_valid_bss_ssid wpas_wps_deinit wpas_wps_init wpas_wps_terminate_pending wpas_wps_update_config wps_build_assoc_req_ie p2p_get_group_capab wpas_wps_eapol_cb hostapd_p2p_set_noa p2p_ie_text fputs hostapd_wps_update_ie is_nil_uuid rename wps_build_credential_wrap wps_config_methods_str2bin wps_device_data_free wps_free_pending_msgs wps_registrar_add_pin wps_registrar_button_pushed wps_registrar_complete wps_registrar_config_ap wps_registrar_deinit wps_registrar_get_info wps_registrar_init wps_registrar_probe_req_rx wps_registrar_update_ie wps_registrar_wps_cancel gas_anqp_add_element gas_anqp_build_comeback_resp gas_anqp_build_comeback_resp_buf gas_anqp_build_initial_req gas_anqp_build_initial_resp gas_anqp_build_initial_resp_buf gas_anqp_set_element_len gas_anqp_set_len gas_build_comeback_req gas_build_comeback_resp gas_build_initial_req gas_build_initial_resp aes_128_cbc_decrypt aes_128_cbc_encrypt bignum_cmp_d bignum_deinit bignum_exptmod bignum_get_unsigned_bin bignum_init bignum_set_unsigned_bin crypto_dh_derive_secret crypto_dh_init crypto_mod_exp dh5_derive_shared dh5_free dh5_init dh5_init_fixed dh_derive_shared dh_groups_get dh_init eap_wsc_build_frag_ack wps_deinit wps_get_msg wps_init wps_process_msg dev_type_list_match p2p_add_dev_from_go_neg_req p2p_add_dev_info p2p_add_device p2p_add_wps_vendor_extension p2p_assoc_req_ie p2p_attr_text p2p_authorize p2p_buf_add_action_hdr p2p_buf_add_capability p2p_buf_add_device_id p2p_buf_add_device_info p2p_buf_add_ext_listen_timing p2p_buf_add_ie_hdr p2p_buf_add_listen_channel p2p_buf_add_noa p2p_buf_add_p2p_interface p2p_buf_add_service_hash p2p_buf_add_service_instance p2p_buf_add_status p2p_buf_update_ie_hdr p2p_build_probe_resp_ies p2p_build_probe_resp_template p2p_build_ssid p2p_build_wps_ie p2p_channel_random_social p2p_channel_select p2p_channel_to_freq p2p_channels_dump p2p_channels_includes p2p_channels_intersect p2p_channels_remove_freqs p2p_channels_to_freqs p2p_channels_union_inplace p2p_clear_provisioning_info p2p_clear_timeout p2p_config_get_random_social p2p_connect p2p_connect_send p2p_continue_find p2p_copy_filter_devname p2p_dbg p2p_deauth_notif p2p_deinit p2p_dev_disc_req_cb p2p_dev_disc_resp_cb p2p_disassoc_notif p2p_err p2p_ext_listen p2p_find p2p_free_sd_queries p2p_freq_to_channel p2p_get_dev_addr p2p_get_device p2p_get_device_interface p2p_get_go_neg_peer p2p_get_interface_addr p2p_get_listen_channel p2p_get_oper_freq p2p_get_p2ps_adv_list p2p_get_peer_found p2p_get_provisioning_info p2p_go_complete p2p_go_disc_req_cb p2p_go_neg_failed p2p_go_neg_wait_timeout p2p_go_params p2p_group_formation_failed p2p_group_get_interface_addr p2p_group_info_parse p2p_group_is_client_connected p2p_group_presence_req p2p_info p2p_init p2p_invitation_req_cb p2p_invitation_resp_cb p2p_invite_send p2p_listen p2p_listen_cb p2p_listen_end p2p_loop_on_known_peers p2p_match_dev_type p2p_notify_scan_trigger_status p2p_parse p2p_parse_free p2p_parse_ies p2p_parse_p2p_ie p2p_peer_known p2p_prepare_channel p2p_presence_req p2p_probe_req_rx p2p_process_dev_disc_req p2p_process_dev_disc_resp p2p_process_go_disc_req p2p_process_go_neg_conf p2p_process_go_neg_req p2p_process_go_neg_resp p2p_process_invitation_req p2p_process_invitation_resp p2p_process_prov_disc_req p2p_process_prov_disc_resp p2p_random p2p_reject p2p_remove_wps_vendor_extensions p2p_reset_pending_pd p2p_rx_action p2p_rx_gas_comeback_req p2p_rx_gas_comeback_resp p2p_rx_gas_initial_req p2p_rx_gas_initial_resp p2p_scan_ie p2p_scan_res_handled p2p_scan_res_handler p2p_scan_result_text p2p_send_action p2p_send_action_cb p2p_send_dev_disc_req p2p_send_prov_disc_req p2p_service_add_asp p2p_service_del_asp p2p_service_flush_asp p2p_service_p2ps_id p2p_set_best_channels p2p_set_config_methods p2p_set_config_timeout p2p_set_country p2p_set_cross_connect p2p_set_dev_name p2p_set_intended_addr p2p_set_intra_bss_dist p2p_set_manufacturer p2p_set_model_name p2p_set_model_number p2p_set_no_go_freq p2p_set_oper_channel p2p_set_own_freq_preference p2p_set_own_pref_freq_list p2p_set_passphrase_len p2p_set_pref_chan p2p_set_pri_dev_type p2p_set_sec_dev_types p2p_set_serial_number p2p_set_state p2p_set_timeout p2p_set_uuid p2p_start_sd p2p_stop_find_for_freq p2p_stop_listen p2p_stop_listen_for_freq p2p_supported_freq p2p_unauthorize p2p_update_channel_list p2p_wps_method_pw_id p2p_wps_method_text p2p_wps_success_cb p2ps_prov_free wps_parse_msg p2p_buf_add_advertisement_id p2p_buf_add_channel_list p2p_buf_add_config_timeout p2p_buf_add_connection_capability p2p_buf_add_feature_capability p2p_buf_add_go_intent p2p_buf_add_group_bssid p2p_buf_add_group_id p2p_buf_add_intended_addr p2p_buf_add_invitation_flags p2p_buf_add_oob_go_neg_channel p2p_buf_add_operating_channel p2p_buf_add_persistent_group_info p2p_buf_add_pref_channel_list p2p_buf_add_public_action_hdr p2p_buf_add_session_id p2p_buf_add_session_info wps_build_uuid_e wps_build_version wps_build_wfa_ext p2p_group_go_discover p2p_check_pref_chan p2p_go_select_channel p2p_peer_channels_check p2p_prov_disc_req p2p_reselect_channel p2p_buf_add_group_info p2p_channels_union p2p_client_limit_reached p2p_get_group_num_members p2p_group_buf_add_id p2p_group_deinit p2p_group_force_beacon_update_ies p2p_group_get_common_freqs p2p_group_get_config p2p_group_get_freq p2p_group_init p2p_group_is_group_id_match p2p_group_notif_formation_done p2p_group_notif_noa p2p_group_update_ies p2p_iterate_group_members p2p_loop_on_all_groups p2p_invite p2p_parse_ies_separate p2p_pending_sd_req p2p_sd_cancel_request p2p_sd_request p2p_sd_response p2p_sd_service_update p2p_channels_includes_freq p2p_get_pref_freq p2p_supported_freq_cli p2p_supported_freq_go bignum_add bignum_cmp bignum_get_unsigned_bin_len bignum_mul bignum_mulmod bignum_sub base64_decode base64_encode base64_url_decode base64_url_encode uuid_random wps_attr_text wps_build_assoc_state wps_build_config_error wps_build_config_methods wps_build_dev_name wps_build_dev_password_id wps_build_manufacturer wps_build_model_name wps_build_model_number wps_build_primary_dev_type wps_build_req_dev_type wps_build_req_type wps_build_resp_type wps_build_rf_bands wps_build_secondary_dev_type wps_enrollee_get_msg wps_enrollee_process_msg wps_get_uuid_e wps_ie_encapsulate wps_registrar_get_msg wps_registrar_invalidate_pin wps_registrar_process_msg wps_registrar_unlock_pin wps_build_ap_channel wps_build_auth_type_flags wps_build_authenticator wps_build_conn_type_flags wps_build_encr_settings wps_build_encr_type_flags wps_build_enrollee_nonce wps_build_key_wrap_auth wps_build_mac_addr wps_build_msg_type wps_build_public_key wps_build_registrar_nonce wps_build_rf_bands_attr wps_process_ap_settings wps_process_authenticator wps_process_cred wps_process_key_wrap_auth wps_build_wsc_ack wps_build_wsc_nack wps_decrypt_encr_settings wps_derive_keys wps_derive_psk wps_fail_event wps_kdf wps_pbc_active_event wps_pbc_disable_event wps_pbc_overlap_event wps_pbc_timeout_event wps_pin_checksum wps_pwd_auth_fail_event wps_success_event wps_build_device_attrs wps_build_os_version wps_build_serial_number wps_build_vendor_ext wps_build_vendor_ext_m1 wps_process_device_attrs wps_process_os_version wps_process_rf_bands wps_process_vendor_ext_m1 wps_cb_new_psk wps_device_store wps_authorized_macs wps_build_cred wps_registrar_pbc_overlap wps_registrar_selected_registrar_changed ap_switch_channel wpa_supplicant_ap_mac_addr_filter wpa_supplicant_ap_pwd_auth_fail wpa_supplicant_ap_update_beacon wpa_supplicant_ap_wps_cancel wpa_supplicant_conf_ap_ht wpas_p2p_ap_deinit wpas_p2p_get_ht40_mode wpas_p2p_get_vht160_center wpas_p2p_get_vht80_center wpas_p2p_group_init wpas_p2p_new_psk_cb wpas_p2p_wps_failed wpas_p2p_wps_success gas_query_req gas_query_stop offchannel_send_action offchannel_send_action_done pmf_in_use offchannel_clear_pending_action_tx offchannel_pending_action_tx wpas_p2p_listen_start hw_magiclink_add_group_interface hw_magiclink_create_iface hw_magiclink_init_group_interface wpas_get_p2p_client_iface wpas_get_p2p_go_iface wpas_p2p_mac_setup wpas_p2p_notif_pbc_overlap wpas_p2p_wps_eapol_cb wpas_sd_request wpas_sd_response wpas_wps_er_start wpas_wps_er_stop hw_magiclink_scan hw_wpas_p2p_group_add convert2width genl_connect genl_ctrl_resolve genlmsg_attrdata genlmsg_attrlen genlmsg_put get_bss_ifindex if_indextoname is_ap_interface is_sta_interface linux_br_add linux_br_add_if linux_br_del linux_br_del_if linux_br_get linux_get_ifhwaddr linux_iface_up linux_master_get linux_set_iface_flags linux_set_ifhwaddr netlink_deinit netlink_init netlink_send_oper_ifla nl80211_bss_msg nl80211_cmd nl80211_cmd_msg nl80211_create_iface nl80211_create_monitor_interface nl80211_drv_msg nl80211_dump_scan nl80211_get_assoc_freq nl80211_get_assoc_ssid nl80211_get_hw_feature_data nl80211_get_link_noise nl80211_get_link_signal nl80211_get_wiphy_index nl80211_iftype_str nl80211_mark_disconnected nl80211_remove_iface nl80211_remove_monitor_interface nl80211_send_monitor nl_cb_alloc nl_cb_clone nl_cb_err nl_cb_put nl_cb_set nl_recvmsgs nl_send_auto_complete nl_socket_add_membership nl_socket_alloc_cb nl_socket_free nl_socket_get_fd nl_socket_set_buffer_size nl_socket_set_nonblocking nla_data nla_get_u16 nla_get_u32 nla_get_u64 nla_get_u8 nla_len nla_nest_end nla_nest_start nla_next nla_ok nla_parse nla_parse_nested nla_put nla_put_flag nla_put_nested nla_put_string nla_put_u16 nla_put_u32 nla_put_u64 nla_put_u8 nlmsg_alloc nlmsg_data nlmsg_free nlmsg_hdr process_bss_event process_global_event recvmsg rfkill_deinit rfkill_init rfkill_is_blocked send_and_recv_msgs strnlen wpa_driver_nl80211_abort_scan wpa_driver_nl80211_authenticate_retry wpa_driver_nl80211_capa wpa_driver_nl80211_get_scan_results wpa_driver_nl80211_mlme wpa_driver_nl80211_scan wpa_driver_nl80211_scan_timeout wpa_driver_nl80211_sched_scan wpa_driver_nl80211_set_mode wpa_driver_nl80211_stop_sched_scan write nla_get_flag nla_get_string nla_type recv readlink read realpath strcpy_s memcpy_s strncpy_s fscanf_s vfscanf_s fwscanf_s vfwscanf_s gets_s stdin memcpy_sOptAsm memcpy_sOptTc memmove_s memset_s memset_sOptAsm memset_sOptTc scanf_s vscanf_s SecClearDestBuf SecInputS __ctype_get_mb_cur_max feof fgetc isxdigit mbtowc strtod ungetc SecClearDestBufW SecInputSW fgetwc iswspace ungetwc wcstombs wctomb SecVsnprintfImpl vsprintf SecVswprintfImpl snprintf_s snprintf_truncated_s vsnprintf_s vsnprintf_truncated_s sprintf_s vsprintf_s sscanf_s vsscanf_s strcat_s strcpy_error strncat_s strncpy_error strtok_s swprintf_s vswprintf_s swscanf_s vswscanf_s vwscanf_s wcscat_s wcscpy_s wcsncat_s wcsncpy_s wcstok_s wmemcpy_s wmemmove_s wscanf_s libnl_share.z.so libc.so libwpa.z.so 
 ~ } WPS-ER-AP-ADD %s %02x:%02x:%02x:%02x:%02x:%02x pri_dev_type=%s wps_state=%d |%s|%s|%s|%s|%s|%s| WPS-ER-ENROLLEE-ADD %s %02x:%02x:%02x:%02x:%02x:%02x M1=%d config_methods=0x%x dev_passwd_id=%d pri_dev_type=%s |%s|%s|%s|%s|%s| network={ cred={ nl80211: DFS event on freq %d MHz, ht: %d, offset: %d, width: %d, cf1: %dMHz, cf2: %dMHz freq=%u MHz Own preferred frequency list[%u]=%u MHz WPS: Scan only frequency %u MHz nl80211: IBSS on frequency %u MHz nl80211: Scan frequency %u MHz Unsupported frequency %u MHz in_listen=%d drv_in_listen=%d when received P2PS Probe Request at %u MHz; own Listen channel %u, pending listen freq %u MHz Operating frequency changed from %u to %u MHz Do not reply to Probe Request frame that was received on %u MHz while waiting to start Listen state on %u MHz nl80211: Associated on %u MHz nl80211: IBSS-joined on %u MHz Update peer %02x:%02x:%02x:%02x:%02x:%02x Listen channel: %u -> %u MHz nl80211: Operating frequency for the associated BSS from scan results: %u MHz P2P: Cancel a GO move from freq=%d MHz P2P: Move GO from freq=%d MHz Received Action frame: SA=%02x:%02x:%02x:%02x:%02x:%02x Category=%u DataLen=%d freq=%d MHz P2P: Set GO freq based on configured frequency %d MHz P2P: Scan only GO preferred frequency %d MHz Invitation processing forced frequency %d MHz P2P: Scan retry %d for the peer %02x:%02x:%02x:%02x:%02x:%02x at %d MHz set_dfs_state 0x%X for %d MHz Can't set DFS state for freq %d MHz Updated peer (GO) operating channel preference from %d MHz to %d MHz Stop listen on %d MHz to allow a frame to be sent immediately on %d MHz DFS CAC aborted on %d MHz DFS offload CAC started on %d MHz DFS CAC started on %d MHz DFS radar detected on %d MHz DFS Pre-CAC expired on %d MHz DFS NOP finished on %d MHz DFS CAC finished on %d MHz DFS start CAC on %d MHz P2P: Set GO freq based on best 5 GHz channel %d MHz P2P: Set GO freq based on best 2.4 GHz channel %d MHz P2P: Set GO freq based on best overall channel %d MHz Next progressive search channel: reg_class %u channel %u -> %d MHz Update Listen frequency based on DS Parameter Set IE: %d -> %d MHz Updated peer %02x:%02x:%02x:%02x:%02x:%02x Listen channel (Probe Request): %d -> %d MHz Unsupported AP mode frequency: %d MHz Mode: %s Channel: %d Frequency: %d MHz P2P: Use best 5 GHz band channel: %d MHz P2P: Use random 5 GHz band channel: %d MHz P2P: Use best 2.4 GHz band channel: %d MHz P2P: Use random 2.4 GHz band channel: %d MHz P2P: Target GO operating frequency from P2P peer table: %d MHz Own frequency preference: %d MHz Peer operating channel preference: %d MHz Selected operating channel - %d MHz 40 MHz affected channel range: [%d,%d] MHz 80+80 MHz 160 MHz 40 MHz Fallback to 20 MHz ap_max_inactivity p2p_go_max_inactivity disassociated due to inactivity EAP method updated anonymous_identity imsi_identity EAP: using anonymous identity EAP-Identity: Peer identity EAP: using real identity EAP: using method re-auth identity EAP-WSC: Unexpected identity Failed to allocate memory for EAP identity Identity wps_priority user_priority sp_priority WMM: Surplus Bandwidth Allowance not greater than unity Requested client does not support client discoverability Requested client was not found in any group or did not support client discoverability Failed to start listen mode for client discoverability Invalid P2PS PD connection capability P2PS PD Response missing capability Failed to start AP functionality Failed to set country P2P: Peer country Invalid scan plans entry Station %02x:%02x:%02x:%02x:%02x:%02x has lost its driver entry P2P: Overwrite pending interface address for join from %02x:%02x:%02x:%02x:%02x:%02x to %02x:%02x:%02x:%02x:%02x:%02x based on newly discovered P2P peer entry P2P: Create a new persistent group entry P2P: Update existing persistent group entry Failed to allocate AP information entry Failed to parse P2P IE for a device entry Failed to allocate memory for multi-BSS entry nl80211: Trigger single channel scan to refresh cfg80211 BSS entry nl80211: Scan results for missing cfg80211 BSS entry RSN: %s current PMKSA entry WPA: reusing previous PMKSA entry RSN: Message 1/4 PMKID from PMKSA entry retry regulatory gas-query Failed to initialize GAS query temporary tls_library Channel %d is not allowed as primary secondary Deny BSSID hint any GO P2P Device Address any CTRL_IFACE: SELECT_NETWORK any BSSID any any %s: Invalid SA=%02x:%02x:%02x:%02x:%02x:%02x in received indication - ignore this indication silently MGMT: Invalid SA=%02x:%02x:%02x:%02x:%02x:%02x in received frame - ignore this frame silently WPS: Workaround - assume Enrollee does not advertise supported encryption types correctly WPS: Workaround - assume Enrollee does not advertise supported authentication types correctly nl80211: Vendor command: insufficient buffer space for reply wpa_msg_global_only owe_only NL80211_TXRATE_LEGACY=OFDM-only * Local state change only nl80211: Join IBSS request sent successfully nl80211: Leave IBSS request sent successfully nl80211: Connect request send successfully nl80211: Association request send successfully nl80211: Authentication request send successfully WPS: External Registrar registration completed successfully WPS: Negotiation completed successfully CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully Traffic stream was created successfully WPA: wpa_sm_step() called recursively WPS: AP PIN disabled indefinitely First radio work item in the queue - schedule start immediately Off-channel: Already on requested channel; send Action frame immediately acs_survey wps_nfc_dh_privkey peerkey wpa_strict_rekey wpa_group_rekey wpa_ptk_rekey wpa_gmk_rekey wpa_group_setkeys: Unexpected GKeyDoneStations=%d when starting new GTK rekey wps_nfc_dh_pubkey EAP-WSC: Invalid new_key wep_default_key supp_set_key auth_set_key wpa_driver_nl80211_set_key wep_key private_key failed to generate a new broadcast key failed to configure a new broadcast key broadcast key Could not encrypt key EAPOL: using part of EAP keying material data encryption key EAPOL: EAPOL-Key replay counter did not increase - ignoring key WPS: Failed to derive DH shared key WPS: DH shared key DH: shared key WPS: Received public key IEEE 802.1X: New default WEP key Could not generate random WEP key Individual WEP key SUPP: set_key - key AUTH: set_key - key EAPOL: Decrypted(RC4) key EAPOL: processKey WPS: KeyWrapKey WPS: AuthKey WPS: DHKey WPA: Use BSSID (%02x:%02x:%02x:%02x:%02x:%02x) as the destination for EAPOL-Key WPA: IP Address Request in EAPOL-Key WPA: MAC Address in EAPOL-Key WPA: IP Address Allocation in EAPOL-Key WPA: Reassoc Deadline in EAPOL-Key WPA: KeyLifetime in EAPOL-Key WPA: IGTK in EAPOL-Key WPA: GTK in EAPOL-Key WPA: FTIE in EAPOL-Key WPA: MDIE in EAPOL-Key WPA: RSN IE in EAPOL-Key WPA: WPA IE in EAPOL-Key WPA: PMKID in EAPOL-Key No eapKeyData available for encrypting and signing EAPOL-Key WPA: TX EAPOL-Key WPA: RX EAPOL-Key EAPOL-Key WPA: Group Key WPS: Use PSK format for Network Key WPS: Workaround - try to skip unexpected octet after Network Key WPS: Credential did not include Network Key WPS: Invalid Network Key WPS: Network Key WPS: DH Private Key WPS: DH peer Public Key WPS: DH own Public Key WPS: * Public Key p2p_listen command pending already not-ready ignore channel switch since the interface is not yet ready frequency p2p_go_freq_change_policy Channel list update timeout - try to continue anyway Beacon Report: Failed to allocate freqs array virtual_display physical_display Peer %02x:%02x:%02x:%02x:%02x:%02x requested us to show a PIN on display Peer %02x:%02x:%02x:%02x:%02x:%02x accepted to show a PIN on display WPS: Prefer PSK format key due to Enrollee not supporting display PIN from peer Display sched_scan_start_delay p2p_search_delay blocktx nl80211: Cancel TX frame wait: cookie=0x%llx nl80211: Update send_action_cookie from 0x%llx to 0x%llx nl80211: Drop oldest pending send action cookie 0x%llx nl80211: Cancel remain-on-channel with cookie 0x%llx nl80211: Frame TX command accepted%s; cookie 0x%llx p2p_ssid_postfix nl80211: Frequency set succeeded for ht2040 coex WPA: Ignored EAPOL-Key (Pairwise) with non-zero key index WPS: Credential did not include Network Index wep_tx_keyidx cwmax os_version=%08x WPS: OS Version %08x Unsupported ANQP vendor OUI-type %08x %s: Invalid HW-addr family 0x%04x HT: STA %02x:%02x:%02x:%02x:%02x:%02x HT Capabilities Info: 0x%04x \x%02x %02x%02x%02x%02x-%02x%02x-%02x%02x-%02x%02x-%02x%02x%02x%02x%02x%02x WPA: IGTK keyid %d pn %02x%02x%02x%02x%02x%02x RSN: Search for FILS Cache Identifier %02x%02x WPS: Multi-AP Extension 0x%02x Multi-AP IE with unexpected value 0x%02x %s%02x P2P: * Capability dev=%02x group=%02x RRM: Ignore scan result for %02x:%02x:%02x:%02x:%02x:%02x due to mismatching TSF BSSID%02x:%02x:%02x:%02x:%02x:%02x EVENT_TX_STATUS pending_dst=%02x:%02x:%02x:%02x:%02x:%02x TX EAPOL: dst=%02x:%02x:%02x:%02x:%02x:%02x * bssid_hint=%02x:%02x:%02x:%02x:%02x:%02x P2P: Invitation result - status=%d peer=%02x:%02x:%02x:%02x:%02x:%02x P2P: New PSK for addr=%02x:%02x:%02x:%02x:%02x:%02x p2p_dev_addr=%02x:%02x:%02x:%02x:%02x:%02x P2P: Add new PSK for p2p_dev_addr=%02x:%02x:%02x:%02x:%02x:%02x P2P-DEVICE-LOST p2p_dev_addr=%02x:%02x:%02x:%02x:%02x:%02x P2P: BSS %02x:%02x:%02x:%02x:%02x:%02x group_capab=0x%x go_dev_addr=%02x:%02x:%02x:%02x:%02x:%02x P2P: Two 4-way handshake failures for a P2P group - go_dev_addr=%02x:%02x:%02x:%02x:%02x:%02x Unexpected GO Negotiation Request SA=%02x:%02x:%02x:%02x:%02x:%02x != dev_addr=%02x:%02x:%02x:%02x:%02x:%02x %sifname=%s sta_addr=%02x:%02x:%02x:%02x:%02x:%02x WMM AC: DELTS frame has been received TSID=%u addr=%02x:%02x:%02x:%02x:%02x:%02x WPS: Removing PBC session for addr=%02x:%02x:%02x:%02x:%02x:%02x P2P: Add new PSK for addr=%02x:%02x:%02x:%02x:%02x:%02x P2P: New PSK for addr=%02x:%02x:%02x:%02x:%02x:%02x TSPEC-REMOVED tsid=%d addr=%02x:%02x:%02x:%02x:%02x:%02x addr=%02x:%02x:%02x:%02x:%02x:%02x %s: addr=%02x:%02x:%02x:%02x:%02x:%02x mask=%02x:%02x:%02x:%02x:%02x:%02x p2p_group_client: dev=%02x:%02x:%02x:%02x:%02x:%02x iface=%02x:%02x:%02x:%02x:%02x:%02x * prev_bssid=%02x:%02x:%02x:%02x:%02x:%02x BSS table not empty after flush: %u entries, current_bss=%p bssid=%02x:%02x:%02x:%02x:%02x:%02x pending_bssid=%02x:%02x:%02x:%02x:%02x:%02x * bssid=%02x:%02x:%02x:%02x:%02x:%02x WPS: %s: Deauth sta=%02x:%02x:%02x:%02x:%02x:%02x Associated to a new BSS: BSSID=%02x:%02x:%02x:%02x:%02x:%02x * BSSID=%02x:%02x:%02x:%02x:%02x:%02x WPA: PTK derivation - A1=%02x:%02x:%02x:%02x:%02x:%02x A2=%02x:%02x:%02x:%02x:%02x:%02x nl80211: MLME event %d (%s) on %s(%02x:%02x:%02x:%02x:%02x:%02x) A1=%02x:%02x:%02x:%02x:%02x:%02x A2=%02x:%02x:%02x:%02x:%02x:%02x %02x:%02x:%02x:%02x:%02x:%02x/%02x:%02x:%02x:%02x:%02x:%02x Expiring old peer entry %02x:%02x:%02x:%02x:%02x:%02x GAS: Remove temporary STA entry %02x:%02x:%02x:%02x:%02x:%02x P2P: * Session ID: %x %02x:%02x:%02x:%02x:%02x:%02x CTRL-EVENT-BSS-REMOVED %u %02x:%02x:%02x:%02x:%02x:%02x CTRL-EVENT-BSS-ADDED %u %02x:%02x:%02x:%02x:%02x:%02x Sending Device Discoverability Request to GO %02x:%02x:%02x:%02x:%02x:%02x for client %02x:%02x:%02x:%02x:%02x:%02x P2P: Remove client %02x:%02x:%02x:%02x:%02x:%02x GAS: Use a new random transmitter address %02x:%02x:%02x:%02x:%02x:%02x GAS: Use the previously selected random transmitter address %02x:%02x:%02x:%02x:%02x:%02x nl80211: Assigned new virtual interface address %02x:%02x:%02x:%02x:%02x:%02x Using random MAC address %02x:%02x:%02x:%02x:%02x:%02x * address %02x:%02x:%02x:%02x:%02x:%02x GO P2P Device Address %02x:%02x:%02x:%02x:%02x:%02x Invitation for GO Device Address %02x:%02x:%02x:%02x:%02x:%02x P2P: GO Device Address %02x:%02x:%02x:%02x:%02x:%02x P2P: * P2P Group ID: Device Address %02x:%02x:%02x:%02x:%02x:%02x P2P: * Intended P2P Interface Address %02x:%02x:%02x:%02x:%02x:%02x WPS: Enrollee MAC Address %02x:%02x:%02x:%02x:%02x:%02x WPS: MAC Address %02x:%02x:%02x:%02x:%02x:%02x WPS-ER-ENROLLEE-REMOVE %s %02x:%02x:%02x:%02x:%02x:%02x %s: Expire STA tracking entry for %02x:%02x:%02x:%02x:%02x:%02x %s: Add STA tracking entry for %02x:%02x:%02x:%02x:%02x:%02x RSN: Flush PMKSA cache entry for %02x:%02x:%02x:%02x:%02x:%02x RSN: expired PMKSA cache entry for %02x:%02x:%02x:%02x:%02x:%02x RSN: added PMKSA cache entry for %02x:%02x:%02x:%02x:%02x:%02x RSN: added opportunistic PMKSA cache entry for %02x:%02x:%02x:%02x:%02x:%02x Failed to add STA entry for %02x:%02x:%02x:%02x:%02x:%02x %s: Removed ap_sta_deauth_cb_timeout timeout for %02x:%02x:%02x:%02x:%02x:%02x %s: Removed ap_sta_disassoc_cb_timeout timeout for %02x:%02x:%02x:%02x:%02x:%02x %s: %s: canceled wired ap_handle_timer timeout for %02x:%02x:%02x:%02x:%02x:%02x %s: Removed ap_sta_delayed_1x_auth_fail_cb timeout for %02x:%02x:%02x:%02x:%02x:%02x Missing neighbor report for %02x:%02x:%02x:%02x:%02x:%02x No pending SD response fragment for %02x:%02x:%02x:%02x:%02x:%02x WPA: Completing pending STA state machine deinit for %02x:%02x:%02x:%02x:%02x:%02x WPA: Registering pending STA state machine deinit for %02x:%02x:%02x:%02x:%02x:%02x Check inactivity: Could not get station info from kernel driver for %02x:%02x:%02x:%02x:%02x:%02x nl80211: Set PMK to the driver for %02x:%02x:%02x:%02x:%02x:%02x Enable peer filter for %02x:%02x:%02x:%02x:%02x:%02x %s: cancel ap_handle_timer for %02x:%02x:%02x:%02x:%02x:%02x EAPOL: External reauthentication trigger for %02x:%02x:%02x:%02x:%02x:%02x %s: Prune association for %02x:%02x:%02x:%02x:%02x:%02x Use PD-before-GO-Neg workaround for %02x:%02x:%02x:%02x:%02x:%02x nl80211: Set supplicant port %sauthorized for %02x:%02x:%02x:%02x:%02x:%02x P2P: Use P2P IE(s) from Beacon frame since no P2P IE(s) in Probe Response frames received for %02x:%02x:%02x:%02x:%02x:%02x BSS: No SSID IE included for %02x:%02x:%02x:%02x:%02x:%02x BSS: Too long SSID IE included for %02x:%02x:%02x:%02x:%02x:%02x P2PS: Setting default PIN for %02x:%02x:%02x:%02x:%02x:%02x nl80211: Delete PMKID for %02x:%02x:%02x:%02x:%02x:%02x nl80211: Add PMKID for %02x:%02x:%02x:%02x:%02x:%02x P2P: Setting PIN-1 for %02x:%02x:%02x:%02x:%02x:%02x Local request to reject connection attempts by peer %02x:%02x:%02x:%02x:%02x:%02x RSN: IBSS Auth started by peer %02x:%02x:%02x:%02x:%02x:%02x RSN: Clear pairwise key for peer %02x:%02x:%02x:%02x:%02x:%02x nl80211: TDLS discovery request for peer %02x:%02x:%02x:%02x:%02x:%02x nl80211: TDLS setup request for peer %02x:%02x:%02x:%02x:%02x:%02x nl80211: TDLS teardown request for peer %02x:%02x:%02x:%02x:%02x:%02x RSN: Starting IBSS Supplicant for peer %02x:%02x:%02x:%02x:%02x:%02x RSN: IBSS Not using IBSS Auth for peer %02x:%02x:%02x:%02x:%02x:%02x RSN: IBSS Authenticator already started for peer %02x:%02x:%02x:%02x:%02x:%02x Provision Discovery Request from unknown peer %02x:%02x:%02x:%02x:%02x:%02x Reject Invitation Request from unknown peer %02x:%02x:%02x:%02x:%02x:%02x Ignore Invitation Response from unknown peer %02x:%02x:%02x:%02x:%02x:%02x Ignore unexpected Invitation Response from peer %02x:%02x:%02x:%02x:%02x:%02x P2P: Unauthorize pending GO Neg peer %02x:%02x:%02x:%02x:%02x:%02x RSN: Starting IBSS Authenticator for now-authenticated peer %02x:%02x:%02x:%02x:%02x:%02x %s: Remove specific peer %02x:%02x:%02x:%02x:%02x:%02x nl80211: DH event - peer %02x:%02x:%02x:%02x:%02x:%02x P2P: Created pending virtual interface %s addr %02x:%02x:%02x:%02x:%02x:%02x GAS: Send action frame to %02x:%02x:%02x:%02x:%02x:%02x len=%u freq=%d prot=%d using src addr %02x:%02x:%02x:%02x:%02x:%02x Received new WPA/WPA2-PSK from WPS for STA %02x:%02x:%02x:%02x:%02x:%02x P2P Device Addr %02x:%02x:%02x:%02x:%02x:%02x Requested client was not in this group %02x:%02x:%02x:%02x:%02x:%02x Ignore P2P Presence Request for unknown group %02x:%02x:%02x:%02x:%02x:%02x nl80211: FT event target_ap %02x:%02x:%02x:%02x:%02x:%02x nl80211: Own MAC address on ifindex %d (%s) changed from %02x:%02x:%02x:%02x:%02x:%02x to %02x:%02x:%02x:%02x:%02x:%02x P2P: Assigned IP address %u.%u.%u.%u to %02x:%02x:%02x:%02x:%02x:%02x GAS: Comeback timeout for request to %02x:%02x:%02x:%02x:%02x:%02x IEEE 802.11: Sending SA Query Request to %02x:%02x:%02x:%02x:%02x:%02x Sending ADDTS Request to %02x:%02x:%02x:%02x:%02x:%02x Schedule GO Discoverability Request to be sent to %02x:%02x:%02x:%02x:%02x:%02x nl80211: failed to set_mac_addr for %s to %02x:%02x:%02x:%02x:%02x:%02x nl80211: set_mac_addr for %s to %02x:%02x:%02x:%02x:%02x:%02x IEEE 802.11: Sending SA Query Response to %02x:%02x:%02x:%02x:%02x:%02x GAS: Failed to send Action frame to %02x:%02x:%02x:%02x:%02x:%02x Sending DELTS to %02x:%02x:%02x:%02x:%02x:%02x IEEE 802.1X: Sending EAPOL-Key(s) to %02x:%02x:%02x:%02x:%02x:%02x RSN: IBSS TX Auth frame (SEQ %d) to %02x:%02x:%02x:%02x:%02x:%02x nl80211: New station %02x:%02x:%02x:%02x:%02x:%02x RSN: IBSS Reinitializing station %02x:%02x:%02x:%02x:%02x:%02x Removing station %02x:%02x:%02x:%02x:%02x:%02x nl80211: Delete station %02x:%02x:%02x:%02x:%02x:%02x GAS: Invalid comeback response with non-zero frag_id and comeback_delay from %02x:%02x:%02x:%02x:%02x:%02x Beacon report token %u len %zu from %02x:%02x:%02x:%02x:%02x:%02x P2P: Free assigned IP address %u.%u.%u.%u from %02x:%02x:%02x:%02x:%02x:%02x Radio measurement frame, action %u from %02x:%02x:%02x:%02x:%02x:%02x IEEE 802.11: Received SA Query Request from %02x:%02x:%02x:%02x:%02x:%02x Mandatory attribute missing in Invitation Request from %02x:%02x:%02x:%02x:%02x:%02x RSN: IBSS RX EAPOL for Supplicant from %02x:%02x:%02x:%02x:%02x:%02x GAS: Response in %d ms from %02x:%02x:%02x:%02x:%02x:%02x IEEE 802.1X: %lu bytes from %02x:%02x:%02x:%02x:%02x:%02x RSN: IBSS RX EAPOL for Authenticator from %02x:%02x:%02x:%02x:%02x:%02x WPS: Could not parse ProbeReq from %02x:%02x:%02x:%02x:%02x:%02x P2P: Authorize invitation to connect a running group from %02x:%02x:%02x:%02x:%02x:%02x WMM AC: Could not parse WMM AC action from %02x:%02x:%02x:%02x:%02x:%02x RX P2P Public Action from %02x:%02x:%02x:%02x:%02x:%02x RX P2P Action from %02x:%02x:%02x:%02x:%02x:%02x WMM AC: RX WMM AC Action from %02x:%02x:%02x:%02x:%02x:%02x Received GO Negotiation Confirm from %02x:%02x:%02x:%02x:%02x:%02x RX pre-auth from %02x:%02x:%02x:%02x:%02x:%02x GAS: Unexpected Advertisement Protocol element ID %u in response from %02x:%02x:%02x:%02x:%02x:%02x GAS: Truncated Query Response in response from %02x:%02x:%02x:%02x:%02x:%02x GAS: Unexpected frag_id in response from %02x:%02x:%02x:%02x:%02x:%02x GAS: Advertisement Protocol changed between initial and comeback response from %02x:%02x:%02x:%02x:%02x:%02x GAS: No room for Advertisement Protocol element in the response from %02x:%02x:%02x:%02x:%02x:%02x Received Device Discoverability Response from %02x:%02x:%02x:%02x:%02x:%02x GAS: Ignore %u octets of extra data after Query Response from %02x:%02x:%02x:%02x:%02x:%02x IEEE 802.11: Received SA Query Response from %02x:%02x:%02x:%02x:%02x:%02x Mandatory Channel List attribute missing in Invitation Response from %02x:%02x:%02x:%02x:%02x:%02x Mandatory Status attribute missing in Invitation Response from %02x:%02x:%02x:%02x:%02x:%02x Received Invitation Response from %02x:%02x:%02x:%02x:%02x:%02x Ignore unexpected GAS Initial Response from %02x:%02x:%02x:%02x:%02x:%02x Ignore unexpected GAS Comeback Response from %02x:%02x:%02x:%02x:%02x:%02x HT: Received 20/40 BSS Coexistence Management frame from %02x:%02x:%02x:%02x:%02x:%02x WPS: Probe Request for PBC received from %02x:%02x:%02x:%02x:%02x:%02x RX EAPOL from %02x:%02x:%02x:%02x:%02x:%02x WMM: ADDTS Request (Dialog Token %d) for TSPEC from %02x:%02x:%02x:%02x:%02x:%02x Invalid WPA key mgmt (0x%x) from %02x:%02x:%02x:%02x:%02x:%02x Invalid WPA group cipher (0x%x) from %02x:%02x:%02x:%02x:%02x:%02x Invalid %s pairwise cipher (0x%x) from %02x:%02x:%02x:%02x:%02x:%02x Invalid WPA proto (%d) from %02x:%02x:%02x:%02x:%02x:%02x RSN: IBSS RX Auth frame (SEQ 2) from %02x:%02x:%02x:%02x:%02x:%02x RSN: IBSS RX Auth frame (SEQ 1) from %02x:%02x:%02x:%02x:%02x:%02x Start Service Discovery with %02x:%02x:%02x:%02x:%02x:%02x Group Formation completed successfully with %02x:%02x:%02x:%02x:%02x:%02x nl80211: MLME event %d; timeout with %02x:%02x:%02x:%02x:%02x:%02x Start previously requested connect with %02x:%02x:%02x:%02x:%02x:%02x Switch own primary and secondary channel due to BSS overlap with %02x:%02x:%02x:%02x:%02x:%02x Not ready for GO negotiation with %02x:%02x:%02x:%02x:%02x:%02x GO Negotiation with %02x:%02x:%02x:%02x:%02x:%02x Request association with %02x:%02x:%02x:%02x:%02x:%02x RSN: starting pre-authentication with %02x:%02x:%02x:%02x:%02x:%02x WPS: Consider PBC session with %02x:%02x:%02x:%02x:%02x:%02x nl80211: Ignore deauth/disassoc event from old AP %02x:%02x:%02x:%02x:%02x:%02x when already connecting with %02x:%02x:%02x:%02x:%02x:%02x nl80211: Ignore deauth/disassoc event from old AP %02x:%02x:%02x:%02x:%02x:%02x when already authenticating with %02x:%02x:%02x:%02x:%02x:%02x Association Response to the STA has already been sent, but no TX status yet known - ignore Class 3 frame issue with %02x:%02x:%02x:%02x:%02x:%02x Start GO Neg after the PD-before-GO-Neg workaround with %02x:%02x:%02x:%02x:%02x:%02x RSN: IBSS Auth completed with %02x:%02x:%02x:%02x:%02x:%02x nl80211: Associated with %02x:%02x:%02x:%02x:%02x:%02x Group Formation failed with %02x:%02x:%02x:%02x:%02x:%02x Seek service %s hash %02x:%02x:%02x:%02x:%02x:%02x Unauthorizing %02x:%02x:%02x:%02x:%02x:%02x nl80211: New peer candidate %02x:%02x:%02x:%02x:%02x:%02x Cannot connect to unknown P2P Device %02x:%02x:%02x:%02x:%02x:%02x Cannot authorize unknown P2P Device %02x:%02x:%02x:%02x:%02x:%02x Cannot invite unknown P2P Device %02x:%02x:%02x:%02x:%02x:%02x Provision Discovery device not found %02x:%02x:%02x:%02x:%02x:%02x WPS: PBC overlap detected: %02x:%02x:%02x:%02x:%02x:%02x and %02x:%02x:%02x:%02x:%02x:%02x Provision Discovery Request add device failed %02x:%02x:%02x:%02x:%02x:%02x Invitation Request add device failed %02x:%02x:%02x:%02x:%02x:%02x P2P-INVITATION-RESULT status=%d %02x:%02x:%02x:%02x:%02x:%02x CTRL-EVENT-EAP-RETRANSMIT %02x:%02x:%02x:%02x:%02x:%02x CTRL-EVENT-EAP-SUCCESS %02x:%02x:%02x:%02x:%02x:%02x 40 MHz Intolerant is set on channel %d in BSS %02x:%02x:%02x:%02x:%02x:%02x CTRL_IFACE IBSS_RSN %02x:%02x:%02x:%02x:%02x:%02x CTRL_IFACE ROAM %02x:%02x:%02x:%02x:%02x:%02x AP-STA-POLL-OK %02x:%02x:%02x:%02x:%02x:%02x CTRL_IFACE PREAUTH %02x:%02x:%02x:%02x:%02x:%02x AP-STA-POSSIBLE-PSK-MISMATCH %02x:%02x:%02x:%02x:%02x:%02x CTRL-EVENT-EAP-TIMEOUT-FAILURE %02x:%02x:%02x:%02x:%02x:%02x CTRL-EVENT-EAP-FAILURE %02x:%02x:%02x:%02x:%02x:%02x HESSID %02x:%02x:%02x:%02x:%02x:%02x nl80211: Rekey offload event for BSSID %02x:%02x:%02x:%02x:%02x:%02x Invitation for BSSID %02x:%02x:%02x:%02x:%02x:%02x RSN: Search for BSSID %02x:%02x:%02x:%02x:%02x:%02x P2P: * P2P Group BSSID %02x:%02x:%02x:%02x:%02x:%02x P2P: Trying to find target GO BSS entry based on BSSID %02x:%02x:%02x:%02x:%02x:%02x WPS: Check whether PBC session overlap is present in scan results; selected BSSID %02x:%02x:%02x:%02x:%02x:%02x Scan a previously specified BSSID %02x:%02x:%02x:%02x:%02x:%02x P2P: * P2P Group ID %02x:%02x:%02x:%02x:%02x:%02x P2P: * Device ID %02x:%02x:%02x:%02x:%02x:%02x CTRL-EVENT-EAP-STARTED %02x:%02x:%02x:%02x:%02x:%02x IBSS-RSN-COMPLETED %02x:%02x:%02x:%02x:%02x:%02x WPS: Remove authorized MAC %02x:%02x:%02x:%02x:%02x:%02x WPS: Add authorized MAC %02x:%02x:%02x:%02x:%02x:%02x AP-REJECTED-MAX-STA %02x:%02x:%02x:%02x:%02x:%02x AP-REJECTED-BLOCKED-STA %02x:%02x:%02x:%02x:%02x:%02x nl80211: %s STA %02x:%02x:%02x:%02x:%02x:%02x %s: Session timer for STA %02x:%02x:%02x:%02x:%02x:%02x %s: Disassociation callback for STA %02x:%02x:%02x:%02x:%02x:%02x %s: Deauthentication callback for STA %02x:%02x:%02x:%02x:%02x:%02x Received new WPA/WPA2-PSK from WPS for STA %02x:%02x:%02x:%02x:%02x:%02x Timeout, sending %s info to STA %02x:%02x:%02x:%02x:%02x:%02x Disassociation notification for unknown STA %02x:%02x:%02x:%02x:%02x:%02x RSN: Received Auth seq 2 from unknown STA %02x:%02x:%02x:%02x:%02x:%02x %s: disassociate STA %02x:%02x:%02x:%02x:%02x:%02x %s: deauthenticate STA %02x:%02x:%02x:%02x:%02x:%02x IEEE 802.11: Ignore SA Query Request from unassociated STA %02x:%02x:%02x:%02x:%02x:%02x IEEE 802.11: Ignored Action frame (category=%u) from unassociated STA %02x:%02x:%02x:%02x:%02x:%02x Data/PS-poll frame from not associated STA %02x:%02x:%02x:%02x:%02x:%02x EAP Timeout, STA %02x:%02x:%02x:%02x:%02x:%02x nl80211: Use random TA %02x:%02x:%02x:%02x:%02x:%02x Own MAC address: %02x:%02x:%02x:%02x:%02x:%02x nl80211: MAC address: %02x:%02x:%02x:%02x:%02x:%02x P2P: * Intended P2P Interface Address: %02x:%02x:%02x:%02x:%02x:%02x AP: Set MAC address filter: %02x:%02x:%02x:%02x:%02x:%02x CTRL_IFACE interface '%s' created with MAC addr: %02x:%02x:%02x:%02x:%02x:%02x First SD Query no-ACK in this search iteration: %02x:%02x:%02x:%02x:%02x:%02x nl80211: MAC address mask: %02x:%02x:%02x:%02x:%02x:%02x WPS: Another BSS in active PBC mode: %02x:%02x:%02x:%02x:%02x:%02x Service Hash match found: %02x:%02x:%02x:%02x:%02x:%02x RRM: TSF BSSID: %02x:%02x:%02x:%02x:%02x:%02x current BSS: %02x:%02x:%02x:%02x:%02x:%02x P2P: * P2P Group BSSID: %02x:%02x:%02x:%02x:%02x:%02x nl80211: Scan for a specific BSSID: %02x:%02x:%02x:%02x:%02x:%02x P2P: * Device ID: %02x:%02x:%02x:%02x:%02x:%02x WPS: AuthorizedMAC: %02x:%02x:%02x:%02x:%02x:%02x CTRL-EVENT-EAP-RETRANSMIT2 %02x:%02x:%02x:%02x:%02x:%02x CTRL-EVENT-EAP-SUCCESS2 %02x:%02x:%02x:%02x:%02x:%02x CTRL-EVENT-EAP-TIMEOUT-FAILURE2 %02x:%02x:%02x:%02x:%02x:%02x CTRL-EVENT-EAP-FAILURE2 %02x:%02x:%02x:%02x:%02x:%02x P2P: * Session ID Info (%x) %02x:%02x:%02x:%02x:%02x:%02x P2P: * Advertisement ID (%x) %02x:%02x:%02x:%02x:%02x:%02x %02x:%02x:%02x:%02x:%02x:%02x P2P: * Device Capability %02x Group Capability %02x WPS: Multi-AP extension value %02x ieee8021x WPA: Z.x * capability=0x%x EAPOL: RX IEEE 802.1X ver=%d type=%d len=%d EAPOL-Key: type=%d key_length=%d key_index=0x%x WPA: ssid proto=0x%x pairwise_cipher=0x%x group_cipher=0x%x key_mgmt=0x%x RSN: pairwise_cipher=0x%x group_cipher=0x%x key_mgmt=0x%x WPA: pairwise_cipher=0x%x group_cipher=0x%x key_mgmt=0x%x WPA: Send EAPOL-Key frame to %02x:%02x:%02x:%02x:%02x:%02x ver=%d mic_len=%d key_mgmt=0x%x nl80211: pairwise_ciphers=0x%x nl80211: auth_algs=0x%x nl80211: Data frame filter flags=0x%x RATE[%d] rate=%d flags=0x%x WMM AC: U-APSD queues=0x%x nl80211: key_mgmt_suites=0x%x WPS-ER-AP-SET-SEL-REG uuid=%s state=START sel_reg=%d dev_passwd_id=%u sel_reg_config_methods=0x%x WPS: wps_cb_set_sel_reg: sel_reg=%d config_methods=0x%x pbc=%d methods=0x%x nl80211: group_cipher=0x%x * group=0x%x RSN: Added PMKSA cache entry for %02x:%02x:%02x:%02x:%02x:%02x network_ctx=%p akmp=0x%x RSN: PMKSA cache search - network_ctx=%p try_opportunistic=%d akmp=0x%x * qosinfo=0x%x nl80211: wpa_version=0x%x * akm=0x%x Drop repeated action frame seq_ctrl=0x%x Drop repeated association frame seq_ctrl=0x%x Drop repeated authentication frame seq_ctrl=0x%x Added ASP advertisement adv_id=0x%x config_methods=0x%x svc_state=0x%x adv_str='%s' cpt_mask=0x%x * flags set=0x%x mask=0x%x * pairwise=0x%x WPS: encr_type=0x%x scan: Invalid MAC randomization type=0x%x Delete ASP adv_id=0x%x P2P: Checking whether group is persistent: group_capab=0x%x cpt: local:0x%x remote:0x%x result:0x%x cpt: service:0x%x remote:0x%x result:0x%x WPA: AP key_mgmt 0x%x network profile key_mgmt 0x%x; available key_mgmt 0x%x * WPA Versions 0x%x WPS: Enrollee Encryption Type flags 0x%x WPS: Enrollee Connection Type flags 0x%x WPS: Enrollee Authentication Type flags 0x%x WPS: Own encr types 0x%x (rsn: 0x%x, wpa: 0x%x) - masked Enrollee encr types 0x%x WPS: Own auth types 0x%x - masked Enrollee auth types 0x%x Building PD Request based on P2PS config method 0x%x status %d --> req_config_methods 0x%x Received Provision Discovery Response from %02x:%02x:%02x:%02x:%02x:%02x with config methods 0x%x P2P: * Device Info: addr %02x:%02x:%02x:%02x:%02x:%02x primary device type %s device name '%s' config methods 0x%x WPS: Enrollee RF Bands 0x%x WPA: AP mgmt_group_cipher 0x%x network profile mgmt_group_cipher 0x%x; available mgmt_group_cipher 0x%x WPA: AP group 0x%x network profile group 0x%x; available group 0x%x P2P: * Manageability: bitmap 0x%x P2P: * Invitation Flags: bitmap 0x%x Validating WMM IE: OUI %02x:%02x:%02x OUI type %d OUI sub-type %d version %d QoS info 0x%x P2P: Invalid domain name sequence starting with 0x%x WPA: AP pairwise 0x%x network profile pairwise 0x%x; available pairwise 0x%x WPS: Reject new AP settings due to invalid encr_type 0x%x WPS: Reject Credential due to invalid encr_type 0x%x WPS: Unsupported auth_type 0x%x WPS: Ignored credentials for unsupported authentication type 0x%x WPS: Encryption Type 0x%x WPS: Authentication Type 0x%x Peer rejected our Provision Discovery Request (received config_methods 0x%x expected 0x%x CHAN_SWITCH VHT CONFIG 0x%x Update peer %02x:%02x:%02x:%02x:%02x:%02x config_methods 0x%x -> 0x%x %s = 0x%x P2P: * Connection Capability: 0x%x Config methods not supported svc: 0x%x dev: 0x%x key_mgmt: 0x%x group_mgmt: 0x%x group: 0x%x ts idx replace bitmap: 0x%x proto: 0x%x Overriding auth_alg selection: 0x%x Automatic auth_alg selection: 0x%x auth_alg: 0x%x pairwise: 0x%x WPS: Encryption Type: 0x%x WPS: Authentication Type: 0x%x nl80211: External auth action: %u, AKM: 0x%x P2P: Config Methods (WPS): 0x%x P2P-PROV-DISC-FAILURE p2p_dev_addr=%02x:%02x:%02x:%02x:%02x:%02x status=%d adv_id=%x P2P: * Advertisement ID %x wps_nfc_dev_pw nfc-pw nl80211: Failed to register Action frame processing - ignore for now WPA state machine had not been started - initialize now DFS only VHT20/40/80/160/80+80 is supported now DFS only VHT20/40/80/160 is supported now EAP-WSC: Fragment overflow WPS: Attribute overflow P2P: Device Info underflow EAP-WSC: Message underflow No common channels - force deferred flow nl80211: Connection quality monitor event: RSSI low show p2p_go_ctwindow %s-new ieee80211w key_iv execv send_and_recv Range report token %u len %zu LCI report token %u len %zu MBO: Not enough room in buffer for MBO IE: buf len = %zu, attr_len = %zu nl80211: Client probe request addr=%02x:%02x:%02x:%02x:%02x:%02x cookie=%llu tx_rate_info=%lu rx_rate_info=%lu %s: ifindex=%d (%s) alg=%d addr=%p key_idx=%d set_tx=%d seq_len=%lu key_len=%lu wpabuf %p (size=%lu used=%lu) overflow len=%lu EAP: parseEapResp: invalid resp=%p len=%lu IEEE 802.1X RX: version=%d type=%d length=%lu %s: ie len too short %lu WPA: Unsupported AES-WRAP len %lu WPS: Reject PSK credential with invalid Network Key length %lu WPS: Invalid Network Key length %lu Unexpected PSK length %lu WPA: Invalid IGTK KDE length %lu WPA: TK length mismatch: %d != %lu WMM: Estimated medium time: %lu fixed_nominal_msdu ampdu %08u WMM: Surplus Bandwidth Allowance: %u.%04u %s%u dialog_token=%u status_code=%u comeback_delay=%u dialog_token=%u status_code=%u frag_id=%d more_frags=%d comeback_delay=%u %u: %02x:%02x:%02x:%02x:%02x:%02x freq=%d level=%d snr=%d est_throughput=%u Current BSS: %02x:%02x:%02x:%02x:%02x:%02x freq=%d level=%d snr=%d est_throughput=%u Selected BSS: %02x:%02x:%02x:%02x:%02x:%02x freq=%d level=%d snr=%d est_throughput=%u %02x:%02x:%02x:%02x:%02x:%02x freq=%d qual=%d noise=%d%s level=%d snr=%d%s flags=0x%x age=%u est=%u %02x:%02x:%02x:%02x:%02x:%02x freq=%d qual=%d noise=%d level=%d flags=0x%x age=%u est=%u P2P-GO-NEG-REQUEST %02x:%02x:%02x:%02x:%02x:%02x dev_passwd_id=%u go_intent=%u nl80211: Set STA airtime weight - ifname=%s addr=%02x:%02x:%02x:%02x:%02x:%02x weight=%u Measurement request location subject=%u CTRL-EVENT-SUBNET-STATUS-UPDATE status=%u %s: num_bss=%u conf->num_bss=%u scan plan %u: interval=%u iterations=%u master=%u Request to invite peer %02x:%02x:%02x:%02x:%02x:%02x role=%d persistent=%d force_freq=%u nl80211: send_frame - Use bss->freq=%u P2P: Remove persistent group PSK list entry for %02x:%02x:%02x:%02x:%02x:%02x p2p=%u %s: %s addr %02x:%02x:%02x:%02x:%02x:%02x reason=%u %s: %s STA %02x:%02x:%02x:%02x:%02x:%02x reason=%u ADDTS response status=%d tsid=%u up=%u direction=%u nl80211: Remain-on-channel cookie 0x%llx for freq=%u MHz duration=%u CTRL: Invalid Neighbor Report element: id=%u len=%zu nr_len=%u WPS: attr type=0x%x len=%u WPS: Unsupported attribute type 0x%x len=%u WPS: WFA subelement id=%u len=%u CTRL: Invalid Neighbor Report element: id=%u len=%u nl80211: RX frame da=%02x:%02x:%02x:%02x:%02x:%02x sa=%02x:%02x:%02x:%02x:%02x:%02x bssid=%02x:%02x:%02x:%02x:%02x:%02x freq=%d ssi_signal=%d fc=0x%x seq_ctrl=0x%x stype=%u (%s) len=%u Ignore Probe Request due to DS Params mismatch: chan=%u != ds.chan=%u Unknown peer Listen channel: country=%c%c(0x%02x) reg_class=%u channel=%u * listen_interval=%u Invalid Extended Listen Timing request: period=%u interval=%u scan plan %u (last plan): interval=%u WPA: Received EAPOL-Key from %02x:%02x:%02x:%02x:%02x:%02x key_info=0x%x type=%u mic_len=%u key_data_length=%u key_length=%u key_data_length=%u operstate=%u nl80211: beacon_rate=%u * opmode=%u linkmode=%u Disassociation notification BSSID %02x:%02x:%02x:%02x:%02x:%02x reason_code=%u minor_reason_code=%u Deauthentication notification BSSID %02x:%02x:%02x:%02x:%02x:%02x reason_code=%u minor_reason_code=%u rfkill: initial event: idx=%u type=%d op=%u soft=%u hard=%u rfkill: event: idx=%u type=%d op=%u soft=%u hard=%u Propose EAP method vendor=%u method=%u CTRL-EVENT-EAP-PROPOSED-METHOD vendor=%u method=%u EAP: allowed type: vendor=%u method=%u CTRL-EVENT-EAP-PROPOSED-METHOD method=%u EAP: Received EAP-Request id=%d method=%u vendor=%u vendorMethod=%u EAP: parseEapResp: rxResp=%d rxInitiate=%d respId=%d respMethod=%u respVendor=%u respVendorMethod=%u nl80211: Vendor event: wiphy=%u vendor_id=0x%x subcmd=%u nl80211: Supported vendor event: vendor_id=0x%x subcmd=%u nl80211: Supported vendor command: vendor_id=0x%x subcmd=%u TSPEC-REQ-FAILED tsid=%u nl80211: del_ts request: tsid=%u * peer_aid=%u * aid=%u Request to authorize group negotiation - peer=%02x:%02x:%02x:%02x:%02x:%02x GO Intent=%d Intended Interface Address=%02x:%02x:%02x:%02x:%02x:%02x wps_method=%d persistent_group=%d oob_pw_id=%u Request to start group negotiation - peer=%02x:%02x:%02x:%02x:%02x:%02x GO Intent=%d Intended Interface Address=%02x:%02x:%02x:%02x:%02x:%02x wps_method=%d persistent_group=%d pd_before_go_neg=%d oob_pw_id=%u CTRL-EVENT-SCAN-RESULTS id=%u CTRL-EVENT-SCAN-STARTED id=%u scan: MAC randomization type %u != supported=%u WMM AC: AC mandatory: AC_BE=%u AC_BK=%u AC_VI=%u AC_VO=%u Send Presence Request to GO %02x:%02x:%02x:%02x:%02x:%02x (own interface %02x:%02x:%02x:%02x:%02x:%02x) freq=%u dur1=%u int1=%u dur2=%u int2=%u %u:%u Remove client %02x:%02x:%02x:%02x:%02x:%02x from group; num_members=%u/%u Add client %02x:%02x:%02x:%02x:%02x:%02x to group (p2p=%d wfd=%d client_info=%d); num_members=%u/%u BSS: last_scan_res_used=%u/%u ip_addr=%u.%u.%u.%u ip_mask=%u.%u.%u.%u go_ip_addr=%u.%u.%u.%u ip_addr=%u.%u.%u.%u %s%u-%u P2P: Disallowed frequency range %u-%u %u-%08X-%u nl80211: Could not find bridge ifname for ifindex %u Invalid bss expiration count %u nl80211: Ignore unsupported QCA vendor event %u Beacon request: unknown operating class in AP Channel Report subelement %u WPS: Skipped unknown WFA Vendor Extension subelement %u EAP-WSC: Fragment size limit %u %s: ie count botch (key mgmt), count %u left %u %s: ie count botch (pairwise), count %u left %u P2P: Invalid DNS pointer offset %u Device Discoverability Response status %u P2P Presence Request was rejected: status %u vhtnss %u P2P: Add operating class %u 20/40 BSS Intolerant Channel Report: Operating Class %u Request range: dest addr %02x:%02x:%02x:%02x:%02x:%02x rand interval %u min AP %u n_responders %u Beacon request: request subelement is present but report detail is %u RRM: Expected Measurement Request element, but EID is %u vhtmcs %u mcs %u P2P: * GO Intent: Intent %u Tie breaker %u WPS: AP PIN authentication failure number %u * FILS ERP next seq %u RX_ACTION category %u action %u sa %02x:%02x:%02x:%02x:%02x:%02x da %02x:%02x:%02x:%02x:%02x:%02x len %d freq %u WPS: Registrar trying to change Device Password ID from %u to %u nl80211: Updating DH IE peer: %02x:%02x:%02x:%02x:%02x:%02x reason %u nl8021l: Unknown connect failed reason %u WPA: Unsupported AES-WRAP len %u GAS: No pending query found for %02x:%02x:%02x:%02x:%02x:%02x dialog token %u GAS: No response received for query to %02x:%02x:%02x:%02x:%02x:%02x dialog token %u GAS: Starting query timeout for dialog token %u No pending SD response fragment for dialog token %u Unexpected range report, token %u Unexpected LCI report, token %u PNO: Use only the first %u SSIDs from %u P2P: Unavailable service protocol %u Try to reselect channel selection with peer information received; previously selected op_class %u channel %u Try to optimize channel selection with peer information received; previously selected op_class %u channel %u Set Listen channel: reg_class %u channel %u Set Operating channel: reg_class %u channel %u Beacon Report: Invalid channel %u P2P: * Listen Channel: Regulatory Class %u Channel %u P2P: * Operating Channel: Regulatory Class %u Channel %u WPS: Invalid Network Key Index length %u WPS: Invalid Network Index length %u WPS: Invalid MAC Address length %u WPS: Invalid Encryption Type Flags length %u WPS: Invalid Connection Type Flags length %u WPS: Invalid Authentication Type Flags length %u WPS: Invalid Registrar Configuration Methods length %u WPS: Invalid Selected Registrar Config Methods length %u WPS: Invalid Config Methods length %u WPS: Invalid RF Bands length %u WPS: Invalid Key Wrap Authenticator length %u WPS: Invalid Authenticator length %u WPS: Invalid Configuration Error length %u WPS: Invalid Selected Registrar length %u WPS: Invalid Version length %u WPS: Invalid OS Version length %u WPS: Invalid Multi-AP Extension length %u WPS: Invalid Request to Enroll length %u WPS: Invalid AP Channel length %u P2P: Invalid domain name sequence - no room for label with length %u WPS: Invalid Wi-Fi Protected Setup State length %u WPS: Invalid Association State length %u WPS: Invalid Request Type length %u WPS: Invalid Encryption Type length %u WPS: Invalid Authentication Type length %u WPS: Invalid Response Type length %u WPS: Invalid Message Type length %u WPS: Invalid Primary Device Type length %u WPS: Invalid Secondary Device Type length %u WPS: Invalid Requested Device Type length %u WPS: Invalid Settings Delay Time length %u WPS: Invalid Network Key Shareable length %u WPS: Invalid Registrar Nonce length %u WPS: Invalid Enrollee Nonce length %u WPS: Invalid OOB Device Password length %u WPS: Ignore Public Key with unexpected length %u WPS: Invalid AP Setup Locked length %u P2P: Attribute %d length %u WPS: Invalid UUID-R length %u WPS: Invalid UUID-E length %u WPS: Invalid Device Password ID length %u WPS: Invalid Version2 length %u WPS: Invalid R-Hash2 length %u WPS: Invalid E-Hash2 length %u WPS: Invalid R-SNonce2 length %u WPS: Invalid E-SNonce2 length %u WPS: Invalid R-Hash1 length %u WPS: Invalid E-Hash1 length %u WPS: Invalid R-SNonce1 length %u WPS: Invalid E-SNonce1 length %u BSS: Start scan result update %u Measurement report mode 0x%x type %u RRM: Unsupported radio measurement type %u Received P2P Action - unknown type %u Neighbor report request, measure type %u P2P: Service Protocol Type %u Invalid bss expiration age %u Service Discovery failed: status code %u GAS: Query to %02x:%02x:%02x:%02x:%02x:%02x dialog token %u failed - status code %u EAP: configuration does not allow: vendor %u method %u EAP: not included in build: vendor %u method %u Beacon request: Unknown subelement id %u Assigned scan id %u Unsupported GAS advertisement protocol id %u EXT-RADIO-WORK-TIMEOUT %u EXT-RADIO-WORK-START %u * beacon_rate = VHT-MCS %u * beacon_rate = HT-MCS %u Unsupported ANQP Info ID %u P2P: Service Transaction ID %u P2P: Status Code ID %u WPS: Device Password ID %u radio_work_free('%s'@%p): num_active_works --> %u Unexpected IE in GAS Initial Request: %u Setting bss expiration scan count: %u nl80211: External auth status: %u nl80211: sched scan plan no. %u: Invalid number of iterations: %u nl80211: Invalid number of sched scan plans: %u Service Update Indicator: %u Over max scan SSIDs from scan req: %u Dialog Token: %u Invalid reporting detail: %u nl80211: sched scan plan no. %u: Invalid interval: %u Beacon request: Invalid last indication request subelement length: %u Invalid request subelement length: %u Invalid reporting information subelement length: %u Invalid reporting detail subelement length: %u Invalid SSID subelement length: %u Current SD reassembly buffer length: %u ANQP Query Response length: %u Unexpected IE in GAS Initial Response: %u Unexpected IE in GAS Comeback Response: %u P2P: * Minor Reason Code: %u P2P: Input channel not supported: %u wext nl80211: First BSS - reassign context Failed to initialize global context Line %d: Failed to allocate memory for eap_req_id_text Another BSS in this ESS has been seen; try it next %s: Failed to open output file descriptor, using standard output wpa_debug_open_file: Failed to open output file, using standard output Skip roam - Current BSS has better estimated throughput Allow reassociation - selected BSS has better estimated throughput Line %d: invalid assoc_sa_query_retry_timeout Line %d: invalid assoc_sa_query_max_timeout supp_cancel_auth_timeout P2PS PD Response missing config_timeout rssi_reject_assoc_timeout Service Discovery Query timeout EAPOL-Key timeout User initiated Provision Discovery Request timeout RRM: Unexpected neighbor report timeout P2P: Cancelled P2P group freq_conflict timeout P2P: Cancelled P2P group formation timeout Cancelling authentication timeout deauthenticated due to session timeout Extended Listen timeout P2P: WPS step failed during group formation - reject connection from timeout Found GO Negotiation peer - try to start GO negotiation from timeout WPS: Continue association from timeout WPS: Clear WPS network from timeout Found Invite peer - try to start Invite from timeout GAS: Retry GAS query due to comeback response timeout P2P: Cancelled P2P group idle timeout serverTimeout Invalid WPA parameter value for dot11RSNAConfigSATimeout P2P: * Configuration Timeout logger_stdout Timed-out association SA Query timed out RSN: pre-authentication with %02x:%02x:%02x:%02x:%02x:%02x timed out WPS-TIMEOUT Requested operation timed out P2P: Group Formation timed out P2P: Send Action frame radio work timed out WPS: AP PIN timed out RRM: Range request (token %u) timed out RRM: LCI request (token %u) timed out relative_band_adjust burst nl80211: Was expecting local disconnect but got another disconnect event first nl80211: Was expecting local deauth but got another disconnect event first Connection to AP lost nl80211: Ignore interface up event since interface %s does not exist WMM AC: TS does not exist WMM AC: Ignoring DELTS frame - TSID does not exist Reject wpa_supplicant_associate() call since connect_work exist Reject wpa_supplicant_associate() call since pending work exist chanlist bssid_blacklist Added BSSID %02x:%02x:%02x:%02x:%02x:%02x into blacklist Removed BSSID %02x:%02x:%02x:%02x:%02x:%02x from blacklist bssid_whitelist skip - BSSID not in whitelist p2p_client_list Optimize scan based on conf->freq_list P2PS PD Response missing channel_list psk_list Optimize scan based on previously generated frequency list invalid scan plans list Line %d: Invalid p2p_pref_chan list Updated no GO chan list intersection with local channel list Update channel list Line %d: invalid channel list Peer operating channel preference: %d MHz is not in our preferred channel list Line %d: invalid rate list RSN: processing PMKSA candidate list WPS: Authorized MAC was already in the list nl80211: ifindex %d already in the list WPS: Authorized MAC was not in the list nl80211: %s - could not find BSS %p in the list Beginning of SSID list Invalid peer Channel List P2P: Channel List P2P: * Channel List Failed to read BSSID for EAPOL-Key request Ongoing scan action - reject new request Pending scan scheduled - reject new request RRM: Ignoring too short radio measurement request EAP-Identity: Failed to allocate memory for request EAP-WSC: Failed to allocate memory for request CTLR: Invalid cookie format in the request - drop request CTLR: No cookie in the request - drop request CTRL: No cookie in the request - drop request CTLR: Invalid cookie in the request - drop request CTRL: Invalid cookie in the request - drop request P2P: Drop pending Action TX due to new operation request invalid WMM element in association request No WPA/RSN IE in association request Station sent an invalid association request WPA: Remove PMKSA cache entry for %02x:%02x:%02x:%02x:%02x:%02x based on request nl80211: sched_scan request Cancelling scan request Include wildcard SSID in the scan request nl80211: scan request Over max scan SSIDs for manual request Use passive scan based on manual request nl80211: Ignore deauth event triggered due to own deauth request deauthenticated due to local deauth request nl80211: Could not build channel switch request Ignore Provision Discovery Response from %02x:%02x:%02x:%02x:%02x:%02x with no pending request Enable 4-address WDS mode for STA %02x:%02x:%02x:%02x:%02x:%02x based on pending request Too long range request P2P: ASP bad request EAP: Method did not return a request GAS: No ACK to GAS request Invalid Dialog Token 0 (must be nonzero) in Device Discoverability Request P2P Device ID attribute missing from Device Discoverability Request No pending Device Discoverability Request Could not find peer entry for GO and frequency to send Device Discoverability Request Peer rejected our Provision Discovery Request Unsupported Config Methods in Provision Discovery Request No common channels in Follow-On Provision Discovery Request No Listen/Operating frequency known for the peer %02x:%02x:%02x:%02x:%02x:%02x to send Provision Discovery Request RRM: Failed to allocate Neighbor Report Request RRM: Failed to send Neighbor Report Request Mandatory Invitation Flags attribute missing from Invitation Request Sending Invitation Request No Listen/Operating frequency known for the peer %02x:%02x:%02x:%02x:%02x:%02x to send Invitation Request Failed to build WPS IE for GO Negotiation Request Unexpected Status attribute (%d) in GO Negotiation Request Mandatory Capability attribute missing from GO Negotiation Request Mandatory Configuration Timeout attribute missing from GO Negotiation Request Mandatory GO Intent attribute missing from GO Negotiation Request Completed device entry based on data from GO Negotiation Request Sending GO Negotiation Request No Listen/Operating frequency known for the peer %02x:%02x:%02x:%02x:%02x:%02x to send GO Negotiation Request WPS: Building WPS IE for (Re)Association Request HT: Forty MHz Intolerant is set by STA %02x:%02x:%02x:%02x:%02x:%02x in Association Request Invalid IE in GAS Initial Request P2P: RX GAS Comeback Request No NoA attribute in P2P Presence Request Failed to parse P2P Presence Request Received P2P Action - P2P Presence Request Probe Response is offloaded, do not reply Probe Request WPS: Building WPS IE for Probe Request No P2PS Hash in Probe Request WPS: No Config Methods attribute in Probe Request WPS: No Device Password Id attribute in Probe Request WPS: UUID-E from Probe Request Not in Listen state (in_listen=%d drv_in_listen=%d) - ignore Probe Request WMM: TSPEC overflow in ADDTS Request WMM AC: Failed to send ADDTS Request EAPOL: received control response (user input) notification - retrying pending EAP Request EAPOL: received notification from EAP state machine - retrying pending EAP Request No Listen/Operating frequency known for the peer %02x:%02x:%02x:%02x:%02x:%02x to send SD Request wpa_bss_remove_oldest Prepare channel best /proc/sys/net/ipv6/conf/%s/drop_unicast_in_l2_multicast /proc/sys/net/ipv4/conf/%s/drop_unicast_in_l2_multicast multicast_to_unicast wep_key_len_unicast wep_key_len_broadcast Cannot set uplink/bidi TS without driver support RRM: Cannot set scan duration due to missing driver support P2P: Driver did not support fetching of all supported channels; assume dualband support nl80211: use P2P_DEVICE support WPS: Workaround - assume Enrollee supports WPA2PSK based on claimed WPA2 support rrm_neighbor_report rrm_beacon_report Unexpected IE (%u,%u) in coex report RRM: Link measurement report RRM: Radio Measurement report RRM: Unexpected neighbor report Beacon request: %02x:%02x:%02x:%02x:%02x:%02x does not support active beacon report Beacon request: %02x:%02x:%02x:%02x:%02x:%02x does not support passive beacon report Beacon request: %02x:%02x:%02x:%02x:%02x:%02x does not support table beacon report RRM: New Neighbor Report * control port AUTH: %02x:%02x:%02x:%02x:%02x:%02x unauthorizing port AUTH: %02x:%02x:%02x:%02x:%02x:%02x authorizing port Invalid global ctrl UDP port Invalid ctrl_iface UDP port RRM: Link measurement report failed. Request too short RRM: Element length too short nl80211: MLME event %d (%s) on %s(%02x:%02x:%02x:%02x:%02x:%02x) - too short No ongoing scan/p2p-scan found to abort EAP: more than %d authentication rounds - abort AirPort local TLS alert remote TLS alert EAPOL-Encapsulated-ASF-Alert client_cert server_cert ca_cert ip_addr_start erp_send_reauth_start Clear pending_listen_freq for p2p_go_neg_start Clear pending_listen_freq for p2p_invite_start EAP-WSC: Received start EAPOL: txStart EAPOL::maxStart EAP-WSC: Send WSC/Start EAP: getDecision: send EAP-Initiate/Re-auth-Start EAP: retransmit timeout 1 second for EAP-Initiate-Re-auth-Start cached PMKSA available - ignore it since STA sent EAPOL-Start EAPOL: Drop EAPOL TX to %02x:%02x:%02x:%02x:%02x:%02x while waiting for EAPOL-Start RSN: PMKSA caching - do not send EAPOL-Start BSS/SSID entry for association not valid anymore - drop connection attempt Stop GO Negotiation attempt nl80211: Explicitly disconnecting before reassociation attempt P2P: Failed to find GO %02x:%02x:%02x:%02x:%02x:%02x for join operationg - stop join attempt RSN: Cancelling PMKSA caching attempt RSN: Cancelled PMKSA caching attempt arp_accept Accept bss_max_count bss_expiration_scan_count wpa_group_update_count wpa_pairwise_update_count Request range: Wrong min AP count bssid_hint nl80211: Regulatory beacon hint BSSID hint local_pwr_constraint Cannot switch PRI/SEC channels due to local constraint no NL80211_TXRATE_LEGACY constraint beacon_int disc_int nl80211: QCA test event nl80211: Disconnect event nl80211: Frame TX status event nl80211: Beacon loss event nl80211: Channel switch%s event nl80211: Ignore unsupported vendor event Restart scanning after unexpected sched_scan stop event Association info event nl80211: TDLS operation event nl80211: Roam event DFS waiting channel switch event nl80211: Unprot Disassociate event nl80211: Disassociate event nl80211: Associate event RSN: No data in PMKID candidate event nl80211: PMKSA candidate event nl80211: Unprot Deauthenticate event nl80211: Deauthenticate event nl80211: Authenticate event nl80211: Unsupported TDLS operatione event nl80211: Failed to set interface up on resume event nl80211: Frame event nl80211: Not a CQM RSSI threshold event P2P: Update channel list based on frequency avoid event Already associated with a configured network - generating associated event nl80211: No address in IBSS joined event nl80211: Connect failed event nl80211: Ignore invalid CQM event nl80211: Mark if_removed=0 for %s based on RTM_NEWLINK event persistent WMM AC: WMM AC Action content p2p_go_intent Incompatible GO Intent Ignore malformed PD Response - either conn_cap or persistent group should be present Do not reply since peer has higher address and GO Neg Request already sent Do not reply since peer is waiting for us to start a new GO Negotiation and GO Neg Request already sent nl80211: Sched scan stop sent All fragments of SD response sent %d more bytes remain to be sent Ignore this BSS entry since the previous update looks more current GAS: Drop frame as possible retry of previous fragment time_advertisement * skip group cipher configuration for GTK_NOT_USED due to missing driver support advertisement Beacon Request: Truncated subelement CTRL: SET_NEIGHBOR: Bad civic subelement Multi-AP IE has missing or invalid Multi-AP subelement CTRL: SET_NEIGHBOR: Bad LCI subelement Cannot add Power Constraint element without Country element RRM: Failed to add report element Failed to add LCI report element Bad Measurement Report element CTRL: SET_NEIGHBOR: Missing Neighbor Report element CTRL: SET_NEIGHBOR: Bad Neighbor Report element Truncated 20/40 BSS Intolerant Channel Report element STA %02x:%02x:%02x:%02x:%02x:%02x sent probe request without SSID or supported rates element Not enough room for building extended capabilities element Truncated 20/40 BSS Coexistence element RRM: Truncated element skip - no P2P element skip - no matching GO P2P Device Address in P2P element skip - could not fetch P2P element Could not parse RSN element Could not parse WPA element WPA: WMM Parameter Element P2P: Cancel remain-on-channel prior to starting client EAP-WSC: Prefer PSK format for P2P client wps_independent No driver interfaces build into wpa_supplicant Failed to initialize wpa_supplicant Successfully initialized wpa_supplicant Dropped key data from unauthorized Supplicant wpa_key_mgmt group_mgmt P2P: Remove persistent group %d due to invitation result P2P: Failed to generate scan result WPA: Leave previously set WPA IE default WPA: Set own WPA IE default magic_pkt hostapd_bss_deinit nl80211: %u interface(s) remain at nl80211_global_deinit hostapd_interface_deinit %s: driver=%p drv_priv=%p -> hapd_deinit EAP deinit l2_packet_init hostapd_init txop_limit WPS: Invalid checksum digit tdls_prohibit WPA: Tx bit set for GTK, but pairwise keys are used - ignore Tx bit Unknown GO Neg peer - stop GO Neg wait Starting radio work '%s'@%p after %ld.%06ld second wait nl80211: Driver does not support monitor interface type - try to run without it nl80211: Failed to subscribe for mgmt frames from SME driver - trying to run without it nl80211: Scan timeout - try to abort it skip RSN IE - no mgmt frame protection enabled but AP requires it Not configuring FTM responder as the driver doesn't advertise support for it Channel list update timeout, but interface was not waiting for it Driver is still in listen state - stop it Too long SD response - drop it CTWindow (%d) is bigger than beacon interval (%d) - avoid configuring it Sched scan timeout - stopping it Found newline in value for %s; not returning it WPS: PIN is set - cancelling it WPS: PBC is set - cancelling it nl80211: Not the first BSS - remove it advertised support for AES-128-CMAC, but did not use it Probe Req DA %02x:%02x:%02x:%02x:%02x:%02x not ours - ignore it Could not parse P2P attributes in Probe Req - ignore it ELOOP: Too long timeout (secs=%u) to ever happen - ignore it Probe Req requested Device ID %02x:%02x:%02x:%02x:%02x:%02x did not match - ignore it Probe Req requested Device Type did not match - ignore it Could not parse Probe Request frame - ignore it Not a P2P probe - ignore it Probe Req BSSID %02x:%02x:%02x:%02x:%02x:%02x not wildcard - ignore it Probe Req with 11b rates only supported - ignore it Probe Req not using P2P Wildcard SSID - ignore it Management frame protection required, but client did not enable it p2p_go_vht vht update_sta_no_ht require_ht update_sta_ht ht Invalid country set EAP-WSC: phase1 configuration data not set received invalid EAPOL-Key: Key MIC not set received invalid EAPOL-Key: Key Ack set go_internet ethernet l2_packet_receive: Main packet socket for %s seems to have working RX - close workaround bridge socket nl80211: Could not register monitor read socket EAPOL: Invalid key signature in EAPOL-Key packet EAPOL: Received IEEE 802.1X EAPOL-Key even though this was not accepted - ignoring this packet WPA: EAPOL-Key Replay Counter did not increase - dropping packet WPA: Could not verify EAPOL-Key MIC - dropping packet WPA: Invalid EAPOL-Key MIC - dropping packet EAP: workaround - assume this is not a duplicate packet EAP-WSC: No Message Length field in a fragmented packet too short IEEE 802.1X packet frame too short for this IEEE 802.1X packet ignoring %lu extra octets after IEEE 802.1X packet too short EAP packet Too short frame to contain this EAP packet Ignoring %lu extra bytes after EAP packet WPA: Countermeasures - dropped EAPOL packet get Set check_crl_strict P2P: Removing P2P connection due to single channel concurrent mode frequency conflict WPA: 4-Way Handshake failed - pre-shared key may be incorrect hostapd_wpa_auth_disconnect ap_sta_disconnect wpa_driver_nl80211_disconnect Ignore connection failure due to local request to disconnect STA %02x:%02x:%02x:%02x:%02x:%02x PSK/passphrase no longer valid - disconnect WPA_PTK: sm->Disconnect persistent_reconnect cross_connect hw_magiclink_p2p_ctrl_connect no-connect Auto connect disabled: do not try to re-connect sme-connect STA %02x:%02x:%02x:%02x:%02x:%02x not allowed to connect nl80211: Blocked client %02x:%02x:%02x:%02x:%02x:%02x tried to connect Initially selected channel (op_class %d channel %d) not in channel intersection - try to reselect Ignore Association Request frame from %02x:%02x:%02x:%02x:%02x:%02x due to ACL reject Ignore Authentication frame from %02x:%02x:%02x:%02x:%02x:%02x due to ACL reject WPA: Driver associated with an AP that does not support management frame protection - reject EAP: EAP-Nak received after Phase2 user info was selected - reject PD request for unknown P2P Group ID - reject WPA: Driver used disabled key management 0x%x (mask 0x%x) - reject WPA: Driver used disabled group cipher 0x%x (mask 0x%x) - reject WPA: Driver used disabled pairwise cipher 0x%x (mask 0x%x) - reject RRM: Parallel measurements are not supported, reject check_cert_subject Not building LCI report - bad location subject stat Vendor command: wrong parameter format Wrong BSS range format WPS: Workaround - Force Network Key in PSK format EAPOL: Could not get master key for decrypting EAPOL-Key keys EAPOL: Could not get LEAP master key for decrypting EAPOL-Key keys WPA: Backwards compatibility: allow invalid version for non-CCMP group keys WPA: Start group state machine to set initial keys Disconnect event - remove keys WPA: Pairwise Cipher Suite: NONE - do not use pairwise keys WPS: Generate new DH keys WPS: Using pre-configured DH keys disallows P2PS PD Response missing status wpa_psk_radius P2P: Reschedule group formation timeout since peer is still trying to invite us Cannot add interface - it already exists P2P: Reject start_listen since p2p_listen_work already exists wps_pin_requests nl80211: hidden SSID zero contents P2P: P2P Public Action contents P2P: P2P Action contents received EAPOL-Key msg 2/4 with invalid Key Data contents Fragmented response - request fragments LCI request subelements Not enough room for neighbor subelements Cannot allocate memory for ap_vendor_elements Line %d: invalid ap_vendor_elements assocresp_elements Cannot set Spectrum Management bit without Country and Power Constraint elements Update vendor elements P2P: Could not copy GO Negotiation results nl80211: Try to get scan results Failed to get scan results WPS: Add CCMP into the credential based on scan results WPS: Add WPA2 into the credential based on scan results WPA: No WPA/RSN IE for this AP known. Trying to get from scan results P2P: Ignore scan results WPA: Could not find AP from the scan results Fast associate: Old scan results Sorted scan results WPA: Found the current AP from updated scan results Filtered out %d scan results Do not update BSS table based on pending post-FLUSH scan results GAS: Unexpected TX status: freq=%u dst=%02x:%02x:%02x:%02x:%02x:%02x result=%d - no query in progress P2P: Ignore WPS success event - P2P provisioning not in progress P2P: Ignore WPS fail event - P2P provisioning not in progress Delay station mode scan while P2P operation is in progress Defer scan - PNO is in progress P2P: Not initiating a GO frequency change - CSA is in progress MAC_ADDR_RAND_SCAN cannot allow multicast address MGMT: BSSID=%02x:%02x:%02x:%02x:%02x:%02x not our address MGMT: DA=%02x:%02x:%02x:%02x:%02x:%02x not our address CTRL: REQ_RANGE: Bad responder address CTRL: REQ_RANGE - No FTM responder address hostapd_notif_disassoc: Skip event with no address hostapd_notif_assoc: Skip event with no address WPA: Failed to read BSSID for EAPOL-Key destination address Off-channel: Ignore Action TX status - unknown destination address CTRL: REQ_RANGE - Bad destination address nl80211: %s: Ignore MLME frame event for foreign address GAS: Failed to get random address Using permanent MAC address nl80211: Could not restore permanent MAC address nl80211: Could not set interface down to restore permanent MAC address WPS: UUID based on MAC address Failed to set random MAC address Failed to generate random MAC address nl80211: Source MAC address CTRL: REQ_LCI: Invalid MAC address P2P: Peer device is a GO in a persistent group, but it did not provide the intended MAC address nl80211: %s: failed to re-read MAC address Failed to get own L2 address WPS: Credential did not include MAC Address PNO: In assoc process Ignore malformed PD Response - persistent group is present, but the status isn't success EAP: Received EAP-Success pbss multibss hostapd_setup_bss hostapd_remove_bss p2p_intra_bss p2p_oper_reg_class p2p_listen_reg_class Missing Operating Class wpa_supplicant v2.9 Copyright (c) 2003-2019, Jouni Malinen <j@w1.fi> and contributors P2P: Preferred class/channel pairs Stop ongoing sched_scan to add new network to scan filters Stop ongoing sched_scan to remove network from filters Failed to set beacon parameters Failed to update beacons with WMM parameters P2P: Non-periodic NoA - set NoA parameters P2P: No legacy STAs connected - update periodic NoA parameters openssl_ciphers wowlan_triggers %s: Remove all peers CTRL: REQ_RANGE: Too many responders Could not get random numbers Group common freqs before iterating members P2P CSA: Selected invalid VHT center freqs P2P: Failed to get group common freqs wps sae_groups oppps WMM: Mean Data Rate: %u bps WMM: Minimum PHY Rate: %u bps * htcaps disallow_aps p2ps AdminControlledDirections Deauthenticate all stations nl80211: All sched scan plans but the last must specify number of iterations All scan plans but the last must specify a number of iterations P2P: Use primary interface for group operations Post-Provision Discovery operations started - do not try to continue other P2P operations nl80211_recv_beacons wiphy beacons More fragments remains sched_scan_plans Clear sched scan plans Line %d: invalid roaming_consortiums P2P: p2p_no_go_freq with %u items Line %d: too many sec_device_type items driver_params wpas_p2p_init_go_params Can't set freq params DFS failed to calculate CSA freq params Delay search operation by %u ms GAS: TX status: freq=%u dst=%02x:%02x:%02x:%02x:%02x:%02x result=%d query=%p dialog_token=%u dur=%d ms Blacklist count %d --> request scan in %d ms IEEE 802.1X: Force disconnection of %02x:%02x:%02x:%02x:%02x:%02x after EAP-Failure in 10 ms cli_channels own client channels peer channels own channels P2P: Scan only common channels Group common channels P2PS PD Response - no common channels ACS picked unusable channels P2P: Cannot start P2P group on %u MHz as there are no available channels Beacon request: No valid channels * supported channels P2P: Set GO freq %d MHz from preferred channels prepared channels Limit manual scan to specified channels Limit select_network scan to specified channels Limit sched scan to specified channels Unknown width for %d channels DFS new chan checking %d channels P2P: Channels WPS: Use backhaul STA credentials Short-circuit new scan request since there are no enabled networks nl80211: Failed to allocate netlink callbacks Device is trying to offload Interworking Probe Response while not supporting this Device is trying to offload WPS Probe Response while not supporting this Device is trying to offload P2P Probe Response while not supporting this WPS: The AP did not yet advertise WPA support - use credential as-is WPS: The AP was not found from BSS table - use credential as-is ap_settings WPS: Update AP configuration based on new settings Use default channel settings Use previously configured forced channel settings EAP-WSC: Failed to parse new AP settings WPS: Decrypted Encrypted Settings WPS: Encrypted Settings WPS: * Encrypted Settings WPS: Received new AP Settings WPS: Plaintext AP Settings WPS: Processing AP Settings WPS: * AP Settings auth_algs tls_flags eapol_flags WPS: * Connection Type Flags aifs acs_exclude_dfs yes openssl_ecdh_curves P2PS: Probe Request service hash values Failed to allocate connect IE buffer for %lu bytes wpa_parse_wpa_ie_rsn: ignore trailing bytes wpa_parse_wpa_ie_wpa: ignore trailing bytes NR entry for %02x:%02x:%02x:%02x:%02x:%02x exceeds 0xFF bytes nl80211: Failed to parse nested attributes WPA: Using WPA IE from AssocReq to set cipher suites WPA: Failed to set WPA key management and encryption suites Could not set WPA suites Delay radio work start until externally triggered scan completes supported_rates basic_rates * supported rates P2P: Ignore Probe Request from %02x:%02x:%02x:%02x:%02x:%02x with only 802.11b rates nl80211: Interface %s created for P2P - disable 11b rates nl80211: Interface %s mode change to P2P - disable 11b rates nl80211: Interface %s mode changed to non-P2P - re-enable 11b rates RSN: no more pending PMKSA candidates nl80211: P2P probe - mask SuppRates P2P: The forced channel (%u MHz) is not supported for P2P uses P2P: The forced channel for GO (%u MHz) is not supported for P2P uses * supported operating classes did not use EAPOL-Key descriptor version 0 as required for AKM-defined cases Note: nl80211 driver interface is not designed to be used with ap_scan=2; this can result in connection failures ignore_old_scan_res EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines Failed to get PMK from EAPOL state machines WPA: PMK from EAPOL state machines RSN: failed to get master session key from pre-auth EAPOL state machines P2P: Failed to request the driver to report received Probe Request frames * Extra IEs for Beacon/Probe Response frames WPS: Add Microsoft Provisioning IE into Beacon/Probe Response frames P2PS: CPT name list is too long, expected up to %d names WPS: Order scan results with WPS provisioning rules * vht_capabilities * ht_capabilities nl80211: Extended capabilities HT (IEEE 802.11n) in 11b mode is not allowed, disabling HT capabilities HT (IEEE 802.11n) with WEP is not allowed, disabling HT capabilities HT (IEEE 802.11n) with WPA/WPA2 requires CCMP/GCMP to be enabled, disabling HT capabilities Flushing old station entries wpa_disable_eapol_key_retries group key handshake failed (%s) after %u tries Too many SD request attempts to %02x:%02x:%02x:%02x:%02x:%02x - skip remaining queries P2P: No valid operating frequencies req_ies nl80211: proberesp_ies nl80211: assocresp_ies Truncated IE in beacon_ies nl80211: beacon_ies ric_ies WMM AC: could not parse assoc ies CTRL_IFACE wait for attached monitors to receive messages modes P2P: SD Request for all Bonjour services P2P: Service Discovery Request for all services P2P: SD Request for all UPnP services Failed to reallocate memory for interfaces %s: Interface waiting to sync with other interfaces %s: Last interface to sync - starting all interfaces P2P: Trying to prefer a channel already used by one of the interfaces P2P: No extra channels available - trying to force channel to match a channel already used by one of the interfaces Switch own primary and secondary channel to get secondary channel with no Beacons from other BSSes 20/40 MHz operation not permitted on channel pri=%d sec=%d based on overlapping BSSes Restarting all CSA-related BSSes config_methods eap methods Do not report peer %02x:%02x:%02x:%02x:%02x:%02x with unknown config methods EAP: no more allowed methods EAP: allowed methods EAP: new list of configured methods EAP: configured methods Failed to register EAP methods WPS: Disable AP PIN for %u seconds P2P: Set P2P group idle timeout to %u seconds Reschedule HT 20/40 timeout to occur in %u seconds Radio work '%s'@%p %s in %ld.%06ld seconds Own scan request started a scan in %ld.%06ld seconds Scan completed in %ld.%06ld seconds Scan requested (ret=%d) - scan timeout %d seconds setting session timeout to %d seconds nl80211: Driver does not support authentication/association or connect commands wps_rf_bands filter_ssids org.wi-fi.wfds DFS-CAC-START freq=%d chan=%d chan_offset=%d width=%d seg0=%d seg1=%d cac_time=%ds DFS-CAC-START freq=%d chan=%d sec_chan=%d, width=%d, seg0=%d, seg1=%d, cac_time=%ds GAS: Send comeback request to %02x:%02x:%02x:%02x:%02x:%02x in %u secs %u usecs P2P: Move GO from freq=%d MHz in %d secs WMM AC: Saving tspecs WMM AC: Restore %u saved tspecs WMM AC: Clear saved tspecs WMM AC: Save last configured tspecs P2P: Service Discovery Request TLVs P2P: Service Discovery Response TLVs disconnected due to excessive missing ACKs Too many roaming_consortiums OIs nl80211: Assoc Req IEs WPS: Build Beacon IEs P2P: Beacon IEs CTRL: Failed to build Probe Response IEs WPS: Build Probe Response IEs P2P: Probe Response IEs bss: %s: cannot compare IEs Truncated IEs nl80211: Scan extra IEs nl80211: Updating FT IEs * IEs PNO: No configured SSIDs nl80211: Flush PMKIDs No room for more AIDs WMM AC: No configured TSPECs WMM AC: Successfully saved %d TSPECs WPS: Authorized MACs nl80211: kernel reports: %*s P2PS-PROV-DONE %02x:%02x:%02x:%02x:%02x:%02x status=%d adv_id=%x adv_mac=%02x:%02x:%02x:%02x:%02x:%02x session=%x mac=%02x:%02x:%02x:%02x:%02x:%02x%s P2P-PROV-DISC-PBC-REQ %02x:%02x:%02x:%02x:%02x:%02x%s P2P-PROV-DISC-PBC-RESP %02x:%02x:%02x:%02x:%02x:%02x%s P2P-PROV-DISC-ENTER-PIN %02x:%02x:%02x:%02x:%02x:%02x%s reassociation request: STA=%02x:%02x:%02x:%02x:%02x:%02x capab_info=0x%02x listen_interval=%d current_ap=%02x:%02x:%02x:%02x:%02x:%02x seq_ctrl=0x%x%s association request: STA=%02x:%02x:%02x:%02x:%02x:%02x capab_info=0x%02x listen_interval=%d seq_ctrl=0x%x%s Own preference for operation channel: Operating Class %u Channel %u%s P2P: Remove peer %02x:%02x:%02x:%02x:%02x:%02x from persistent group %d client list%s P2P-GROUP-STARTED %s %s ssid="%s" freq=%d%s%s%s%s%s go_dev_addr=%02x:%02x:%02x:%02x:%02x:%02x%s%s P2P-GROUP-STARTED %s %s ssid="%s" freq=%d go_dev_addr=%02x:%02x:%02x:%02x:%02x:%02x%s%s authentication: STA=%02x:%02x:%02x:%02x:%02x:%02x auth_alg=%d auth_transaction=%d status_code=%d wep=%d%s seq_ctrl=0x%x%s%s p2p_dev_addr=%02x:%02x:%02x:%02x:%02x:%02x pri_dev_type=%s name='%s' config_methods=0x%x dev_capab=0x%x group_capab=0x%x%s%s Channel %d (%s) not allowed for AP mode, flags: 0x%x%s%s P2PS-PROV-DONE %02x:%02x:%02x:%02x:%02x:%02x status=%d conncap=%x adv_id=%x adv_mac=%02x:%02x:%02x:%02x:%02x:%02x session=%x mac=%02x:%02x:%02x:%02x:%02x:%02x dev_passwd_id=%d join=%02x:%02x:%02x:%02x:%02x:%02x%s%s%s nl80211: Channel (%s): freq=%u max_tx_power=%u%s%s%s CTRL-EVENT-ASSOC-REJECT bssid=%02x:%02x:%02x:%02x:%02x:%02x status_code=%u%s%s%s CTRL-EVENT-ASSOC-REJECT status_code=%u%s%s%s RRM-NEIGHBOR-REP-RECEIVED bssid=%02x:%02x:%02x:%02x:%02x:%02x info=0x%x op_class=%u chan=%u phy_type=%u%s%s%s%s WPS: Enrollee Config Methods 0x%x%s%s%s%s%s%s%s%s%s %s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s phyname=%s perm_addr=%02x:%02x:%02x:%02x:%02x:%02x drv_ifindex=%d operstate=%d scan_state=%s auth_bssid=%02x:%02x:%02x:%02x:%02x:%02x auth_attempt_bssid=%02x:%02x:%02x:%02x:%02x:%02x bssid=%02x:%02x:%02x:%02x:%02x:%02x prev_bssid=%02x:%02x:%02x:%02x:%02x:%02x associated=%d assoc_freq=%u monitor_sock=%d monitor_ifidx=%d monitor_refcount=%d last_mgmt_freq=%u eapol_tx_sock=%d %s%s%s%s%s%s%s%s%s%s%s%s%s nl80211: %u-%u @ %u MHz %u mBm%s%s%s%s%s%s%s%s ifindex=%d ifname=%s brname=%s addr=%02x:%02x:%02x:%02x:%02x:%02x freq=%d %s%s%s%s%s%s %s%s%s%s %d%s%s%s CTRL-EVENT-REGDOM-CHANGE init=%s type=%s%s%s CTRL-EVENT-EAP-PEER-CERT depth=%d subject='%s'%s%s%s WPA: BSS %02x:%02x:%02x:%02x:%02x:%02x ssid='%s'%s%s%s %d: %02x:%02x:%02x:%02x:%02x:%02x ssid='%s' wpa_ie_len=%u rsn_ie_len=%u caps=0x%x level=%d freq=%d %s%s%s AP-STA-CONNECTED %s%s%s P2P: Reject p2p_find operation%s%s P2PS-PROV-DONE %02x:%02x:%02x:%02x:%02x:%02x status=%d conncap=%x adv_id=%x adv_mac=%02x:%02x:%02x:%02x:%02x:%02x session=%x mac=%02x:%02x:%02x:%02x:%02x:%02x dev_passwd_id=%d go=%s%s P2P-DEVICE-FOUND %02x:%02x:%02x:%02x:%02x:%02x p2p_dev_addr=%02x:%02x:%02x:%02x:%02x:%02x pri_dev_type=%s name='%s' config_methods=0x%x dev_capab=0x%x group_capab=0x%x adv_id=%x asp_svc=%s%s P2P-GROUP-REMOVED %s %s%s Free pending radio work '%s'@%p%s Remove radio work '%s'@%p%s Allowed channel: mode=%d chan=%d freq=%d MHz max_tx_power=%d dBm%s Michael MIC failure detected in received frame%s P2P-PROV-DISC-SHOW-PIN %02x:%02x:%02x:%02x:%02x:%02x %08d%s P2PS-PROV-DONE %02x:%02x:%02x:%02x:%02x:%02x status=%d adv_id=%x adv_mac=%02x:%02x:%02x:%02x:%02x:%02x session=%x mac=%02x:%02x:%02x:%02x:%02x:%02x persist=%d%s CTRL-EVENT-SCAN-FAILED ret=%d%s CTRL-EVENT-DISCONNECTED bssid=%02x:%02x:%02x:%02x:%02x:%02x reason=%d%s could not add dynamic VLAN interface for vlan=%d%s missing vlan and wildcard for vlan=%d%s PMKID found from PMKSA cache eap_type=%d vlan=%d%s P2PS-PROV-START %02x:%02x:%02x:%02x:%02x:%02x adv_id=%x conncap=%x adv_mac=%02x:%02x:%02x:%02x:%02x:%02x session=%x mac=%02x:%02x:%02x:%02x:%02x:%02x dev_passwd_id=%d%s P2PS-PROV-DONE %02x:%02x:%02x:%02x:%02x:%02x status=%d conncap=%x adv_id=%x adv_mac=%02x:%02x:%02x:%02x:%02x:%02x session=%x mac=%02x:%02x:%02x:%02x:%02x:%02x dev_passwd_id=%d%s nl80211: %d %02x:%02x:%02x:%02x:%02x:%02x %d%s BSS: Add new id %u BSSID %02x:%02x:%02x:%02x:%02x:%02x SSID '%s' freq %d%s WMM: Nominal MSDU Size: %d%s %s: interface state %s->%s nl80211: Regulatory information - country=%s new_ssid=%s new_auth=%s new_encr=%s new_key=%s WPS-ER-AP-SETTINGS uuid=%s ssid=%s auth_type=0x%04x encr_type=0x%04x key=%s CTRL-EVENT-EAP-PEER-CERT depth=%d subject='%s' cert=%s GAS-QUERY-DONE addr=%02x:%02x:%02x:%02x:%02x:%02x dialog_token=%u freq=%d status_code=%u result=%s EAPOL authentication completed - result=%s CTRL-EVENT-AVOID-FREQ ranges=%s load_dynamic_eap=%s CTRL-EVENT-SSID-TEMP-DISABLED id=%d ssid="%s" auth_failures=%u duration=%d reason=%s "pin=%s EAPOL: External notification - portControl=%s nl80211: Register frame type=0x%x (%s) nl_handle=%p match=%s EAPOL: External configuration operation for %02x:%02x:%02x:%02x:%02x:%02x - param=%s value=%s Request to deauthenticate - bssid=%02x:%02x:%02x:%02x:%02x:%02x pending_bssid=%02x:%02x:%02x:%02x:%02x:%02x reason=%d (%s) state=%s dev_capab=0x%x config_methods=0x%x dev_type=%s FILS-HLP-RX dst=%02x:%02x:%02x:%02x:%02x:%02x src=%02x:%02x:%02x:%02x:%02x:%02x frame=%s nl80211: Set WDS STA addr=%02x:%02x:%02x:%02x:%02x:%02x aid=%d val=%d name=%s CTRL_IFACE: Could not find iface=%s P2P-GO-NEG-SUCCESS role=%s freq=%d ht40=%d peer_dev=%02x:%02x:%02x:%02x:%02x:%02x peer_iface=%02x:%02x:%02x:%02x:%02x:%02x wps_method=%s CTRL_IFACE: response handle field=%s keyid=%s uuid=%s nl80211: ssid=%s P2P-PRESENCE-RESPONSE src=%02x:%02x:%02x:%02x:%02x:%02x status=%u noa=%s P2P: Persistent group invitation success - op_freq=%d MHz SSID=%s P2P: Invitation from peer %02x:%02x:%02x:%02x:%02x:%02x was accepted; op_freq=%d MHz, SSID=%s * SSID=%s * alpha2=%s P2P: Common group frequencies:%s nl80211: Scan included frequencies:%s %s %s:%s nl80211: Mode IEEE %s:%s active_work:%s new_work:%s nl80211: if_indices[%d]:%s Local driver frequency preference (size=%u):%s pbc=1%s /sys/class/net/%s/brport/%s /proc/sys/net/ipv%d/conf/%s/%s mon.%s P2P: * Service Instance: %x-%s p2p-dev-%s mon-%s CTRL-REQ-%s %s%s,%d,%u,%s Probe Request from %02x:%02x:%02x:%02x:%02x:%02x for foreign SSID '%s' (DA %02x:%02x:%02x:%02x:%02x:%02x)%s * reason %u (%s)%s authenticated - EAP type: %d (%s)%s Configuration file: %s (phy %s)%s P2P: Request to join existing group (iface %02x:%02x:%02x:%02x:%02x:%02x dev %02x:%02x:%02x:%02x:%02x:%02x op_freq=%d)%s P2PS-PROV-START %02x:%02x:%02x:%02x:%02x:%02x adv_id=%x conncap=%x adv_mac=%02x:%02x:%02x:%02x:%02x:%02x session=%x mac=%02x:%02x:%02x:%02x:%02x:%02x dev_passwd_id=%d info='%s'%s BSS P2P manageability %s P2P functionality %s nl80211: interface %s in phy %s DUP: cannot stringify %s DUP: cannot allocate buffer to stringify %s RSN: pre-authentication with %02x:%02x:%02x:%02x:%02x:%02x %s WPS-REG-SUCCESS %02x:%02x:%02x:%02x:%02x:%02x %s STA-OPMODE-MAX-BW-CHANGED %02x:%02x:%02x:%02x:%02x:%02x %s STA-OPMODE-SMPS-MODE-CHANGED %02x:%02x:%02x:%02x:%02x:%02x %s P2P: * Persistent Group: %02x:%02x:%02x:%02x:%02x:%02x %s BEACON-RESP-RX %02x:%02x:%02x:%02x:%02x:%02x %u %02x %s P2P-SERV-ASP-RESP %02x:%02x:%02x:%02x:%02x:%02x %x %x %x %x %s P2P-SERV-DISC-RESP %02x:%02x:%02x:%02x:%02x:%02x %u %s P2P-SERV-DISC-REQ %d %02x:%02x:%02x:%02x:%02x:%02x %u %u %s Invalid global ctrl UDP port %s Remove remaining child interface %s from parent %s EAP: deinitialize previously used EAP method (%d, %s) at %s %s: deinit bss %s %s:%s%s %s P2P-CROSS-CONNECT-DISABLE %s %s P2P-CROSS-CONNECT-ENABLE %s %s nl80211: if_removed already set - ignore RTM_DELLINK event for %s nl80211: Failed to build NL80211_CMD_SET_MULTICAST_TO_UNICAST msg for %s nl80211: No monitor socket available for %s Failed to setup control interface for %s nl80211: Drv Event %d (%s) received for %s nl80211: BSS Event %d (%s) received for %s nl80211: Interface %s is in master %s %s: free hapd %p %s BSS: Remove id %u BSSID %02x:%02x:%02x:%02x:%02x:%02x SSID '%s' due to %s Direct P2P_CONNECT command to %s nl80211: Monitor interface name has been truncated to %s Driver-initiated BSS selection changed the SSID to %s Add interface %s to a new radio %s Remove interface %s from radio %s Add interface %s to existing radio %s Remove radio %s Intra BSS distribution %s Cross connection %s %s: Ignore Probe Request from %02x:%02x:%02x:%02x:%02x:%02x since STA has been seen on %s %s: Reject authentication from %02x:%02x:%02x:%02x:%02x:%02x since STA has been seen on %s Interface name not specified in %s Do not parallelize radio work with %s Failed to set up interface with %s Not P2PS PD Request. Missing %s Network bssid config changed for the current network - within-ESS roaming %s P2P: Complete previously requested removal of %s AP interface setup completed - state %s Try to remove and re-create %s Line %d: failed to parse %s nl80211: Driver-advertised extended capabilities for interface type %s P2P: Driver forced interface name %s nl80211: Remove ifindex %u for bridge %s nl80211: Add ifindex %u for bridge %s nl80211: Adding interface %s into bridge %s nl80211: Interface %s is in bridge %s nl80211: which is in bridge %s nl80211: Removing interface %s from bridge %s nl80211: Failed to remove interface %s from bridge %s nl80211: Failed to add the new interface %s to a bridge %s Previous country code %s, new country code %s CTRL: Drop packet from unexpected source %s Could not set PrivacyInvoked for interface %s Could not disable PrivacyInvoked for interface %s P2P: Removing pending group interface %s P2P: Remove group interface %s P2P: Use separate group interface %s nl80211: multicast to unicast %s on interface %s P2P: Use %u ms search delay due to concurrent operation on interface %s nl80211: multicast to unicast not supported on interface %s nl80211: %s multicast to unicast failed with %d (%s) on interface %s Could not remove generic information element from interface %s Removing interface %s nl80211: Continue using existing interface %s Enable interface %s nl80211: Failed to create a P2P Device interface %s Reconfigured interface %s Added interface %s Failed to add interface %s Reload interface %s Failed to remove BSS interface %s CTRL-EVENT-EAP-PEER-ALT depth=%d %s P2P: %s conncap: %d - ASP parsed: %x %x %d %s CRED-MODIFIED %d %s CTRL_IFACE SA_QUERY %s %s: disconnect old STA %02x:%02x:%02x:%02x:%02x:%02x association from another BSS %s WPS-NEW-AP-SETTINGS %s CTRL_IFACE LEVEL %s WPA: using PTK %s WPA: using GTK %s WPS-ER-AP-REMOVE %s CTRL_IFACE DISASSOCIATE %s CTRL_IFACE DEAUTHENTICATE %s WPS: PIN needed for UUID-E %s WPS: PIN needed for E-UUID %s Invalid BSSID %s nl80211: Delete PMKSA for cache id %02x%02x SSID %s nl80211: Add PMKSA for cache id %02x%02x SSID %s nl80211: Sched scan filter SSID %s nl80211: Scan SSID %s P2P: Trying to find target GO BSS entry based on BSSID %02x:%02x:%02x:%02x:%02x:%02x and SSID %s Scan a previously specified BSSID %02x:%02x:%02x:%02x:%02x:%02x and SSID %s AP-STA-DISCONNECTED %s P2P-INTERFACE-CREATED GC %s CTRL_IFACE NEW_STA %s CTRL_IFACE POLL_STA %s State %s -> %s State: %s -> %s EAP-WSC: %s -> %s Could not set WEP keys for WDS interface; %s nl80211: Failed to set socket priority: %s Invalid roaming_consortiums entry: %s phy: %s New SSID postfix: %s Invalid sched scan plan input: %s %s: Failed to set FD_CLOEXEC - continue without: %s Invalid ctrl_iface UDP port: %s netlink: Failed to open netlink socket: %s netlink: Failed to bind netlink socket: %s %s: socket: %s AP mode active - skip EAPOL Supplicant port status: %s EAPOL: Supplicant port status: %s CTRL: Invalid MAC address: %s Could not read interface %s flags: %s %s: STA %02x:%02x:%02x:%02x:%02x:%02x%s%s: %s nl80211: Failed to write to %s: %s nl80211: Failed to open %s: %s Could not add interface %s into bridge %s: %s nl80211: Failed to add interface %s into bridge %s: %s Could not remove interface %s from bridge %s: %s nl80211: Failed to remove interface %s from bridge %s: %s Could not remove bridge %s: %s nl80211: Failed to remove bridge %s: %s Could not add bridge %s: %s nl80211: Failed to add the bridge interface %s: %s WPS: UUID %s: %s eloop: %s: %s Failed to open config file '%s', error: %s CTRL: Invalid MAC_RAND_SCAN parameter: %s Line %d: invalid group_mgmt_cipher: %s hostapd_logger: %s Could not set interface %s hwaddr: %s Could not get interface %s hwaddr: %s Failed to send assoc resp: %s l2_packet_send - sendto: %s P2P: Add Svc: %s info: %s daemon: %s l2_packet_receive_br - recvfrom: %s l2_packet_receive - recvfrom: %s DFS %d chans unavailable - choose other channel: %s CTRL: Invalid MAC address mask: %s Failed to send deauth: %s nl80211: sendmsg: %s BSS config: %s nl80211: Could not set nl_socket RX buffer size: %s eloop_sock_requeue: %s WPS: Primary Device Type: %s WPS: Failed to rename the updated configuration file: %s Configuration file: %s rfkill: Cannot set non-blocking mode: %s Single channel concurrency preference: %s P2P: Matching UPnP Service: %s l2_packet_send - send: %s Global ctrl_iface command: %s add to filter ssid: %s add to active scan ssid: %s nl80211: Monitor socket recv failed: %s nl80211: EAPOL recv failed: %s CTRL: sendto failed: %s netlink: recvfrom failed: %s nl80211: monitor socket bind failed: %s rfkill: Event read failed: %s nl80211: socket[PF_PACKET,SOCK_RAW] failed: %s l2_packet_linux: setsockopt(SO_ATTACH_FILTER) failed: %s nl80211: setsockopt(SO_ATTACH_FILTER) failed: %s nl80211: socket(PF_INET,SOCK_DGRAM) failed: %s nl80211: socket(PF_PACKET, SOCK_DGRAM, ETH_P_PAE) failed: %s P2P: Group SSID specified: %s P2P: Add Svc: %s %s: bind[PF_PACKET-fd_br_rx]: %s %s: ioctl[SIOCGIFINDEX]: %s %s: bind[PF_PACKET]: %s %s: ioctl[SIOCGIFHWADDR]: %s %s: ioctl[SIOCGIFADDR]: %s nl80211: EAPOL TX: %s SUPP: %s P2P: %s P2P: Randomly generated PIN: %s AUTH: %s NOTE: %s Starting AP scan for specific SSID: %s %s: socket(PF_PACKET-fd_br_rx): %s nl80211: %s P2P Device %s (0x%llx): %s nl80211: Delete P2P Device %s (0x%llx): %s Shared frequencies (len=%u): %s Scan SSID (manual request): %s Could not set interface %s flags (%s): %s sendto(CTRL_IFACE monitor): %s recvfrom(ctrl_iface): %s socket(PF_INET): %s bind(AF_INET): %s %s: socket(PF_PACKET): %s P2P: Primary Device Type (WPS): %s DFS all channels available, (SKIP CAC): %s getaddrinfo(): %s hostapd_logger: STA %02x:%02x:%02x:%02x:%02x:%02x - %s AUTH: %02x:%02x:%02x:%02x:%02x:%02x - %s CTRL_IFACE monitor[%d]: %d - %s Configured channel (%d) not found from the channel list of current mode (%d) %s CTRL_IFACE: GET_CAPABILITY '%s' %s #WPS# %s %d %s bonjour P2P: SD Request for Bonjour id_str nl80211_send_monitor nl80211: send_frame(freq=%u bss->freq=%u) -> send_monitor CTRL_IFACE - %s - wait for monitor ftm_initiator eap_authenticator RSN: Timeout on waiting Authentication frame response from %02x:%02x:%02x:%02x:%02x:%02x - start authenticator WPS: Last message not available for validating authenticator WPS: Last message not available for building authenticator WPS: Incorrect Authenticator WPS: * Key Wrap Authenticator RSN: PMKID from Authenticator WPS: * Authenticator Parameter error WMM AC: Allocation error nl80211: Interface already in requested mode - ignore error frequency(%d MHz) error No Error vendor Not enough room for additional neighbor osu_dir Line %d: obsolete eap_authenticator used; this has been renamed to eap_server TxReq called, but there is no EAP request from authentication server Invalid VLAN %d%s received from RADIUS server hostapd_deinit_driver Invalid/unknown driver '%s' - registering the default driver Could not read BSSID from driver Could not read SSID from driver Failed to read SSID from driver Could not set channel for kernel driver Could not set fragmentation threshold for kernel driver Could not set RTS threshold for kernel driver Could not set SSID for kernel driver Could not connect to kernel driver Could not %s STA to kernel driver Could not add STA to kernel driver %s: Could not remove station %02x:%02x:%02x:%02x:%02x:%02x from kernel driver %s: Removing STA %02x:%02x:%02x:%02x:%02x:%02x from kernel driver P2P: The forced channel for GO (%u MHz) is DFS, and DFS is offloaded to the driver WPA: Installing PTK to the driver WPA: Do not re-install same PTK to the driver WPA: Failed to configure IGTK to the driver Failed to set PMK to the driver RSN: flushing PMKID list in the driver /sys/class/net/%s/master replay_counter Updated key replay counter EAPOL: last replay counter WPA: Association event - clear replay counter pending replay counter EAPOL: received replay counter received EAPOL-Key %s with unexpected replay counter received EAPOL-Key request with replayed counter Key Counter WPA: Received Replay Counter WPA: Replay Counter nl80211: Rekey offload - Replay Counter Init Counter peer_filter bssid_filter nl80211: Failed to set IPv6 unicast in multicast filter nl80211: Failed to set IPv4 unicast in multicast filter AP: Clear MAC address filter Do not add peer filter for %02x:%02x:%02x:%02x:%02x:%02x due to peer filter Disable peer filter Not enough room for SSID filter for sched_scan - drop filter Failed to attach pkt_type filter nl80211: Failed set gratuitous ARP filter nl80211: Failed to set unsolicited NA filter after nl80211: Driver does not support CTWindow configuration - ignore this parameter Interface name not specified in %s, nor by '-i' parameter Line %d: Invalid passphrase character P2P: Failed to start scan for join - try again later P2P: Failed to find BSS/GO - try again later ieee802_1x_get_eap_user %s: Failed to find user Line %d: Too long manufacturer WPS: Manufacturer WPS: * Manufacturer Failed to initialize driver interface - try next driver wrapper roaming_partner Ignore new scan request for %d.%06d sec since an earlier request is scheduled to trigger sooner ap_handle_timer nas_identifier update_identifier / FILS Cache Identifier group_mgmt_cipher group_cipher WPA: Failed to select group cipher WPA: not using MGMT group cipher WPA: Failed to select pairwise cipher %s: AES-128-CMAC used as pairwise cipher Line %d: removed CCMP from group cipher list since it was not allowed for pairwise cipher BSS: Ignore driver BSS table entry that is %u.%06u seconds older than our scan trigger nl80211: Scan trigger Drop old SD reassembly buffer %s: Failed to allocate message buffer hostapd_logger: Failed to allocate message buffer wpa_msg_global_ctrl: Failed to allocate message buffer wpa_msg_ctrl: Failed to allocate message buffer wpa_msg_no_global: Failed to allocate message buffer wpa_msg_global: Failed to allocate message buffer wpa_msg: Failed to allocate message buffer WPA: No memory for AES-UNWRAP buffer Keypad - always defer Remove oldest peer entry to make room for a new peer User has rejected this peer Already in Group Formation with another peer EAP: list of methods supported by the peer Selected operating channel (op_class %u channel %u) not acceptable to the peer P2P: Use freq %d MHz common with the peer Starting GO Negotiation with previously authorized peer %s: Successfully removed a specific peer WPA: Ignore IGTK configuration error due to invalid IGTK KeyID byte order ftm_responder IEEE 802.11: Return unknown Action frame back to sender pcsc_reader P2P: Unexpected Device Name header P2P: * P2P IE header Line %d: Too long model_number Line %d: Too long serial_number Missing Channel Number WPS: Model Number WPS: * Model Number WPS: Serial Number WPS: * Serial Number go_p2p_dev_addr use_pae_group_addr l2_packet_get_ip_addr own_ip_addr use_driver_iface_addr P2PS PD Response missing intended_addr p2p_device_persistent_mac_addr nl80211: Could not restore interface UP after set_mac_addr nl80211: Could not restore interface UP after failed set_mac_addr p2p_device_random_mac_addr p2p_interface_random_mac_addr gas_rand_mac_addr preassoc_mac_addr nl80211: Failed to enable/disable 4addr EAP-WSC: Unknown new_encr EAP-WSC: Missing new_encr Encr l2_packet_receive_br WPS: AP Setup is locked - refuse registration of a new Registrar WPS: Received new AP configuration from Registrar EAP-WSC: Timeout while waiting for an External Registrar WPS: Selected Registrar timeout - unselect internal Registrar WPS: PIN completed using internal Registrar WPS: * Selected Registrar Failed to initialize WPS Registrar skip - WPS AP without active PBC Registrar clear radar SUPP: set_key - seq preq disallow_freq scan_cur_freq wpas_p2p_select_go_freq Line %d: Invalid p2p_no_go_freq scan_freq wpa_supplicant_notify_avoid_freq * fixed_freq p2p_ignore_shared_freq P2P: Failed to reselect freq P2P CSA: Bad freq eap_identity_req disable_ip_addr_req mgmt::reassoc_req mgmt::assoc_req Already scanning - Reschedule the incoming scan req EAP-WSC: Unexpected state %d in buildReq STA included WPS IE in (Re)AssocReq STA included RSN IE in (Re)AssocReq STA did not include WPS/RSN/WPA IE in (Re)AssocReq STA included WPA IE in (Re)AssocReq WPS: Failed to parse WPS IE from (Re)AssocReq WPS: WPS IE from (Re)AssocReq No supported rates element in AssocReq WPA IE in AssocReq P2P-FALLBACK-TO-GO-NEG reason=no-ACK-to-PD-Req Proceed with AP/channel setup nl80211: TDLS external setup Channel list updated - continue setup %s: freq %d MHz does not require DFS. Continue channel/AP setup fils_dh_group owe_group go_venue_group ctrl_interface_group P2P: Invalid passphrase in persistent group P2P: 50 ms wait on current channel before starting persistent group P2P: Accept invitation to already running persistent group P2P: Override passphrase based on requested persistent group P2P: Could not determine whether 4-way handshake failures were for a persistent group P2P: Accept previously initiated invitation to re-invoke a persistent group P2P: Not associated - cannot invite to current group Client was not in this group P2P: Invitation from %02x:%02x:%02x:%02x:%02x:%02x requested reinvocation of an unknown group P2P: Disconnect peer %02x:%02x:%02x:%02x:%02x:%02x (iface_addr=%d) from group P2P: Failed to send Provision Discovery Request before joining an existing group 20 ms wait on current channel before starting group P2P: Frequency conflict - terminate group P2P: Group idle timeout reached - terminate group P2P: Using random MAC address %02x:%02x:%02x:%02x:%02x:%02x for the group P2P: Generate random MAC address %02x:%02x:%02x:%02x:%02x:%02x for the group P2P: Failed to allocate a new interface address for the group P2P: Create a new interface %s for the group P2P: Failed to allocate a new interface for the group P2P: Peer was found running GO%s -> try to join the group P2P: All channels are in use and none of them are P2P enabled. Cannot start P2P group CTRL_IFACE: Could not find SSID id=%d for persistent P2P group CTRL_IFACE: Cannot use SELECT_NETWORK with persistent P2P group CTRL_IFACE: Cannot use DISABLE_NETWORK with persistent P2P group CTRL_IFACE: Cannot use ENABLE_NETWORK with persistent P2P group P2P: Could not select 5 GHz channel for P2P group HT secondary channel offset %d for P2P group * P2P group 2/2 Group hostapd_cleanup nl80211: Ignore interface down event since interface %s is up nl80211: Failed to set WDS STA interface %s up nl80211: Not the main interface (%s) - do not indicate interface up p2p_ctrl_asp_provision_resp Possible downgrade attack detected - RSN was enabled and RSN IE was in msg 3/4, but not in Beacon/ProbeResp IE in 3/4 msg does not match with IE in Beacon/ProbeResp WPA: No RSN IE in Beacon/ProbeResp WPA: RSN IE in Beacon/ProbeResp WPA: No WPA IE in Beacon/ProbeResp WPA: WPA IE in Beacon/ProbeResp ocsp asp provisioning_sp EAPOL: txSuppRsp EAPOL: getSuppRsp erp /proc/sys/net/ipv4/conf/%s/drop_gratuitous_arp ibss_rsn_stop Find timeout -> stop Stop Failed to start eloop Listen operation did not seem to start - delay search phase to avoid busy loop Listen operation did not seem to start - delay idle phase to avoid busy loop Failed to initialize event loop upnp nl80211: Scan result dump sae_require_mfp Start a pre-selected network without scan step Failed to allocate EIDs bitmap WPS: Checking active PBC sessions for overlap WPS: Reject negotiation due to PBC session overlap WPS: No match on P2P Device Address filtering for PBC: expected %02x:%02x:%02x:%02x:%02x:%02x was %02x:%02x:%02x:%02x:%02x:%02x - indicate PBC session overlap P2P: Terminate connection due to WPS PBC session overlap WPS-OVERLAP-DETECTED PBC session overlap Overlap load_dynamic_eap conn_cap P2PS PD Response missing feature_cap stationary_ap multi_ap nl80211: Setting QoS Map p2p Add radio work '%s'@%p Off-channel: Clear pending Action frame TX (pending_action_tx=%p %s:bss[%d]->drv_priv=%p ELOOP: remaining timeout: %d.%06d eloop_data=%p user_data=%p handler=%p ELOOP: remaining socket: sock=%d eloop_data=%p user_data=%p handler=%p nl80211: Disable Probe Request reporting nl_preq=%p nl80211: Enable Probe Request reporting nl_preq=%p nl80211: Probe Request reporting already on! nl_preq=%p Searching a PSK for %02x:%02x:%02x:%02x:%02x:%02x p2p_dev_addr=%02x:%02x:%02x:%02x:%02x:%02x prev_psk=%p Searching a PSK for %02x:%02x:%02x:%02x:%02x:%02x prev_psk=%p %s: free iface=%p Considering connect request: reassociate: %d selected: %02x:%02x:%02x:%02x:%02x:%02x bssid: %02x:%02x:%02x:%02x:%02x:%02x pending: %02x:%02x:%02x:%02x:%02x:%02x wpa_state: %s ssid=%p current_ssid=%p Off-channel: TX status result=%d cb=%p EAP: method process -> ignore=%s methodState=%s decision=%s eapRespData=%p P2P: GO(iface)=%p members=%u CLI(iface)=%p persistent(ssid)=%p Cancel pending SD query %p Remove completed SD query %p Added SD Query %p nl80211: Subscribe to mgmt frames with mesh handle %p nl80211: Subscribe to mgmt frames with non-AP handle %p nl80211: Subscribe to mgmt frames with AP handle %p %s: free iface %p %s: free hapd %p adv_id: 0x%X, p2ps_adv: %p ASP find - ASP list: %p AUTH_GET_MSK: Key is null, eapol_sm: %p WPA: Could not get PMK, get_msk: %p P2P: * Service Instance: %p P2P: * Service Instance: %u bytes - %p P2P: No ACK for PD Req during p2p_connect-auto auto Auto proto nl80211: No second BSS to reassign context to scan plan %u: Number of iterations cannot be zero pno BSS '%s' may not have BSSID set to the MAC address of the radio Station %02x:%02x:%02x:%02x:%02x:%02x has been active %is ago ip_addr_go WPA: No Ack bit in key_info WPA: Unsupported SMK bit in key_info P2PS PD Response missing p2p_device_info Truncated IE in assoc_info Invalid neighbor subelement info P2P: IP address info WPA: No WPA/RSN IE available from association info WPA: Failed to parse WPA IE from association info Unsufficient buffer, failed to add advertised service info Invalid IE length, failed to add advertised service info Invalid service name length (%u bytes), failed to add advertised service info nl80211: Unexpected vendor data info * P2P Group Info P2P: * Group Info P2P: * Device Info wpa_bss_remove_oldest_unknown Peer %02x:%02x:%02x:%02x:%02x:%02x unknown Unknown No SD peer entry known Update peer %02x:%02x:%02x:%02x:%02x:%02x based on GO Neg Req since listen/oper freq not known skip - SSID not known Provision Discovery Request destination %02x:%02x:%02x:%02x:%02x:%02x not yet known Postpone 4-address WDS mode enabling for STA %02x:%02x:%02x:%02x:%02x:%02x since TX status for AssocResp is not yet known AP teardown nl80211: Ignore interface up event since interface %s is down nl80211: Mode change succeeded while interface is down nl80211: Could not set bridge %s down nl80211: Delaying mode set while interface going down nl80211: Failed to set interface down nl80211: Try mode change after setting interface down nl80211: Not the main interface (%s) - do not indicate interface down un wpa_parse_wpa_ie_rsn Peer using pushbutton virtual_push_button physical_push_button daemon model_description completion supp_mlme_setprotection skip RSN IE - no mgmt frame protection OLBC HT AP detected: %02x:%02x:%02x:%02x:%02x:%02x (channel %d) - enable protection OLBC AP detected: %02x:%02x:%02x:%02x:%02x:%02x (channel %d) - enable protection nl80211: Driver does not support radar detection DFS %d channels required radar detection forced freq %d MHz not in the supported channels intersection Pick possible 5 GHz channel (op_class %u channel %u) from intersection Using original operating class and channel (op_class %u channel %u) from intersection Pick highest preferred channel (op_class %u channel %u) from intersection Pick possible VHT channel (op_class %u channel %u) from intersection Pick possible HT40 channel (op_class %u channel %u) from intersection Pick best 5 GHz channel (reg_class %u channel %u) from intersection Pick best 2.4 GHz channel (reg_class %u channel %u) from intersection Pick another channel (reg_class %u channel %u) from intersection Pick best overall channel (reg_class %u channel %u) from intersection Pick own channel preference (reg_class %u channel %u) from intersection P2P: WLAN AP %s cross connection P2P: Re-start group formation timeout (%d seconds) as client for initial connection P2P: Re-start group formation timeout (%d seconds) as GO for initial connection WPS: Moving to Configured state based on first Enrollee connection P2P: Marking group formation completed on GO on first data connection P2P: Canceled P2P group formation timeout on data connection P2P: Marking group formation completed on client on data connection Do not use results from externally requested scan operation for network selection * Leave out Auth Type for automatic selection mgmt::action p2p-send-action hostapd_wmm_action - could not parse wmm action Listen channel was previously configured - do not override based on optimization nl80211: Found matching own interface, but failed to complete reinitialization Completing interface initialization wpa_rsc_relaxation WPS: DH public keys not available for R-Hash derivation WPS: DH public keys not available for E-Hash derivation WPA: No PMK set for PTK derivation WPA: Unsupported cipher (0x%x) used in PTK derivation Wi-Fi Easy and Secure Key Derivation WPA: Re-initialize GMK/Counter on first station wmm action received is not from associated wmm station SD response long enough to require fragmentation P2P: Clear p2p_in_invitation P2P: The only available interface is already in use - reject invitation P2P: No current SSID to use for invitation P2P: Could not find persistent group data matching with invitation P2P: Scan only GO preferred frequency %d MHz during invitation P2P: No specific SSID known for scan during invitation P2P: Use specific SSID for scan during invitation P2P: Accept previously authorized invitation WPS: Updating in-memory configuration WPS: * AP Settings based on current configuration %s: Failed to allocate memory for configuration %s: Failed to commit driver configuration WPA: Set cipher suites based on configuration Use passive scan based on configuration Using wired authentication - overriding ap_scan configuration Ignore AUTH_TIMED_OUT in mesh configuration Ignore ASSOC_TIMED_OUT in mesh configuration Failed to re-configure WPA PSK after reloading configuration Signal %d received - reloading configuration P2P: Failed to update configuration WPS: Failed to reload the updated configuration WPS: Reject new AP settings due to WEP configuration WPS: Reject Credential due to WEP configuration Failed to create AP configuration WPS: Update local configuration based on the AP configuration P2P: Ignore own channel preference %d MHz due to p2p_ignore_shared_freq=1 configuration P2P: Ignore own channel preference %d MHz for invitation due to p2p_ignore_shared_freq=1 configuration RRM: Driver does not support dwell time configuration - reject beacon report with mandatory duration Do not start Service Discovery with %02x:%02x:%02x:%02x:%02x:%02x due to it being the first no-ACK peer in this search iteration completed iteration Switching to 40 MHz operation Switching to 20 MHz operation P2P: Use %u ms search delay due to concurrent operation P2P: Starting pending join-existing-group operation Off-channel: Ignore Action TX status - no pending operation WPA: Reject 4-way handshake to collect more entropy for random number generation P2P: GO move - schedule re-consideration GAS: TX status for unexpected destination Using the source address of the last received EAPOL frame %02x:%02x:%02x:%02x:%02x:%02x as the EAPOL destination Using current BSSID %02x:%02x:%02x:%02x:%02x:%02x from the driver as the EAPOL destination MAC_ADDR_RAND_SCAN invalid addr/mask combination rfkill: Cannot get wiphy information Could not update MAC address information Select network based on association information nl80211: Added 802.11b mode based on 802.11g information Cannot connect to P2P Device %02x:%02x:%02x:%02x:%02x:%02x with incomplete information BSS: Do not update scan IEs for %02x:%02x:%02x:%02x:%02x:%02x since that would remove P2P IE information Missing BSSID Information P2P: Another interface (%s) in group formation P2P: Request to cancel group formation P2P: Waiting for initial client connection during group formation P2P: new_psk_cb during group formation Mandatory Operating Channel attribute missing from GO Negotiation Confirmation Mandatory P2P Group ID attribute missing from GO Negotiation Confirmation Stopped waiting for TX status on GO Negotiation Response since we already received Confirmation WPS: No more registrars available - terminate negotiation EAP-Identity: failed to pick up already started negotiation WPS: PBC overlap - deny PBC negotiation Timeout on waiting peer to become ready for GO Negotiation Wait for the peer to become ready for GO Negotiation Go to Listen state while waiting for the peer to become ready for GO Negotiation P2P: GO not found for p2p_connect-auto - fallback to GO Negotiation P2P: PD for p2p_connect-auto failed - fall back to GO Negotiation P2P: Fall back to GO Negotiation No pending GO Negotiation P2P: Peer was not found to be running a GO -> use GO Negotiation disassociation nl80211: Ignore disconnect event triggered during reassociation nl80211: Ignore connection failure event triggered during reassociation Considering within-ESS reassociation Station does not support mandatory HT PHY - reject association No PSK available for association Station tried to use TKIP with HT association External server certificate validation P2P: Waiting for peer to start another invitation exchange to indicate readiness for re-invocation EAP: maintaining EAP method data for fast reauthentication nl80211: Retry authentication after forced deauthentication RSN: not in suitable state for new pre-authentication RSN: Failed to initialize EAPOL state machines for pre-authentication RSN: Failed to initialize L2 packet processing for pre-authentication RSN: PMKSA candidate %02x:%02x:%02x:%02x:%02x:%02x selected for pre-authentication RSN: Failed to initialize L2 packet processing (bridge) for pre-authentication EAP: Using previous method data for fast re-authentication start authentication Ongoing TKIP countermeasures (Michael MIC failure) - reject authentication Authentication frame from %02x:%02x:%02x:%02x:%02x:%02x waiting for an external authentication aborting authentication RSN: Timeout on waiting for the AP to initiate 4-way handshake for PMKSA caching or EAP authentication - try to force it to start EAP authentication EAP: EAP-Initiate/Re-auth-Start - No suitable ERP keys available - try to start full EAP authentication RSN: no PMKSA entry found - trigger full EAP authentication RSN: Do not reply to msg 1/4 - requesting full EAP authentication RSN: Authenticator did not accept PMKID, doing full EAP authentication No pending Group Formation - ignore WPS registration success notification Disassociation notification Process pending EAPOL frame that was received from %02x:%02x:%02x:%02x:%02x:%02x just before association notification Process pending EAPOL frame that was received just before association notification Deauthentication notification No pending Group Formation - ignore group formation failure notification Add new STA %02x:%02x:%02x:%02x:%02x:%02x based on ctrl_iface notification System suspend notification event %d notification EAP: Generating EAP-Response Notification remote certificate verification Line %d: invalid os_version eapol_version %s: malformed ie or unknown version Unsupported WMM IE Subtype/Version WPS: * OS Version WPS: Skip invalid Vendor Extension WPS: * Vendor Extension Group key expansion Pairwise key expansion IGTK key expansion p2p_ctrl_asp_provision no_probe_resp_if_seen_on no_auth_if_seen_on ap_pin pcsc_pin P2P: Peer using P2PS default pin Peer using P2PS pin P2P: Scan results received (%d BSS) for %sjoin P2P: Stop pending scan for join P2P: Provision discovery with %02x:%02x:%02x:%02x:%02x:%02x already done - proceed to join P2P: Stop pending PD before join cwmin bignum_set_unsigned_bin bignum_get_unsigned_bin erp_domain No APs found - clear blacklist and try again Previous Extended Listen operation had not been completed - try again Failed to request a scan of neighboring BSSes ret=%d (%s) - try to scan again Failed to get scan results - try scanning again nl80211: Try to authenticate again magiclink cmd in p2p-listen p2p_scan running - connect is already pending - skip listen Peer expected to wait our response - skip listen p2p_passphrase_len P2PS: Invalid feature capability len nl80211: hidden SSID zero len ext_nfc_token int_nfc_token skip - no P2P IE seen nl80211: Setting wowlan Too many SSIDs. Default to using single scheduled_scan plan override_pref_op_chan p2p_optimize_listen_chan p2p_add_cli_chan p2p_pref_chan autoscan bgscan ap_scan Failed to start p2p_scan Running p2p_scan passive_scan Channel list changed - restart sched_scan Add wildcard SSID to sched_scan p2p-scan P2P: Peer BSS entry not updated in the last scan nl80211: Failed to abort scan nl80211: Abort scan No enabled networks - do not scan Disconnected - do not scan in older scan no match in scan WPS: Cancel operation - cancel scan Abort an ongoing scan Do not request new immediate scan Schedule PNO on completion of ongoing sched scan Cancelling sched scan Failed to initiate sched scan Starting delayed sched scan Cancelling delayed sched scan Failed to assign random MAC address for a scan External program started a scan Failed to initiate AP scan Request driver to clear scan cache due to manual only_new=1 scan In ieee80211n track_sta_max_num sim_num required_roaming_consortium Sending GO Negotiation Confirm Building GO Negotiation Confirm random realm * FILS ERP Realm reassoc_same_bss_optim external_sim Could not add end delim Could not read SSID from system Line %d: invalid bss item External radio work in progress - delay start of pending item Line %d: invalid TX queue item Line %d: invalid bssid item Line %d: invalid WMM ac item Line %d: invalid WMM AC item nl80211: Interface %s mode is for non-P2P, but 11b rates were disabled - re-enable them acm driver_param hw_magiclink_scan_param nl80211: Sched scan RSSI filter %d dBm nl80211: Noise: %d dBm bignum_mul manufacturer_url model_url nlctrl check_crl tdls_trigger_control tdls_external_control kernel-control userspace-control AdminControlledPortControl auth_send_eapol supp_alloc_eapol nl80211: Could not register read socket for eapol AP doesn't support Multi-AP protocol nl /dev/null %s:wpa_s or cmd is null skip_inactivity_poll STA %02x:%02x:%02x:%02x:%02x:%02x %s pending activity poll STA %02x:%02x:%02x:%02x:%02x:%02x ACKed pending activity poll Station %02x:%02x:%02x:%02x:%02x:%02x has ACKed data poll /dev/rfkill nl80211: Could not yet enable interface '%s' due to rfkill nl80211: Use (%s) to initialize P2P Device rfkill mixed_cell Install ssdp:all CTRL_IFACE: REMOVE_NETWORK all CTRL_IFACE: DISABLE_NETWORK all CTRL_IFACE: ENABLE_NETWORK all CTRL_IFACE: REMOVE_CRED all nl80211: Beacon tail nl80211: Unknown secondary channel information - following channel definition calculations may fail magiclink: Start scan for network selection fail logger_stdout_level logger_syslog_level CTRL_IFACE changed monitor level Skip roam - Current BSS has better signal level p2p_oper_channel p2p_listen_channel P2PS PD Response missing operating_channel Unknown regulatory class/channel Scan for neighboring BSSes prior to enabling 40 MHz channel ACS was disabled on your build, rebuild hostapd with CONFIG_ACS=y or set channel P2P: Current operating channels are not available for P2P. Try to use another channel Failed to convert freq to channel P2P: Failed to select random social channel as operation channel Apply change in listen channel Defer setting listen channel DFS: Selecting random channel P2P: * Listen Channel: Ignore null channel P2P: * Operating Channel: Ignore null channel Resend Invitation Request setting op_class %u channel %u as operating channel Freq %d MHz is a common preferred channel for both peer and local, use it as operating channel Inviting in active GO role - wait on operating channel P2P: Update Listen channel to %u based on operating channel Freq %d MHz is a preferred channel and is also supported by peer, use it as the operating channel P2PS PD Response - invalid operating channel P2P: force GO freq (%d MHz) on a free channel Cannot determine operating class and channel could not get valid channel Off-channel: Schedule Action frame to be transmitted once the driver gets to the requested channel Hardware does not support configured channel Peer does not support the forced channel Ignore malformed PD Response - unexpected Listen Channel ap_sta_wps_cancel nl80211: No pending remain-on-channel to cancel label macaddr_acl Failed to set deny acl Failed to set accept acl obss_interval max_listen_interval sched_scan_interval crl_reload_interval P2P: PSK failure removal was scheduled, so use PSK failure as reason for group removal intersection after no-GO removal are_ies_equal Bi-directional hostapd_cleanup_iface_partial Remove network id %d since it used the removed credential WPS: Create a new network based on the received credential WPS: Replace WPS network block based on the received credential Line %d: unknown EAP type '%s' for a credential WPS: Process Credential WPS: SSID for Credential WPS: Received Credential WPS: * Credential type=social local EAP: AS used the same Id again, but EAP packets were not identical $0H`l mem_only_psk auth_get_psk per_sta_psk multi_ap_backhaul_wpa_psk Incompatible P2PS feature capability CPT bitmask * htcaps_mask ip_addr_mask nl80211: Extended capabilities mask P2P-INVITATION-RECEIVED sa=%02x:%02x:%02x:%02x:%02x:%02x go_dev_addr=%02x:%02x:%02x:%02x:%02x:%02x unknown-network P2P-INVITATION-RECEIVED sa=%02x:%02x:%02x:%02x:%02x:%02x go_dev_addr=%02x:%02x:%02x:%02x:%02x:%02x bssid=%02x:%02x:%02x:%02x:%02x:%02x unknown-network P2P-INVITATION-ACCEPTED sa=%02x:%02x:%02x:%02x:%02x:%02x go_dev_addr=%02x:%02x:%02x:%02x:%02x:%02x bssid=%02x:%02x:%02x:%02x:%02x:%02x unknown-network Setup a new network P2P: Remove temporary group network WPS: Workaround - Allow missing mandatory Network Key attribute for open network Scan results matching the currently selected network PSK/passphrase not yet available for the selected network WPS: Could not add network WPS: Register timeout to clear WPS network RRM: Ignoring radio measurement request: Not RRM network RRM: Ignoring link measurement request. Not RRM network Freeing radio work '%s'@%p (started=%d) that is marked as p2p_scan_work Freeing radio work '%s'@%p (started=%d) that is marked as scan_work freed-ext-work nl80211: Failed to subscribe to handle Authentication frames - SAE offload may not work Update BSS pointer for the pending connect radio work fork uplink Uplink downlink Downlink P2P: Failed to allocate memory for magiclink nl80211: Could not set interface UP after rfkill unblock Line: %d - start of a new network block skip - ignore WPA/WPA2 AP for WEP network block Line: %d - start of a new cred block Authentication failure but no known SSID block EAPOL: disable timer tick EAPOL: enable timer tick DFS failed to schedule CSA (%d) - trying fallback Starting Listen timeout(%u,%u) on freq=%u based on callback Interface initialization will be completed in a callback disassoc_low_ack Ack EAP: Building expanded EAP-Nak EAP: Pending PIN/passphrase request - skip Nak ocsp_stapling_response_multi filter_rssi relative_rssi rssi_reject_assoc_rssi imsi uni proxyarp_wifi bidi lci up=%i nominal_msdu_size=%i min_phy_rate=%i mean_data_rate=%i tsid=%i sba=%i -preauth RSN: Cache PMK from preauth fast_reauth broadcast_deauth mgmt::deauth STA %02x:%02x:%02x:%02x:%02x:%02x did not acknowledge deauth STA %02x:%02x:%02x:%02x:%02x:%02x acknowledged deauth EAP-WSC: Unknown new_auth EAP-WSC: Missing new_auth nl80211: Do not indicate scan-start event due to internal scan_for_auth mgmt::auth nl80211: Ignore deauth event due to previous forced deauth-during-auth RSN: PMK from pre-auth RX pre-auth handle-auth nl80211: Ignore roam event (cmd=%d), device will use vendor event roam+auth auth Both Invalid ANQP Query Request length Invalid ANQP Query Response length WMM AC: Invalid WMM ie length P2P: Unexpected Query Data length P2P: Unexpected Response Data length EAP: Invalid EAP length Invalid EAP length EAP: Invalid expanded EAP length GAS: No room for GAS Response Length EAP-WSC: Invalid Message Length max_oper_chwidth VHT center channel %u for 80 or 80+80 MHz bandwidth VHT center channel %u for auto-selected 80 MHz bandwidth VHT center channel %u for 160 MHz bandwidth VHT center channel %u for auto-selected 160 MHz bandwidth WMM: Refuse TSPEC request for over 75%% of available bandwidth opensc_engine_path pkcs11_engine_path pkcs11_module_path ca_path wpa_bss_flush Request driver to clear scan cache due to local BSS flush %s: no DFS channels left, waiting for NOP to finish EAP-WSC: Invalid pkhash WPS: Expected public key hash WPS: Calculated public key hash Failed to allocate memory for salted %s hash Line %d: Invalid password hash Failed to allocate memory for EAP password hash P2P: * Service Hash nl80211: Connection quality monitor event: RSSI high %s: ie length mismatch, %u too much tdls_prohibit_chan_switch hostapd_dfs_start_channel_switch nl80211: TDLS channel switch skip - privacy mismatch skip RSN IE - key mgmt mismatch skip WPA IE - key mgmt mismatch skip RSN IE - group mgmt cipher mismatch skip RSN IE - PTK cipher mismatch skip WPA IE - PTK cipher mismatch skip RSN IE - GTK cipher mismatch skip WPA IE - GTK cipher mismatch skip RSN IE - proto mismatch skip WPA IE - proto mismatch WPS: Public Key hash mismatch skip - BSSID mismatch skip - SSID mismatch domain_suffix_match altsubject_match domain_match skip - rate sets do not match skip - no WPA/RSN proto match PNO: Too many SSIDs to match nl80211: Register frame match WPS: Skip PBC overlap due to selected Enrollee match Starting search ASP search ieee80211h debug WPA: RSN IE in 3/4 msg WPA: WPA IE in 3/4 msg logger_syslog RRM: Element length too long WPA: Request PTK rekeying received EAPOL-Key Request for GTK rekeying GUpdateStationKeys was already set when marking station for GTK rekeying strict rekeying - force GTK rekey since STA is leaving Driver is still in Listen state - wait for it to end before continuing coloc_intf_reporting P2P: Disable CLI Probe Request RX reporting P2P: Enable CLI Probe Request RX reporting options: -b = optional bridge interface name -B = run daemon in the background -c = Configuration file -C = ctrl_interface parameter (only used if -c is not) -d = increase debugging verbosity (-dd even more) -D = driver name (can be multiple drivers: nl80211,wext) -e = entropy file -f = log output to debug file instead of stdout -g = global ctrl_interface -G = global ctrl_interface group -h = show this help text -i = interface name -I = additional configuration file -K = include keys (passwords, etc.) in debug output -L = show license (BSD) -m = Configuration file for the P2P Device interface -N = start describing new interface -o = override driver parameter for new interfaces -O = override ctrl_interface parameter for new interfaces -p = driver parameters -P = PID file -q = decrease debugging verbosity (-qq even less) -t = include timestamp in debug messages -v = show version -W = wait for a control interface monitor before starting Failed to parse the configuration file '%s' - exiting Signal %d received - terminating P2P: Cannot force GO on any of the channels we are already using P2P: Try to prefer a frequency (%u MHz) we are already using nl80211: Survey data missing dpp_config_processing wps_cred_processing WPS: Registration completed - waiting for external credential processing Use shorter wait during WPS processing Signal %d received - reconfiguring WPS: Invalid PKCS#5 v2.0 pad string nl80211: Deauth received from Unknown BSSID %02x:%02x:%02x:%02x:%02x:%02x -- ignoring nl80211: Unknown ifindex (%d) for channel switch, ignoring P2P: Failed to setup MAC address filtering /sys/devices/virtual/net/%s/bridge/multicast_snooping P2P: Group setup without provisioning P2P: Do not use P2P group idle timeout during provisioning WPS: Scan only frequency %u MHz that was used during provisioning P2P: Setting up WPS for GO provisioning WPS: Ignore PBC activation based on Probe Request from the Enrollee that just completed PBC provisioning RSN: IBSS Supplicant for peer %02x:%02x:%02x:%02x:%02x:%02x already running P2P: Requested persistent group is already running p2p_scan is already running Failed to start p2p_scan - another p2p_scan was already running wpa_supplicant_assoc_try: Reached end of scan list - go back to beginning Already sched scanning WPS: Invalid message - %lu bytes remaining Failed to start Listen state for Extended Listen Timing Disabling Extended Listen Timing min_ul_bandwidth_roaming min_dl_bandwidth_roaming nl80211: Using driver-based roaming P2P: Interface %s in invitation found - cancelling P2P: Interface %s in group formation found - cancelling %s: Updating scan results from sibling Continuous association failures - consider temporary network disabling enabling auto_interworking go_interworking Already associated with the selected network - do nothing proactive_key_caching ft_eap_pmksa_caching disable_pmksa_caching WMM AC: can't add TS - ADDTS request is already pending P2P: Reject scan trigger since one is already pending P2P: Cannot schedule new p2p-send-action work since one is already pending P2P: GO indicated that the P2P Group session is ending Request range: Range request is already in process; overriding Request LCI: LCI request is already in process, overriding WPS: Workaround - skip unexpected message padding auth_alg Multiple BSSes specified in BSS-config P2P CSA: Failed to allocate default config P2P CSA: Failed to create new GO config RSN: Ignored PMKID candidate without preauth flag nl80211: Received a locally generated deauth event. Clear ignore_next_local_deauth flag IEEE 802.11g pmf EAPOL: txLogoff nl80211: SMPS mode - off conc_pref ap_table_max_size nominal_msdu_size wps_fragment_size wpa_driver_nl80211_if_remove P2P: GO move: policy CS is not allowed - setting timeout to re-consider GO move Reject SIGNAL_MONITOR command - bgscan is active Active type=progressive no_keep_alive wpa_driver_nl80211_event_receive l2_packet_receive nl80211: Retry IBSS join after forced leave Invalid conc_pref value DH: private value CTRL_IFACE: response value WPS: R-Hash2 derived from R-S2 does not match with the pre-committed value WPS: E-Hash2 derived from E-S2 does not match with the pre-committed value WPS: R-Hash1 derived from R-S1 does not match with the pre-committed value WPS: E-Hash1 derived from E-S1 does not match with the pre-committed value WPS: Invalid PKCS#5 v2.0 pad value DH: public value CTRL_IFACE: value WPS: Failed to decrypt Encrypted Settings attribute WPS: Failed to decrypted Encrypted Settings attribute WPS: Processing decrypted Encrypted Settings attribute nl80211: Failed to parse WMM rules attribute Omit Operating Channel attribute WPS: Received Credential attribute WPS: No Message Type attribute nl80211: Channel is missing WMM rule attribute WPS: No KWA in decrypted attribute WPS: KWA not in the end of the decrypted attribute P2P: Invalid P2P attribute remote No pending Invite Driver is still in Listen state; wait for it to complete P2P: Do not use P2P group idle timeout while waiting for initial 4-way handshake to complete %s: Wait for CAC to complete WPA: EAPOL processing complete nl80211: Set IF_OPER_UP again based on ifi_flags and expected operstate Line %d: invalid wps_state nl80211: Ignore ASSOC/AUTH flags since driver doesn't support full AP client state Flush all wpa_supplicant state p2p_scan running - delay start of listen state P2P: Failed to request the driver to remain on channel (%u MHz) for Listen state Reply to P2P Probe Request in Listen state P2P: Continuing long Listen state Start previously requested Listen state Ignore connection failure indication since interface has been put into disconnected state EAP: Method has pending processing - wait before proceeding to METHOD_REQUEST state EAP-WSC: Unexpected Op-Code %d in WAIT_START state nl80211: Local state (associated with %02x:%02x:%02x:%02x:%02x:%02x) does not match with BSS state nl80211: Local state (not associated) does not match with BSS state EAP-WSC: Unexpected Op-Code %d in WAIT_FRAG_ACK state Going to listen(only) state WPS: * Association State minimum_phy_rate beacon_rate mean_data_rate ap_isolate ap_sta_disassociate create hostapd_ht_operation_update Not in PTKINITDONE; skip Group Key update Continue interface setup after channel list update Accept this BSS entry since it looks more current than the previous update CTRL_IFACE: Could not find SSID id=%d to update WPS: Authentication failure update Failed to update config after anonymous_id update invalidate supp_deauthenticate ap_sta_deauthenticate wpa_driver_nl80211_deauthenticate WPS: Cancel operation - deauthenticate Station %02x:%02x:%02x:%02x:%02x:%02x not allowed to authenticate WMM: Too small Minimum PHY Rate WPS: Selected PIN locked - do not allow concurrent re-use Saving EAPOL frame from %02x:%02x:%02x:%02x:%02x:%02x for later use P2P: Forced GO freq %d MHz not in intersection but we are capable of MCC, figure out the best channel to use P2P: Peer was found to be running a GO but we are capable of MCC, figure out the best channel to use No forced channel from invitation processing - figure out best one to use P2P: Try to force us to use frequency (%u MHz) which is already in use Interface name %s already in use nl80211: hidden SSID not in use P2P: Cannot force GO on freq (%d MHz) as all the channels are in use STA did not include WPA/RSN IE in (Re)Association Request - possible WPS use P2P: All driver preferred frequencies are disallowed for P2P use P2P: did not find a freq for GO use ocsp_stapling_response send_probe_response shared key authentication - invalid challenge-response GO acknowledged Device Discoverability Request - wait for response Skip stop_listen since we are on correct channel for response did not acknowledge association response did not acknowledge authentication response Probe Resp generated elsewhere - do not generate additional response GAS: Unexpected comeback response from %02x:%02x:%02x:%02x:%02x:%02x dialog token %u when waiting for initial response SD response fits in initial response GAS: Unexpected initial response from %02x:%02x:%02x:%02x:%02x:%02x dialog token %u when waiting for comeback response GAS: Allow non-zero status for outstanding comeback response P2P: SD test - force long response Timeout on sending GO Negotiation Request without getting response GAS: No memory to store the response P2P: No group interface was waiting for presence response Drop previous SD response EAP: Ignored EAP-Response Ignore unexpected Device Discoverability Response Sending Provision Discovery Response Too short Query Response Failed to build WPS IE for GO Negotiation Response Mandatory Capability attribute missing from GO Negotiation Response Mandatory Configuration Timeout attribute missing from GO Negotiation Response Mandatory P2P Device Info attribute missing from GO Negotiation Response Mandatory P2P Group ID attribute missing from GO Negotiation Response Sending GO Negotiation Response Building GO Negotiation Response WPS: Building WPS IE for (Re)Association Response Invalid IE in GAS Initial Response Invalid IE in GAS Comeback Response P2P: RX GAS Comeback Response EAP-WSC: Generating Response No Status or NoA attribute in P2P Presence Response Failed to parse P2P Presence Response Received P2P Action - P2P Presence Response Failed to build WPS IE for Probe Response INITPMK - keyAvailable = false rsn_pairwise wpa_pairwise 4/4 Pairwise 2/4 Pairwise multi_ap_backhaul_wpa_passphrase Private key passphrase PSK or passphrase Deriving WPA PSK based on passphrase WPS: Generated random passphrase WPS: Reject credential with invalid WPA/WPA2-Personal passphrase Using pre-configured WPA PSK instead of passphrase WPS: Generated passphrase WPS: Workaround - remove NULL termination from ASCII passphrase rfkill_release Failed to allocate config file structure gtk_rekey_failure P2P: Stop provisioning state due to failure WPA: Mark STA %02x:%02x:%02x:%02x:%02x:%02x for discconnection due to fatal failure P2P: Reject group formation due to WPS provisioning failure EAP-WSC: WPS processing completed successfully - report EAP failure EAP-WSC: WPS processing completed successfully - wait for EAP failure nl80211: MLME event Michael MIC failure WPS: Indicate EAP completion on ACK for EAP-Failure IEEE 802.1X: Scheduled disconnection of %02x:%02x:%02x:%02x:%02x:%02x after EAP-Failure EAP: Received EAP-Failure Authentication Failure Allowing %sassociation after timed out SA Query procedure Secure Was not expecting GO Negotiation Confirm - ignore Was not expecting GO Negotiation Response - ignore RRM: Enable bit not supported, ignore No pending operation with the client discoverability peer anymore Peer not known anymore RSN: PMKSA candidate %02x:%02x:%02x:%02x:%02x:%02x does not need pre-authentication anymore Ignore TX callback event - GO Negotiation is not running anymore P2P: Remove group due to driver resource not being available anymore OLBC HT not detected anymore OLBC not detected anymore Line %d: DEPRECATED: 'debug' configuration variable is not used anymore Line %d: DEPRECATED: 'dump_file' configuration variable is not used anymore EAP-WSC: Received %lu bytes in first fragment, waiting for %lu bytes more EAP-WSC: Received %lu bytes, waiting for %lu bytes more before go_access_network_type go_venue_type sec_device_type Cannot determine phy type WPA: Failed to select authenticated key management type unknown IEEE 802.1X packet type invalid Multi-AP sub elem type EAP: Invalid frame type EAP: Invalid expanded frame type WPS: * Request Type WPS: Credential did not include Encryption Type WPS: Credential did not include Authentication Type WPS: * Primary Device Type WPS: * Secondary Device Type P2P: Ignore Probe Request due to mismatch with Requested Device Type WPS: * Requested Device Type Missing PHY Type Line %d: invalid time_zone none done %sNone WPA: No PSK configured for WPA-None WPA: Invalid group cipher %d for WPA-None WPA: Invalid mode %d (not IBSS/ad-hoc) for WPA-None WPS: Unexpected state (%d) for receiving WSC_Done WPS: Building Message WSC_Done WPS: Received WSC_Done RSN: removed the oldest PMKSA cache entry (for %02x:%02x:%02x:%02x:%02x:%02x) to make room for new one RSN: removed the oldest idle PMKSA cache entry (for %02x:%02x:%02x:%02x:%02x:%02x) to make room for new one p2p_scan already in progress - do not try to start a new one P2P: Remove oldest PSK entry for %02x:%02x:%02x:%02x:%02x:%02x (p2p=%u) to make room for a new one P2P: Pending virtual interface exists - skip creation of a new one BSS: %02x:%02x:%02x:%02x:%02x:%02x has multiple entries in the scan results - select the most current one P2PS PD adv mac does not match the local one Line %d: invalid %s value with newline AUTH: Initializing group state machine failed to allocate state machine Failed to initialize WPA state machine engine min_ul_bandwidth_home min_dl_bandwidth_home mlme gas_rand_addr_lifetime tls_session_lifetime Invalid WPA parameter value for dot11RSNAConfigPMKLifetime ap_table_expiration_time No WPS operation in progress at this time WPS: Both Label and Display config methods are not allowed at the same time nl80211: send_mlme -> send_frame WPA: Ignore too short EAPOL-Key frame EAPOL: Too short EAPOL-Key frame PTK not valid when sending EAPOL-Key frame EAPOL: Received EAPOL-Key frame RSN: EAPOL frame (type %u) discarded, not a Key frame WPA: EAPOL frame (type %u) discarded, not a Key frame Ignore deauth cb for test frame Ignore disassoc cb for test frame RRM: non-measurement report element in measurement report frame nl80211: Too short association event frame nl80211: MLME event frame nl80211: Too short management frame Ignore too short 20/40 BSS Coexistence Management frame EAPOL: Received EAP-Packet frame nl80211: received invalid radiotap frame %s: Drop RX of own frame WMM AC: WMM AC is disabled, ignoring action frame WMM AC: Unknown action (%d), ignoring action frame P2P: Freeing pending Action frame Off-channel: Failed to send the pending Action frame Off-channel: Already waiting for driver to get to frequency %u MHz; continue waiting to send the Action frame Failed to re-send Action frame Off-channel: Schedule remain-on-channel to send Action frame IEEE 802.11: Failed to send Action frame nl80211_send_null_frame: Failed to send poll frame WMM AC: no req with dialog=%u, ignoring frame WMM AC: frame destination addr=%02x:%02x:%02x:%02x:%02x:%02x is other than ours, ignoring frame WMM AC: ADDTS params do not match, ignoring frame Off-channel: Ignore Action TX status - mismatching contents with pending frame Failed to allocate buffer for SA Query Response frame Too short GAS Initial Response frame Too short GAS Comeback Response frame handle_action - unknown action category %d or invalid frame EAP-Identity: Invalid frame EAP-WSC: Invalid frame Michael MIC failure detected in received frame WPA: Increase initial EAPOL-Key 1/4 timeout by %u ms because of acknowledged frame Pending TX frame Failed to send DELTS frame EAP: Too short EAP frame BSSID not set when trying to send an EAPOL frame * FILS ERP EMSKname/username friendly_name Line %d: Too long model_name Line %d: Too long device_name WPS: Model Name WPS: * Model Name WPS: Device Name WPS: * Device Name PMK Name HT not enabled in network profile eap_user_file dump_file wpa_debug_open_file wpa_psk_file dh_file pac_file deny_mac_file accept_mac_file WPS: Could not open current configuration file WPS: Could not write updated configuration file Could not reopen debug log file P2P: GO - group %sidle p2p_group_idle preamble We have wps_method=%s -> incompatible AP: could not remove AP %02x:%02x:%02x:%02x:%02x:%02x from hash table AP: could not remove STA %02x:%02x:%02x:%02x:%02x:%02x from hash table CTRL_IFACE ROAM: Target AP not found from BSS table WPS: AP found from BSS table Removing the least recently used AP %02x:%02x:%02x:%02x:%02x:%02x from AP table usable disable Disable Cannot connect to P2P Device %02x:%02x:%02x:%02x:%02x:%02x that is in a group and is not discoverable Cannot use PD with P2P Device %02x:%02x:%02x:%02x:%02x:%02x that is in a group and is not discoverable Cannot invite a P2P Device %02x:%02x:%02x:%02x:%02x:%02x that is in a group and is not discoverable skip - MFP Required but network not MFP Capable Invalid configuration - cannot enable WPS: Current network is disabled - wait for user to enable Enable P2PS state unavailable P2P: No preferred frequency list available WPS: Own DH private key not available WPS: Peer DH public key not available EAPOL: EAP key not available EAP-WSC: WPS context not available nl80211: RFKILL status not available EAP: buildIdentity: identity configuration was not available EAP: buildIdentity: configuration was not available P2P: Bonjour protocol not available P2P: UPnP protocol not available P2P: ASP protocol not available P2P: Requested Bonjour service not available P2P: Requested UPnP service not available EAPOL: EAP Session-Id not available EAPOL: txSuppRsp - EAP response data not available No pending SD response fragment available ACS error - reported complete, but no result available nl80211: New scan results available nl80211: New sched scan results available P2P: No service discovery protocols available P2P: Enable cross connection from %s to %s whenever uplink is available No hostapd driver wrapper available nl80211: No country information available nl80211: No regulatory information available No valid channel available nl80211: Beacon event message available nl80211: Event message available WPS: No Device Password available EAP: No eapRespData available EAPOL: aaaEapResp set, but no aaaEapRespData available four_way_handshake RSN: received GTK in group key handshake WPA: Group Key Handshake started prior to completion of 4-way handshake RSN: Configure PMK for driver-based 4-way handshake Configure PMK for driver-based RSN 4-way handshake WPS: Failed to initialize Diffie-Hellman handshake RSN: received GTK in pairwise handshake sending 1/2 msg of Group Key Handshake received EAPOL-Key Request for new 4-Way Handshake sending 3/4 msg of 4-Way Handshake sending 1/4 msg of 4-Way Handshake invalid MIC in msg 2/4 of 4-Way Handshake supp_get_beacon_ie RSN: PMKID from assoc IE %sfound from PMKSA cache WPA: Use PMK from PMKSA cache RSN: PMK from PMKSA cache WPA: PMK from PMKSA cache RSN: found matching PMKID from PMKSA cache p2p_go_he he WPS: M8 Creds with different passphrase - do not merge WPS: M8 Creds with different passphrase/PSK type - do not merge WPS: M8 Creds with different PSK - do not merge challenge %s: Failed to parse freq range P2P: IP address requested in EAPOL-Key exchange P2P: Not initiating a GO frequency change ignore retransmitted EAPOL-Key %s - SNonce did not change no change nl80211: Regulatory domain change nl80211: Ignore interface down event generated by mode change WPS: Workaround - ignore PBC-to-PIN change WPS: Allow PIN Device Password ID change l2_packet_init_bridge wds_bridge vlan_bridge /sys/class/net/%s/brport/bridge eap_message EAP-WSC: No memory for message netlink: %d extra bytes in the end of netlink message P2P: No Dialog Token in the message P2P: Parsing the received message WPS: Unsupported state %d for building a message EAP: Method has completed pending processing - reprocess pending EAP message Discard received EAP message WPA: Ignore SMK message WPS: Workaround - merge likely WPA/WPA2-mixed mode creds in same M8 message milenage wpa_bss_flush_by_age track_sta_max_age bss_expiration_age hostapd_interface_deinit_free hostapd_interface_free WPS: New Enrollee WPS: Same Enrollee hw_mode hairpin_mode %s: Updating hw mode nl80211: Could not configure driver mode Failed to set 4addr mode nl80211: Failed to set interface into station mode Failed to start listen mode nl80211: Failed to set interface up after switching mode Disconnect event - ignore in IBSS/WPA-None mode Hardware does not support configured mode nl80211: Failed to set interface into IBSS mode AP: ignore received management frame in non-AP mode Driver does not support AP mode No SSID configured for AP mode Invalid pbss value(%d) for AP mode Ignore deauth event in AP mode Ignore disassoc event in AP mode Ignore scan results in AP mode nl80211: Failed to enable Probe Request frame reporting in AP mode WPS: Cancelling in AP mode nl80211: Skip disabling of Probe Request reporting nl_preq=%p while in AP mode nl80211: Supports Probe Response offload in AP mode Workaround: Allow EAPOL-Key with unexpected WPA type in RSN mode Ignore EAPOL-Key with unexpected type %d in RSN mode WPS: PBC overlap - do not start PBC mode WPS: PBC completed - stopping PBC mode WPS: PBC timed out - disable PBC mode Ignore EAPOL-Key with unexpected type %d in WPA mode WPS: No suitable encryption type for non-WPA/WPA2 mode Failed to request a scan in device, bringing up in HT20 mode Cannot enable IEEE 802.11d without setting the country_code Failed to set country code key_nonce WPS: Mismatch in registrar nonce WPS: Mismatch in enrollee nonce WPA: Failed to get random data for SNonce WPA: Renewed SNonce WPA: Assign new ANonce WPA: Failed to get random data for ANonce WPA: Assign ANonce WPA: Received Key Nonce WPS: Received Registrar Nonce WPS: Expected Registrar Nonce WPS: Registrar Nonce WPS: * Registrar Nonce WPS: Received Enrollee Nonce WPS: Expected Enrollee Nonce WPS: Enrollee Nonce WPS: * Enrollee Nonce Beacon Request: Request subelement appears more than once Configuration changes include interface/BSS modification - force full disable+enable sequence Received P2P Action - Notice of Absence P2P: * Notice of Absence Cannot use peer channel preference Select first pref_chan entry as operating channel preference Select best 5 GHz channel as operating channel preference Select best 2.4 GHz channel as operating channel preference Select best overall channel as operating channel preference Select pre-configured channel as operating channel preference Select random available channel %d from operating class %d as operating channel preference Select possible 5 GHz channel (op_class %u channel %u) as operating channel preference Select random available social channel (op_class %u channel %u) as operating channel preference Select possible VHT channel (op_class %u channel %u) as operating channel preference Select possible HT40 channel (op_class %u channel %u) as operating channel preference Override operating channel preference surplus_bandwidth_allowance WPS: Converting display to virtual_display for WPS 2.0 compliance WPS: Converting push_button to virtual_push_button for WPS 2.0 compliance P2P: Matching Bonjour service /sys/class/rfkill/rfkill%d/device Scheduled GO Discoverability Request for the target device Peer didn't provide a preferred frequency list, see if any of our preferred channels are supported by peer device rfkill: Cannot open RFKILL control device Do not report rejected device Failed to set socket filter for monitor interface; do filtering in user space no_ctrl_interface Failed to malloc ctrl_interface nfc_interface from the first interface %s: Finished CAC - bypass sync and start interface P2P: Failed to create new wpa_supplicant interface Ignore scan request (%d.%06d sec) on p2p_mgmt interface %s: Failed to allocate memory for interface Failed to initialize driver interface WPS: Clone UUID from another interface P2P: Failed to create new group interface P2P: No pending group interface P2P: Failed to initialize group interface P2P: Failed to add group interface nl80211: Use separate P2P group interface nl80211: Failed to set frequency on interface P2P: Failed to get magiclink interface Failed to initialize interface %s: Failed to allocate memory for the interface Removing P2P Device interface P2P: Failed to create P2P Device interface P2P: Failed to enable P2P Device interface P2P: Failed to add P2P Device interface nl80211: Update ifindex for a removed interface Failed to initialize AP interface BSS: No P2P IE - skipping BSS %02x:%02x:%02x:%02x:%02x:%02x update for P2P interface P2P: p2p_no_group_iface hostapd_cleanup_iface upnp_iface RX global ctrl_iface RX ctrl_iface hostapd_add_iface magiclink connect timeout, delete group iface p2p_cli_probe wps_cred_add_sae GMK rekeyd private_key_passwd private_key2_passwd uapsd client_apsd go_apsd force_long_sd WPS: AP PIN dev_password sae_password WPS: Registrar proved knowledge of the first half of the device password WPS: Enrollee proved knowledge of the first half of the device password WPS: Registrar proved knowledge of the second half of the device password WPS: Enrollee proved knowledge of the second half of the device password Failed to allocate memory for EAP password New Password WPS: Found a matching Device Password WPS: Device Password per_sta_vif missing wildcard DFS: No current_mode information - assume no need to perform DFS operations by hostapd %s: Failed to allocate memory for hostapd good bignum_exptmod bignum_mulmod wep_rekey_period bg_scan_period dtim_period eap_reauth_period Line %d: invalid chan_util_avg_period bss_load_update_period Cannot set beacons during CSA period EAPOL::startPeriod quietPeriod EAPOL::authPeriod reAuthPeriod EAPOL::heldPeriod P2P: Unknown config method accept proposed method refuse proposed method EAP: Could not find suitable EAP method eapol_key_index_workaround eap_workaround STA used Secure bit in WPA msg 2/4 - set Secure for 3/4 as workaround P2P-FALLBACK-TO-GO-NEG reason=GO-not-found RSN: No PMKSA cache entry found IEEE 802.11: No matching STA with pending SA Query request found P2P: Could not figure out whether group is persistent - BSS %02x:%02x:%02x:%02x:%02x:%02x not found handle_action_cb: STA %02x:%02x:%02x:%02x:%02x:%02x not found handle_deauth_cb: STA %02x:%02x:%02x:%02x:%02x:%02x not found handle_auth_cb: STA %02x:%02x:%02x:%02x:%02x:%02x not found handle_disassoc_cb: STA %02x:%02x:%02x:%02x:%02x:%02x not found handle_assoc_cb: STA %02x:%02x:%02x:%02x:%02x:%02x not found P2P: Temporary group network not found nl80211: 'nl80211' generic netlink not found P2P: ASP service not found P2P: P2P group interface not found P2P: Interface '%s' not found No common channels found Overlapping 20 MHz BSS is found MB IE of %u bytes found IEEE 802.11: No matching SA Query transaction identifier found P2P: No ongoing group formation found No suitable network found No Service Hash match found WPS: No match for OOB Device Password ID, but PIN found RSN: no matching PMKID found WPS: %u active PBC session(s) found P2P: Do not consider the scan results after stop_find Clear pending_listen_freq for p2p_find Stopping find supp_ether_send p2p_scan running - delay connect send CTRL_IFACE monitor send ext_password_backend EXT PW: Failed to initialize backend ip_addr_end local end P2P: Missing peer address in invitation command nl80211: Driver does not support channel switch command Use specific SSIDs from SCAN command setband P2P: Enable operating classes for lower 5 GHz band P2P: Enable operating classes for higher 5 GHz band Disable HT capability [DSSS_CCK-40] on 5 GHz band P2P: Request to start GO on 5 GHz band P2P: Enable operating classes for 2.4 GHz band P2P: Request to start GO on 2.4 GHz band P2P: Use freq %d MHz common with the peer and maintaining same band P2P: Use freq %d MHz common with the peer, allowing HT40, and maintaining same band nl80211: send_frame -> send_frame_cmd rts_threshold fragm_threshold sae_anti_clogging_threshold Invalid WPA parameter value for dot11RSNAConfigPMKReauthThreshold WPA: Cannot stop group state machine for VLAN ID %d as references are still hold skip_cred_build mesh mode support not included in the build P2P: No room for full DNS offset field 20 MHz BSS width request bit is set in BSS coexistence information field 40 MHz intolerant bit is set in BSS coexistence information field EAP: Too short EAP-Request - no Type field EAP: Too short EAP-Response - no Type field P2P: Auto join started at %ld.%06ld P2P: Auto PD started at %ld.%06ld keyid auto_uuid tsid hessid disallow_aps_bssid WMM AC: ignore frame with sa %02x:%02x:%02x:%02x:%02x:%02x different other than our bssid fail to parser bssid EAP-WSC: Invalid new_ssid ignore_broadcast_ssid scan_ssid multi_ap_backhaul_ssid excluded_ssid utf8_ssid vlanid DFS-invalid Updated configuration is invalid RSN: Authenticator accepted opportunistic PMKSA entry - marking it valid key_id wps_nfc_dev_pw_id P2PS PD Response missing adv_id ca_cert_id server_id P2PS PD Response missing group_id P2PS PD Response missing session_id engine_id sae_password_id key2_id ca_cert2_id engine2_id No NoA being advertized ForceUnauthorized ForceAuthorized WMM AC: Already initialized EAP-WSC: WPS Registrar not initialized EAP: method not initialized P2P: Forced GO freq %d MHz disallowed P2P: preferred_freq_list[%d]=%d is disallowed Selected BSS is disallowed Disconnect and try to find another network because current AP was marked disallowed skip - BSSID disallowed skip - SSID disallowed skip - frequency not allowed EAP: vendor %u method %u not allowed skip - non-OSEN network not allowed skip - non-WPA network not allowed HT40 secondary channel %d not allowed HT40 channel pair (%d, %d) not allowed Line %d: no authentication algorithms allowed P2P: No 2.4, 5, or 60 GHz channel allowed Configured interface was removed P2P: Canceled group formation due to P2P group network getting removed P2P: Disable P2P since removing the management interface is being removed EAP: Server state machine removed nl80211: Ignore interface up event since interface %s is marked removed RTM_DELLINK: Interface '%s' removed Reply to pending SA Query received WPS: No Public Key received EAP: Callback for pending request received Scan-only results received p2p_scan was not running, but scan results received WPS: No MAC Address received WPS: Do not start EAPOL until EAPOL-Start is received WPS: No Encrypted Settings received WPS: No Encryption Type flags received WPS: No Connection Type flags received WPS: No Authentication Type flags received WPS: No Credential attributes received EAPOL: all required EAPOL-Key frames received WPS: No Config Methods received WPS: No RF Bands received WPS: No Configuration Error received WPS: No Manufacturer received WPS: No Model Number received WPS: No Serial Number received WPS: No OS Version received No Channel List attribute received No GO Intent attribute received No Status attribute received No Intended P2P Interface Address attribute received No P2P Device Info attribute received No Listen Channel attribute received No Operating Channel attribute received WPS: No valid Credential attribute received WPS: No Wi-Fi Protected Setup State received WPS: No Association State received WPS: No Primary Device Type received EAPOL: Too short EAPOL-Key frame received WPS: No Model Name received WPS: No Device Name received WPS: No Registrar Nonce received WPS: Invalid Registrar Nonce received WPS: No Enrollee Nonce received WPS: Invalid Enrollee Nonce received nl80211: Unknown radar event %d received No survey data received WPS: Probe Request with WPS data received WPS: No UUID-R received WPS: No UUID-E received WPS: No Device Password ID received WPS: No R-Hash2 received WPS: No E-Hash2 received WPS: No R-SNonce2 received WPS: No E-SNonce2 received WPS: No R-Hash1 received WPS: No E-Hash1 received WPS: No R-SNonce1 received WPS: No E-SNonce1 received Invalid GO Intent value (%u) received Event %s (%d) received skip - BSSID blacklisted nl80211: Passive scan requested reporting information=%u is not supported RRM action %u is not supported Measurement report type %u is not supported WEP configuration in a WPA network is not supported P2P CSA: CSA to a different band is not supported CSA is not supported RRM: Measurement report failed. TX power insertion not supported P2P: Listen offload not supported DFS chan_width %d not supported nl80211: TDLS supported Assume Invitation Response was actually received by the peer even though Ack was not reported Assume GO Negotiation Confirm TX was actually received by the peer even though Ack was not reported 20_40_INTOLERANT channel %d reported nl80211: Scan aborted WPA: Failed to get master session key from EAPOL state machines - key handshake aborted P2P Listen offload is already started %s: Interface %s was already started %s: Interface %s wasn't started TKIP countermeasures started CTRL-EVENT-EAP-STARTED EAP authentication started nl80211: Sched scan started WPS: Button pushed - PBC mode started P2P Presence Request was accepted TKIP Only Prohibited WEP Prohibited Reconfiguration completed Extended Listen Timing - Listen State completed Client discoverability remain-awake completed WPS: PBC session overlap detected Michael MIC failure detected P2P: Last non-P2P device disconnected Beacon request: %02x:%02x:%02x:%02x:%02x:%02x is not connected Request range: Destination address is not connected Request LCI: Destination address is not connected P2P: First non-P2P device connected WPS: Internal Registrar not selected EAP::METHOD - method not selected CTRL-EVENT-EAP-METHOD EAP vendor %u method %u (%s) selected WMM AC: ADDTS request was rejected TKIP countermeasures initiated disassociated Ignore TX status for Data frame to STA %02x:%02x:%02x:%02x:%02x:%02x that is not currently associated Station %02x:%02x:%02x:%02x:%02x:%02x trying to disassociate, but it is not associated nl80211: Skip set_supp_port(unauthorized) while not associated RRM: Ignoring radio measurement request: Not associated RRM: Ignoring link measurement request. Not associated nl80211: Scan results indicate BSS status with %02x:%02x:%02x:%02x:%02x:%02x as associated EAP: Server state machine created nl80211: New P2P Device interface %s (0x%llx) created WPA/RSN IEs not updated WPS: AP configuration updated P2P: PD Request event truncated P2PS feature_cap bytes truncated nl80211: WDS interface name was truncated Long line in configuration file truncated deauthenticated RSN: IBSS EAPOL for Authenticator dropped as %02x:%02x:%02x:%02x:%02x:%02x is not authenticated Station %02x:%02x:%02x:%02x:%02x:%02x trying to deauthenticate, but it is not authenticated DUP: %s cannot be duplicated Scan only the current operating channels since all channels are already used IEEE 802.1X: Ignore EAPOL message - 802.1X not enabled and WPS not used DEPRECATED: '%s' not used STA included WPS IE in (Re)Association Request - assume WPS is used WPA: Interoperability workaround: allow incorrect (should have been HMAC-SHA1), but stronger (is AES-128-CMAC), descriptor version to be used WPS: Checking whether fast association without a new scan can be used P2P: Frequency %d MHz in use by another virtual interface and can be used Do not allow key_data field to be exposed not configured Ignored received EAPOL frame since no key management is configured WPA: Delay group state machine start until Beacon frames have been configured P2P: No matching persistent group stored Line %d: Obsolete peerkey parameter ignored NOTE: Obsolete peerkey parameter ignored Line %d: Invalid WEP key length %u - this network block will be ignored Unrecognized global ctrl_iface command ignored Probe Request from %02x:%02x:%02x:%02x:%02x:%02x for broadcast SSID ignored MLME-MICHAELMICFAILURE.indication for not associated STA (%02x:%02x:%02x:%02x:%02x:%02x) ignored spectrum_mgmt_required EAPOL: IEEE 802.1X for plaintext connection; no EAPOL-Key frames required Previously selected random MAC address has not yet expired WPS: PBC walk time has expired extra_cred CTRL_IFACE: Could not find cred P2P: forced freq (%d MHz) is also shared WPA: TKIP countermeasures stopped Schedule PNO after previous sched scan has stopped nl80211: Sched scan stopped Interface %s is unavailable -- stopped RSN pre-auth frame received from unexpected source %02x:%02x:%02x:%02x:%02x:%02x - dropped WPA: EAPOL-Key with Request bit - dropped WPA: EAPOL-Key (Group) without Mic/Encr bit - dropped received EAPOL-Key msg 4/4 in invalid state (%d) - dropped received EAPOL-Key msg 2/4 in invalid state (%d) - dropped received EAPOL-Key msg 2/2 in invalid state (%d) - dropped WPS: WEP credential skipped nl80211: IBSS %02x:%02x:%02x:%02x:%02x:%02x joined Do not start work '%s' when another work '%s' is already scheduled P2P-FALLBACK-TO-GO-NEG reason=PD-failed nl80211: Authentication retry failed Client discoverability request failed Scan request failed EAP-WSC: wps_init failed DH: crypto_dh_init failed DH: crypto_dh_derive_secret failed Connect failed alloc wpa_s->manual_scan_freqs failed hw_magiclink_add_new_scan_res failed Removing interface %s failed Adding interface %s failed BIGNUM: %s failed Association request to the driver failed RSN: PTK removal from the driver failed WPA: GMK/GTK setup failed nl80211: Setting QoS Map failed Conncap resolution failed P2PS PD channel selection failed RRM: Link measurement report failed. Send action failed RSN: PMKSA cache initialization failed Interface initialization failed BSS Load initialization failed WPS: Full PIN information revealed and negotiation failed Wait for GO Negotiation Confirm timed out - assume GO Negotiation failed CTRL_IFACE interface creation failed MAC list reallocation failed RRM: Memory allocation failed EAP user allocation failed RRM: Link measurement report failed. Buffer allocation failed IEEE 802.1X state machine allocation failed WPA PSK allocation failed Line %d: allocation failed CTRL-EVENT-EAP-FAILURE EAP authentication failed set_wowlan failed nl80211: Setting wowlan failed P2P: Abort ongoing scan failed hw_magiclink_connect_parse_param failed hw_magiclink_add_network failed Configuration check failed EAP-WSC: WPS processing failed P2P: Preferred channel list update failed P2P: No GO channel list update failed skip RSN IE - parse failed skip WPA IE - parse failed RRM: Radio measurement report failed: Sending Action frame failed Scan request schedule failed Disabling of interface failed Enabling of interface failed Reloading of interface failed send_auth_reply: send failed ieee80211_mgmt_sa_query_request: send failed ieee802_11_send_sa_query_req: send failed handle_probe_req: send failed wmm_send_action: send failed nl80211: Interface mode change to %d from %d failed malloc failed WPA: RC4 failed SUPP: wpa_sm_set_assoc_wpa_ie_default() failed SUPP: wpa_sm_init() failed AUTH: wpa_auth_sta_init() failed AUTH: wpa_init() failed ieee802_11_set_radius_info() failed AUTH: wpa_validate_wpa_ie() failed ap_sta_add() failed Failed canceled start_disabled wps_disabled p2p_disabled radio_disabled Client discoverability disabled Interface %s already disabled Managed P2P Device operations disabled Selected network is disabled Ignore event %s (%d) while interface is disabled Reject P2P_LISTEN since interface is disabled Reject P2P_FIND since interface is disabled GAS: Drop unexpected protected GAS frame when PMF is disabled WMM AC: WMM AC is disabled WMM AC: Failed to delete TS, WMM AC is disabled Interface was disabled Interface %s disabled Postpone network selection by %d seconds since all networks are disabled Skip scan - interface disabled WPS: ignore_broadcast_ssid configuration forced WPS to be disabled WPS: WEP configuration forced WPS to be disabled WPS: WPA/TKIP configuration without WPA2/CCMP/GCMP forced WPS to be disabled Line %d: tries to enable ACS but CONFIG_ACS disabled P2P: Ignore group idle timeout - disabled skip - disabled Disabled uapsd_advertisement_enabled wmm_enabled wme_enabled Try to associate due to network getting re-enabled Client discoverability enabled Interface %s already enabled Ignore 20/40 BSS Coexistence Management frame since 40 MHz capability is not enabled Can't start DFS CAC, DFS functionality is not enabled CTRL: SET_NEIGHBOR: Neighbor report is not enabled CSA is not enabled No drivers enabled Managed P2P Device operations enabled DFS support is enabled Scan only the current operating channels since scan_cur_freq is enabled WPS: Reject request to start Registrar(as station) operation while AP mode is enabled GAS: Drop unexpected unprotected GAS frame when PMF is enabled WMM AC: Valid WMM association, WMM AC is enabled Interface was enabled Cannot enable IEEE 802.11h without IEEE 802.11d enabled KeyTransmissionEnabled reAuthEnabled rfkill: WLAN unblocked nl80211: RFKILL unblocked rfkill: WLAN soft blocked rfkill: WLAN hard blocked nl80211: RFKILL blocked ap_setup_locked WPS: * AP Setup Locked EAPOL: EAPOL-Key key signature verified CTRL: MAC_RAND_SCAN enable=<0/1> not specified CTRL: MAC_RAND_SCAN no type specified All ASP advertisements flushed sched CTRL_IFACE monitor attached CTRL_IFACE monitor detached PTKSTART: Retry limit %u reached PTKINITNEGOTIATING: Retry limit %u reached nl80211: Max client reached Invitation Request retry limit reached WPS: Selected registrar information changed EAP-WSC: Fragment acknowledged managed Stop ongoing sched_scan to allow requested full scan to proceed WPS: No Authenticator attribute included WPS: Invalid Probe Request WPS IE: No UUID-E included RSN: EAPOL-Key type (%d) unknown, discarded WPA: EAPOL-Key type (%d) unknown, discarded TKIP countermeasures ended expanded chanswitch: invalid cs_count provided nl80211: Too many CSA counters provided nl80211: No CSA counters provided chanswitch: invalid freq provided eap parameter needed EAPOL: EAP parameter needed Unhandled EAP param %d needed Client discoverability request succeeded Failed to initialize the driver after interface was added Configured interface was added WPS: AP %02x:%02x:%02x:%02x:%02x:%02x type %d added P2P: Cannot start P2P listen, it is offloaded P2P: %s: The forced channel for GO (%u MHz) requires DFS and DFS is offloaded P2P: %s: The forced channel for GO (%u MHz) is DFS, and DFS is offloaded replaced ACKed bignum_add ap_sta_add after go/cli filter/add key-add Add Peer %02x:%02x:%02x:%02x:%02x:%02x requested us to write its PIN using keypad Peer %02x:%02x:%02x:%02x:%02x:%02x accepted to write our PIN using keypad Peer entered PIN on Keypad broad key_mgmt_offload hostapd_handle_dfs_offload disable_scan_offload nl80211: Driver does not support rekey offload nl80211: Set rekey offload RSN: Cannot set PMK for key management offload P2P: Failed to start P2P listen offload P2P: Failed to stop P2P listen offload WPS: Reschedule immediate configuration reload Failed to initialize interface on config reload Failed to enable interface on config reload max_bss_load had nl80211: Beacon head bad Skip authentication for DMG/IEEE 802.11ad EAP: Session-Id Ignore scan data without P2P Device Info or P2P Device Id %08d ieee80211d wep_key%d %s%d %s.sta%d IEEE 802.11 element parse failed @%d nl80211: ap_max_inactivity=%d nl80211: privacy=%d nl80211: Remove interface ifindex=%d nl80211: New interface %s created: ifindex=%d nl80211: ifindex=%d nl80211: P2P GO ctwindow=%d P2P-DEVICE-FOUND %02x:%02x:%02x:%02x:%02x:%02x p2p_dev_addr=%02x:%02x:%02x:%02x:%02x:%02x pri_dev_type=%s name='%s' config_methods=0x%x dev_capab=0x%x group_capab=0x%x%s%s%s new=%d Set discoverable interval: min=%d max=%d max_tu=%d %s: %s: %02x:%02x:%02x:%02x:%02x:%02x flags=0x%x timeout_next=%d WPS: AP[%d] %02x:%02x:%02x:%02x:%02x:%02x type=%d tries=%d last_attempt=%d sec ago blacklist=%d nl80211: Re-use existing monitor interface: refcount=%d nl80211: Remove monitor interface: refcount=%d * freq_hint=%d nl80211: beacon_int=%d * beacon_int=%d P2P-INVITATION-RECEIVED sa=%02x:%02x:%02x:%02x:%02x:%02x persistent=%d P2P-INVITATION-ACCEPTED sa=%02x:%02x:%02x:%02x:%02x:%02x persistent=%d is_ht40_allowed=%d num_sta_ht40_intolerant=%d GO Negotiation Confirm TX callback: result=%d * sec_channel_offset=%d Failed to check if DFS is required; ret=%d WMM AC: Add TS: addr=%02x:%02x:%02x:%02x:%02x:%02x TSID=%u admitted time=%u, ret=%d P2P-PROV-DISC-FAILURE p2p_dev_addr=%02x:%02x:%02x:%02x:%02x:%02x status=%d P2P-GO-NEG-FAILURE status=%d auth_shared_key() failed: status=%d EAPOL: External notification - EAP success=%d Service Discovery Query TX callback: success=%d Device Discoverability Request TX callback: success=%d GO Discoverability Request TX callback: success=%d Provision Discovery Request TX callback: success=%d Invitation Request TX callback: success=%d GO Negotiation Request TX callback: success=%d Device Discoverability Response TX callback: success=%d Provision Discovery Response TX callback: success=%d Invitation Response TX callback: success=%d GO Negotiation Response TX callback: success=%d GO Negotiation Response (failure) TX callback: success=%d wpa_group_setkeys: GKeyDoneStations=%d nl80211: Signal monitor threshold=%d hysteresis=%d AP-CSA-FINISHED freq=%d dfs=%d %sfreq=%d ht_enabled=%d ch_offset=%d ch_width=%s cf1=%d cf2=%d dfs=%d nl80211: deinit ifname=%s disabled_11b_rates=%d nl80211: TX queue param set: queue=%d aifs=%d cw_min=%d cw_max=%d burst_time=%d --> res=%d %s new operation mode=0x%X changes=%d %s=%d nl80211: vendor command failed err=%d nl80211: Setup AP(%s) - device_ap_sme=%d use_monitor=%d nl80211: Teardown AP(%s) - device_ap_sme=%d use_monitor=%d * initiator=%d WPS-FAIL msg=%d config_error=%d WPS-M2D dev_password_id=%d config_error=%d P2P: Remove operating group PSK entry for %02x:%02x:%02x:%02x:%02x:%02x iface_addr=%d Off-channel: Action frame sequence done notification: pending_action_tx=%p drv_offchan_tx=%d action_tx_wait_time=%d off_channel_freq=%d roc_waiting_drv_freq=%d nl80211: Use last_mgmt_freq=%d Created device entry based on GO Neg Req: %02x:%02x:%02x:%02x:%02x:%02x dev_capab=0x%x group_capab=0x%x name='%s' listen_freq=%d Created device entry based on Probe Req: %02x:%02x:%02x:%02x:%02x:%02x dev_capab=0x%x group_capab=0x%x name='%s' listen_freq=%d nl80211: Use bss->freq=%d Found overlapping legacy BSS: %02x:%02x:%02x:%02x:%02x:%02x freq=%d Found overlapping 20 MHz HT BSS: %02x:%02x:%02x:%02x:%02x:%02x freq=%d GAS-QUERY-START addr=%02x:%02x:%02x:%02x:%02x:%02x dialog_token=%u freq=%d P2P-INVITATION-RECEIVED sa=%02x:%02x:%02x:%02x:%02x:%02x persistent=%d freq=%d P2P-INVITATION-ACCEPTED sa=%02x:%02x:%02x:%02x:%02x:%02x persistent=%d freq=%d Neighboring BSS: freq=%d * freq=%d ctrl_interface_group=%d nl80211: add_ts request: tsid=%u admitted_time=%u up=%d peer_go=%d Prepare channel - force_freq=%u pref_freq=%u go=%d Prepare channel pref - force_freq=%u pref_freq=%u go=%d P2P: best_freq=%d, go=%d RSN: PMKSA cache entry free_cb: %02x:%02x:%02x:%02x:%02x:%02x reason=%d P2P-LISTEN-OFFLOAD-STOPPED P2P-LISTEN-OFFLOAD-STOP-REASON reason=%d hostapd_public_action - action=%d P2P: Set NoA parameters: count=%u start=%d duration=%d CTRL_IFACE: P2P_SET GO NoA: count=%d start=%d duration=%d eapol_version=%d P2P: Auto PD with %02x:%02x:%02x:%02x:%02x:%02x join=%d Off-channel: Send action frame: freq=%d dst=%02x:%02x:%02x:%02x:%02x:%02x src=%02x:%02x:%02x:%02x:%02x:%02x bssid=%02x:%02x:%02x:%02x:%02x:%02x len=%d %s: src=%02x:%02x:%02x:%02x:%02x:%02x len=%d RRM: Neighbor report request (for %s), token=%d DFS-NEW-CHANNEL freq=%d chan=%d sec_chan=%d EAPOL: External notification - EAP fail=%d ACS-COMPLETED freq=%d channel=%d RX-PROBE-REQUEST sa=%02x:%02x:%02x:%02x:%02x:%02x signal=%d P2P: Add persistent group PSK entry for %02x:%02x:%02x:%02x:%02x:%02x psk=%d nl80211: CMD_FRAME freq=%u wait=%u no_cck=%d no_ack=%d offchanok=%d mgmt::proberesp cb ok=%d mgmt::action cb ok=%d WPA: EAPOL-Key TX status for STA %02x:%02x:%02x:%02x:%02x:%02x ack=%d BEACON-REQ-TX-STATUS %02x:%02x:%02x:%02x:%02x:%02x %u ack=%d IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x TX status - version=%d type=%d length=%d - ack=%d RSN: PMKID candidate event - bssid=%02x:%02x:%02x:%02x:%02x:%02x index=%d preauth=%d EAP: code=%d identifier=%d length=%d IEEE 802.1X: version=%d type=%d length=%d max_oper_chwidth=%d * bandwidth=%d * channel_width=%d nl80211: %s(type=%d ifname=%s) ifindex=%d added_if=%d CTRL-EVENT-SIGNAL-CHANGE above=%d signal=%d noise=%d txrate=%d EVENT_TX_STATUS dst=%02x:%02x:%02x:%02x:%02x:%02x type=%d stype=%d * channel_type=%d nl80211: rate_type=%d EAPOL-Key type=%d * type=%d TSPEC-ADDED tsid=%d addr=%02x:%02x:%02x:%02x:%02x:%02x admitted_time=%d nl80211: send_mlme - da= %02x:%02x:%02x:%02x:%02x:%02x noack=%d freq=%u no_cck=%d offchanok=%d wait_time=%u fc=0x%x (%s) nlmode=%d disassocation: STA=%02x:%02x:%02x:%02x:%02x:%02x reason_code=%d deauthentication: STA=%02x:%02x:%02x:%02x:%02x:%02x reason_code=%d nl80211: dtim_period=%d * dtim_period=%d * bg scan period=%d EAP: RECEIVED->DISCARD: rxResp=%d respId=%d currentId=%d respMethod=%d currentMethod=%d WMM AC: Del TS ac=%d tsid=%d EAPOL: External notification - portValid=%d CTRL_IFACE: field=%s id=%d P2P: Remove empty persistent group id=%d P2P: Remove stale persistent group id=%d CTRL_IFACE: Not able to remove the network id=%d CTRL_IFACE: Could not find network id=%d Try to find BSS matching pre-selected network id=%d CTRL_IFACE: Could not find cred id=%d EAP: Received EAP-Response for LEAP method=%d id=%d P2P-PERSISTENT-PSK-FAIL id=%d CTRL_IFACE: SELECT_NETWORK id=%d CTRL_IFACE: REMOVE_NETWORK id=%d CTRL_IFACE: DISABLE_NETWORK id=%d CTRL_IFACE: ENABLE_NETWORK id=%d CTRL_IFACE: REMOVE_CRED id=%d EAP: getId: id=%d CTRL-EVENT-FREQ-CONFLICT id=%d nl80211: Set STA flags - ifname=%s addr=%02x:%02x:%02x:%02x:%02x:%02x total_flags=0x%x flags_or=0x%x flags_and=0x%x authorized=%d P2P: Setup freqs: freq=%d num_MCC=%d shared_freqs=%u num_unused=%d * vht_enabled=%d * ht_enabled=%d * he_enabled=%d EAPOL: External notification - portEnabled=%d EAP: EAP-Success Id mismatch - reqId=%d lastId=%d Neighboring BSS: %02x:%02x:%02x:%02x:%02x:%02x freq=%d pri=%d sec=%d P2P: Using preferred_freq_list[%d]=%d %s: freq[0]=%d, freq[1]=%d WMM: TS Info: UP=%d PSB=%d Direction=%d TID=%d * center_freq2=%d %sfreq=%d ht_enabled=%d ch_offset=%d ch_width=%s cf1=%d cf2=%d DFS-CAC-COMPLETED success=%d freq=%d ht_enabled=%d chan_offset=%d chan_width=%d cf1=%d cf2=%d DFS-RADAR-DETECTED freq=%d ht_enabled=%d chan_offset=%d chan_width=%d cf1=%d cf2=%d DFS-PRE-CAC-EXPIRED freq=%d ht_enabled=%d chan_offset=%d chan_width=%d cf1=%d cf2=%d DFS-NOP-FINISHED freq=%d ht_enabled=%d chan_offset=%d chan_width=%d cf1=%d cf2=%d driver %s channel switch: freq=%d, ht=%d, vht_ch=0x%x, offset=%d, width=%d (%s), cf1=%d, cf2=%d * center_freq1=%d nl80211: Supported cipher %02x-%02x-%02x:%d Conncap: local:%d remote:%d result:%d CTRL_IFACE changed monitor level %s:%d CTRL_IFACE monitor send %s:%d CTRL_IFACE monitor attached %s:%d CTRL_IFACE monitor detached %s:%d udp:%d P2P: Conncap - in:%d role:%d P2P: sup:%p ssid:%p disabled:%d p2p:%d mode:%d P2P: Own listen channel: %d:%d P2P: Random operating channel: %d:%d P2P: Configured operating channel: %d:%d Line %d: Invalid max_num_sta=%d; allowed range 0..%d p2p-%s-%d p2p-%d Invalid supported rates element length %d+%d Selected ch. #%d GO Negotiation Confirm retry %d Invalid wep_default_key index %d IEEE 802.1X: New default WEP key index %d WPS: Network Key Index %d PMKSA-CACHE-REMOVED %02x:%02x:%02x:%02x:%02x:%02x %d STA-OPMODE-N_SS-CHANGED %02x:%02x:%02x:%02x:%02x:%02x %d PMKSA-CACHE-ADDED %02x:%02x:%02x:%02x:%02x:%02x %d IBSS: VHT setup freq cf1 %d, cf2 %d, bw %d Starting sched scan after %u seconds: interval %u timeout %d No message for request %d association SA Query attempt %d P2P: Join scan attempt %d disallow_aps_ssid_count %d Unknown event %d IBSS/mesh: setup freq channel %d, sec_channel_offset %d GO Negotiation rejected: status %d Line %d: unknown wpa_psk_radius %d Beacon request: invalid operating class %d %s STA %02x:%02x:%02x:%02x:%02x:%02x - no greenfield, num of non-gf stations %d %s STA %02x:%02x:%02x:%02x:%02x:%02x - no HT, num of non-HT stations %d Own reg_classes %d peer reg_classes %d intersection reg_classes %d %s STA %02x:%02x:%02x:%02x:%02x:%02x - 20 MHz HT, num of 20MHz HT STAs %d WPS: Registrar terminated negotiation with Configuration Error %d WPS: Enrollee terminated negotiation with Configuration Error %d WPS: Enrollee Configuration Error %d EAP: building EAP-Request: Identifier %d EAP: building EAP-Initiate-Re-auth-Start: Identifier %d Unsupported management group cipher %d WPA: Selected mgmt group cipher %d WPA: Unsupported pairwise cipher %d WPA: Unsupported Group Cipher %d P2P: * Listen Channel: Country %c%c(0x%02x) Regulatory Class %d Channel Number %d P2P: * Operating Channel: Country %c%c(0x%02x) Regulatory Class %d Channel Number %d Selecting BSS from priority group %d Priority group %d WPA: Selected cipher suites: group %d pairwise %d key_mgmt %d proto %d BSSID %02x:%02x:%02x:%02x:%02x:%02x blacklist count incremented to %d RSN: added PMKSA cache candidate %02x:%02x:%02x:%02x:%02x:%02x prio %d %s: WPA authenticator requests disconnect: STA %02x:%02x:%02x:%02x:%02x:%02x reason %d action response - reason %d IEEE 802.11: Unexpected SA Query Action %d WPA: Unsupported EAPOL-Key descriptor version %d EAPOL: Setting dynamic WEP key: %s keyidx %d len %d Measurement request type %d token %d nl80211: Unsupported encryption algorithm %d nl80211: Unexpected encryption algorithm %d DFS will switch to a new channel %d No VHT higher bandwidth support for the selected channel %d Own default op_class %d channel %d Use peer preference op_class %d channel %d Re-selection result: op_class %d channel %d Line %d: unknown macaddr_acl %d Invalid scan interval %d Remove duplicate network %d P2P: Invalid P2P Group ID attribute length %d P2P: Invalid Device Name length %d Line %d: invalid excluded_ssid length %d EAPOL: Too long key data length %d WPS: Invalid PIN length %d EAP-WSC: Received packet: Op-Code %d Flags 0x%x Message Length %d nl80211: Failed to write Linux system file: %s with the value of %d Invalid cwMax value %d Invalid txop value %d Invalid cwMin value %d Invalid acm value %d Invalid AIFS value %d nl80211: Invalid AC value %d Connection authorized by device, previous state %d WPS: Enrollee Wi-Fi Protected Setup State %d WPS: Enrollee Association State %d Line %d: invalid legacy beacon_rate %d unknown mgmt frame subtype %d unknown mgmt cb frame subtype %d EAPOL: Ignored unknown EAPOL-Key type %d nl80211: Allocate new address for interface %s type %d WPA: Unsupported key_info type %d Unsupported P2P Public Action frame type %d EAP: getNextMethod: vendor %d type %d EAPOL: Received unknown EAPOL type %d nl80211: Key Type %d * Auth Type %d WPS: Invalid Message Type %d WPS: Unsupported Message Type %d P2P: * OOB GO Negotiation Channel: Operating Class %u Channel %u Role %d P2P: * OOB GO Neg Channel: Country %c%c(0x%02x) Operating Class %d Channel Number %d Role %d Beacon request: Unknown measurement mode %d WPS: Unsupported op_code %d EAP: Ignored EAP-Packet with unknown code %d hostapd_wmm_action - unknown action code %d EAP-WSC: Unexpected Op-Code %d Ignoring EAPOL on interface %d Line %d: invalid dtim_period %d Line %d: invalid bss_load_update_period %d Line %d: invalid period %d P2P: Start WPS Enrollee for peer %02x:%02x:%02x:%02x:%02x:%02x dev_addr %02x:%02x:%02x:%02x:%02x:%02x wps_method %d EAP: Could not find selected method: vendor %d method %d EAP: Failed to initialize EAP method %d Line %d: invalid rts_threshold %d Line %d: invalid fragm_threshold %d AUTH: eapol event not handled %d nl80211: Key Id %d %d %d %d %d Line %d: invalid beacon_rate VHT-MCS %d Line %d: invalid beacon_rate HT-MCS %d EAP-ERROR-CODE %d WPA: Invalid IGTK KeyID %d new AID %d old AID %d WPA: Remove group state machine for VLAN-ID %d WPA: Add group state machine for VLAN-ID %d Invitation to use Device Password ID %d WPS: Unsupported Device Password ID %d WPS: Device Password ID %d WPA: Ensure group state machine running for VLAN ID %d WPA: Try stopping group state machine for VLAN ID %d WPA: Moving STA %02x:%02x:%02x:%02x:%02x:%02x to use group state machine for VLAN ID %d CRED-REMOVED %d CRED-ADDED %d BSS: %02x:%02x:%02x:%02x:%02x:%02x changed freq %d --> %d WPS: AP %02x:%02x:%02x:%02x:%02x:%02x changed type %d -> %d EAPOL: Workaround - fix EAPOL payload length based on EAP header: %d -> %d nl80211: Update BSS %s bandwidth: %d -> %d WPS: Network Key Index: %d WPS: Network Index: %d global ctrl_iface_init UDP port: %d nl80211: Unknown CQM RSSI threshold event: %d WMM: ADDTS processing result: %d P2P: * Status: %d DFS freq: %dMHz, n_chans: %d P2P: num_unused_channels: %d checking our: %d, radar: %d IBSS already found in scan results, adjust control freq: %d Invalid direction: %d WMM AC: invalid TS direction: %d Channel Utilization: %d EAP: Error notification: %d P2P: * Dialog Token: %d Best channel: 2.4 GHz: %d, 5 GHz: %d, overall: %d Beacon Request: Invalid reporting detail: %d HT40: control channel: %d secondary channel: %d Adding channel: %d Available channel: %d Query Response Length: %d Unknown max oper bandwidth: %d Unknown CSA bandwidth: %d DFS chan_idx seems wrong; num-ch: %d ch-no: %d conf-ch-no: %d 11n: %d sec-ch: %d vht-oper-width: %d nl80211: Signal: %d dBm txrate: %d P2P: Enable Interworking with access_network_type: %d nl80211: Channel type: %d P2P: Venue group: %d Venue type: %d Station %02x:%02x:%02x:%02x:%02x:%02x has been inactive too long: %d sec, max allowed: %d %s: iface->cac_started: %d overlapped: %d nl80211: %s->nl_recvmsgs failed: %d Reloading WPA-PSK passwords failed: %d P2P: Own oper channel update failed: %d P2P: Own listen channel update failed: %d nl80211: Relative RSSI: %d P2P: WPS IE Device Password ID: %d P2P: Device Password ID: %d WMM: Packets-per-second estimate for TSPEC: %d WPS: Request Type (from WPS IE in (Re)AssocReq WPS IE): %d DFS start_dfs_cac() failed, %d DFS adjusting VHT center frequency: %d, %d key_rsc provdisc wpas_p2p_prov_disc pcsc upc mgmt::disassoc STA %02x:%02x:%02x:%02x:%02x:%02x did not acknowledge disassoc STA %02x:%02x:%02x:%02x:%02x:%02x acknowledged disassoc hostapd_notif_assoc assoc hostapd_config_alloc hostapd_iface_alloc hostapd_setup_interface_complete_sync sae_sync okc civic nl80211: SMPS mode - static automatic nl80211: SMPS mode - dynamic key_mic Setting authentication timeout: %d sec %d usec Enabling Extended Listen Timing: period %u msec, interval %u msec Set timeout (state=%s): %u.%06u sec Setting scan request: %d.%06d sec Rescheduling scan request: %d.%06d sec Authentication timeout restart: %d sec Setting scan interval: %d sec Setting bss expiration age: %d sec hostapd_wmm_action - missing or wrong length tspec pbc P2PS PD Response missing adv_mac P2PS PD Response missing session_mac %02x%c %c%c bignum_sub rb cert_in_cb WPS: Continuing association after eapol_cb mgmt::reassoc_resp cb mgmt::assoc_resp cb mgmt::deauth cb mgmt::auth cb mgmt::disassoc cb * ext_capab ht_capab req_conn_capab * he_capab IEEE 802.11b no_probe_resp_if_max_sta wds_sta max_num_sta multi_ap_backhaul_sta AUTH: for_each_sta ap_free_sta hostapd_new_assoc_sta * auth_data hostapd_free_hapd_data EAP: EAP-Request Identity data BSS Load: Failed to get survey data nl80211: Failed to process survey data nl80211: Fetch survey data nl80211: Invalid survey data WPA: AES unwrap failed - could not decrypt EAPOL-Key key data WPA: decrypted EAPOL-Key key data WPA: GTK IE in unencrypted key data WPA: IGTK KDE in unencrypted key data RSN: encrypted key data RSN: msg 1/4 key data RSN: msg 1/2 key data Beacon request: Too short request data nl80211: Vendor data WPS: Reload configuration data EAP-WSC: PIN or PBC not set in phase1 configuration data EAP: EAP-Request Notification data Failed to set beacon data based on random data WPA: Set PMK based on external data handle_eap_response: too short response data No Query Response data Not enough Query Response data nl80211: MLME event %d (%s) without frame data TX status frame data WPS: Message data WPA: Ignore EAPOL-Key with encrypted but unauthenticated data WMM AC: Cannot add TS - missing assoc data WPA: ignoring %lu bytes after the IEEE 802.1X data Failed to allocate memory for multi-BSS RADIUS data WPA: RX EAPOL data P2P: Failed to parse P2P IE data P2P: P2P IE data EAPOL: Failed to get eapKeyData WPA: IE KeyData EAP: SEND_REQUEST - no eapReqData EAP: SEND_REQUEST2 - no eapReqData EAP: AAA_REQUEST - no eapRespData P2P: Query Data Plaintext EAPOL-Key Key Data WPA: PTK not available, cannot decrypt EAPOL-Key Key Data WPA: Key Data P2P: Response Data P2P: Data wpa_parse_wpa_ie_wpa noa /proc/sys/net/ipv6/conf/%s/drop_unsolicited_na ga Failed to allocate SD response fragmentation area IEEE 802.11a vo_ auto_ after_beacon_ bk_ vi_ tx_queue_ be_ wmm_ac_ wme_ac_ [Display] frame[%u] [40MHzIntolerant] [OBSSScanExemptionGrant] [Ethernet] WPS-EVENT-PIN-NEEDED %s %02x:%02x:%02x:%02x:%02x:%02x [%s|%s|%s|%s|%s|%s] WPS-PIN-NEEDED %s %02x:%02x:%02x:%02x:%02x:%02x [%s|%s|%s|%s|%s|%s] CTRL-EVENT-CONNECTED - Connection to %02x:%02x:%02x:%02x:%02x:%02x completed [id=%d id_str=%s%s] WPS-ENROLLEE-SEEN %02x:%02x:%02x:%02x:%02x:%02x %s %s 0x%x %u %u [%s] WPA: Group rekeying completed with %02x:%02x:%02x:%02x:%02x:%02x [GTK=%s] WPA: Key negotiation completed with %02x:%02x:%02x:%02x:%02x:%02x [PTK=%s GTK=%s] [InfoReq] [OBSSScanExemptionReq] [20MHzBSSWidthReq] [Ext NFC Token] [Int NFC Token] [Label] [Reserved] [Keypad] [assoc] [GROUP_CLIENT_ONLY] [PROBE_REQ_ONLY] [NOT_YET_READY] [PD_PEER_DISPLAY] Driver does not support configured HT capability [LSIG-TXOP-PROT] [PERSISTENT] [P2P-PERSISTENT] [CURRENT] [LAST_SEEN_AS_GROUP_CLIENT] [40-INTOLERANT] [DORMANT] [HT] [VENDOR_VHT] [VHT] [ESS] [PBSS] [IBSS] [MAYBE_WPS] [WPS] [PD_PEER_P2PS] [OWE-TRANS] [DISABLE-TIME-CHECKS] [WDS] [GAS] [NO_IR] [RADAR] [FORCE_FREQ] [LOWER_UP] [UP] [PREFER_PERSISTENT_GROUP] [NonERP] [MFP] [WEP] [P2P] [WPS-PIN] [PD_FOR_JOIN] [OWE-TRANS-OPEN] [WAIT_GO_NEG_CONFIRM] [WMM] [NULL] [AUTH] [PREAUTH] [WPS-AUTH] [MESH] [SUITEB-NO-ECDH] [RUNNING] [DMG] Driver does not support configured HT capability [GF] [PEER_WAITING_RESPONSE] [WAIT_GO_NEG_RESPONSE] [SHORT_PREAMBLE] [WNM_SLEEP_MODE] [AUTHORIZED] [REMOVED] [KEY DATA REMOVED] [REPORTED] [USER_REJECTED] [DISABLED] [TEMP-DISABLED] [PD_PEER_KEYPAD] Driver does not support configured HT capability [LDPC] [ASSOC] Driver does not support configured HT capability [SMPS-STATIC] Driver does not support configured HT capability [SMPS-DYNAMIC] [NFC] Driver does not support configured HT capability [TX-STBC] [PBC] [WPS-PBC] [SUITEB] [USBA] Driver does not support configured HT capability [DELAYED-BA] ?] [UTF-8] [ALLOW-SIGN-RSA-MD5] Driver does not support configured HT capability [MAX-AMSDU-7935] [RX-STBC123] [DISABLE-TLSv1.3] [ENABLE-TLSv1.3] [2] [WPS2] [RX-STBC12] [DISABLE-TLSv1.2] [ENABLE-TLSv1.2] [RX-STBC1] [ver=1] [DISABLE-TLSv1.1] [ENABLE-TLSv1.1] [ver=0] Driver does not support configured HT capability [DSSS_CCK-40] Driver does not support configured HT capability [SHORT-GI-40] Driver does not support configured HT capability [SHORT-GI-20] [DISABLE-TLSv1.0] [ENABLE-TLSv1.0] [HT40-] [HT40+] Driver does not support configured HT capability [RX-STBC*] Driver does not support configured HT capability [HT40*] CZ AZ DISASSOC_DUE_TO_INACTIVITY EAP: EAP entering state IDENTITY nl80211: Add NL80211_SCAN_FLAG_LOW_PRIORITY DISASSOC_AP_BUSY COUNTRY REFUSED_AP_OUT_OF_MEMORY SUPPORT_HW_MODE_ANY P2PS: Setting default PIN for ANY P2P: Setting PIN-1 for ANY LISTEN_ONLY TYPE=ONLY ASSOC_REJECTED_TEMPORARILY NL80211_CMD_NEW_WIPHY NL80211_CMD_SET_WIPHY NL80211_CMD_GET_WIPHY NL80211_CMD_DEL_WIPHY --> new PHY hardware does not support VHT PHY hardware does not support HT PHY NL80211_CMD_CH_SWITCH_NOTIFY NL80211_CMD_GET_SURVEY NL80211_CMD_NEW_KEY NL80211_CMD_SET_KEY NL80211_CMD_GET_KEY NL80211_CMD_DEL_KEY WRONG_KEY SHARED_KEY DRIVER_GTK_REKEY CIPHER_REJECTED_PER_POLICY BEACON_RATE_LEGACY BY %016llX OFFCHANNEL_TX P2P: Use group interface %s instead of interface %s for Action TX P2P: Use GO interface %s instead of interface %s for Action TX nl80211: Using driver-based off-channel TX P2P: Use ongoing radio work for Action frame TX RSN: Skip IBSS reinit since only %u usec from own Auth frame TX Off-channel: Failed to request driver to remain on channel (%u MHz) for Action Frame TX EAPOL_RX %s: Drop duplicate RX BAD_INTERVAL_WITH_U_APSD_COEX HT_2040_COEX %02X 4WAY_HANDSHAKE_8021X %sIEEE8021X WPA: using KEY_MGMT 802.1X allow for non-WPA IEEE 802.1X P2P: GO move: invalid_freq=%u, policy_move=%u, flags=0x%X freq[%u]: %d, flags=0x%X %s current operation mode=0x%X P2PS PD invalid adv_id=0x%X b:Bc:C:D:de:f:g:G:hi:I:KLMm:No:O:p:P:qsTtuvW PERFORMING_FST_NOW SHOW PENDING_GAP_IN_BA_WINDOW NEW P2P: Service Request TLV P2P: Service Response TLV Received GO Discoverability Request - remain awake for 100 TU Skip listen state since duration was 0 TU RU LU HU AUTH_TIMED_OUT ASSOC_TIMED_OUT MESH_CONFIRM_TIMEOUT AUTH_TIMEOUT GROUP_KEY_UPDATE_TIMEOUT 4WAY_HANDSHAKE_TIMEOUT IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x BE_AUTH entering state TIMEOUT EAPOL: SUPP_BE entering state TIMEOUT CANNOT_FIND_ALT_TBTT STA-FIRST IBSS_PEER_LOST INTERFACE_LIST TRACK_STA_LIST BLACKLIST NEIGHBOR_REP_REQUEST EAP: EAP entering state METHOD_REQUEST EAP: EAP entering state SEND_REQUEST EAP: EAP entering state AAA_REQUEST IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x BE_AUTH entering state REQUEST EAPOL: SUPP_BE entering state REQUEST LAST TDLS_SUPPORT AP_TEARDOWN_SUPPORT ASSOC_DENIED_NOSHORT WAIT_START IBSS_RSN_START NL80211_CMD_CRIT_PROTOCOL_START EAP: EAP entering state INITIATE_REAUTH_START WPA: %02x:%02x:%02x:%02x:%02x:%02x WPA_PTK entering state PTKSTART EAPOL: SUPP_PAE entering state RESTART IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x AUTH_PAE entering state RESTART PT INVALID_FT_ACTION_FRAME_COUNT MAY_CONT MESH_POINT NL80211_CMD_REG_BEACON_HINT NL80211_CMD_FT_EVENT FILS_HLP_SENT DEST_STA_NOT_PRESENT P2P_CONCURRENT DENIED_DUE_TO_SPECTRUM_MANAGEMENT NO_SSP_ROAMING_AGREEMENT P2P_CLIENT NL80211_CMD_PROBE_CLIENT IF_OPER_DORMANT RX_MGMT NL80211_CMD_TDLS_MGMT LT DELETED_AT_DEINIT IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x AUTH_KEY_TX entering state NO_KEY_TRANSMIT IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x AUTH_KEY_TX entering state KEY_TRANSMIT EAP: EAP entering state RETRANSMIT GAS_RESP_LARGER_THAN_LIMIT ASSOC_DENIED_NO_HT BEACON_RATE_HT ASSOC_DENIED_NO_VHT BEACON_RATE_VHT IBSS: WEP/TKIP detected, do not try to enable HT DISASSOC_STA_HAS_LEFT DFS-UNSET P2P-GROUP-FORMATION-FAILURE reason=FREQ_CONFLICT MCCAOP_RESERVATION_CONFLICT TS_SCHEDULE_CONFLICT NL80211_CMD_RADAR_DETECT WAIT_PEER_CONNECT NL80211_CMD_CONNECT NL80211_CMD_DISCONNECT WPA: %02x:%02x:%02x:%02x:%02x:%02x WPA_PTK entering state DISCONNECT RECONNECT TDLS_WAKEUP_REJECT ASSOC_REJECT AT EAPOL_TX_STATUS DEAUTH_TX_STATUS NL80211_CMD_FRAME_TX_STATUS WPS_GET_STATUS WDS_STA_INTERFACE_STATUS WMM_AC_STATUS OFFCHANNEL_SIMULTANEOUS RADIUS NL80211_CMD_DEL_TX_TS NL80211_CMD_ADD_TX_TS SERVICE_CHANGE_PRECLUDES_TS WLAN_FC_STYPE_RTS EXTERNAL_SERVICE_REQUIREMENTS NL80211_CMD_NEW_SURVEY_RESULTS NL80211_CMD_NEW_SCAN_RESULTS NL80211_CMD_SCHED_SCAN_RESULTS WLAN_FC_STYPE_CTS BEACON_LOSS EAP: EAP entering state SUCCESS IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x BE_AUTH entering state SUCCESS EAPOL: SUPP_BE entering state SUCCESS EAP: getDecision: method succeeded -> SUCCESS REQ_REFUSED_UNAUTH_ACCESS Re-association to the same ESS NL80211_CMD_SET_BSS TRY_ANOTHER_BSS NOT_IN_SAME_BSS nl80211: PBSS * PBSS MAC_ADDRESS_ALREADY_EXISTS_IN_MBSS skip - not ESS, PBSS, or MBSS %sIBSS VHT_IBSS NL80211_CMD_JOIN_IBSS NL80211_CMD_LEAVE_IBSS nl80211: send_frame - Use assoc_freq=%u for IBSS Backhaul STA tries to associate with fronthaul-only BSS WPS active, accepting fronthaul-only BSS Non-Multi-AP STA tries to associate with backhaul-only BSS Failed to allocate memory for temp disallow BSS WPS: UUID of the other BSS AP doesn't support backhaul BSS Try to reconnect to the same BSS WPS: UUID of the selected BSS INVALID_PARAMETERS IE_IN_4WAY_DIFFERS MESH_MAX_PEERS %sWPS WPS: WLAN_STA_MAYBE_WPS -> WLAN_STA_WPS -WPS EAP-WSC: Provide new AP settings for WPS EAPOL: Using shorter startWhen for WPS Use normal scan instead of sched_scan for WPS IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS EAP-WSC: Failed to receive message from WPS P2PS NL80211_CMD_SET_WIPHY_NETNS DENIED_POOR_CHANNEL_CONDITIONS NL80211_CMD_REGISTER_BEACONS MESH_INCONSISTENT_PARAMS SUPPORT_FILS END_TS_BA_DLS TDLS LIST_NETWORKS IS * WANT_1X_4WAY_HS DRIVER_FLAGS %s: freq %d MHz requires DFS ASSOC_DENIED_RATES NL80211_CMD_GET_PROTOCOL_FEATURES NL80211_CMD_UPDATE_FT_IES HE_CAPABILITIES MESH_MAX_RETRIES AVOID_FREQUENCIES REJECTED_WITH_SUGGESTED_CHANGES SANE_ERROR_CODES INSUFFICIENT_TCLAS_PROCESSING_RESOURCES INTERFACES WPS: Upgrade encr_type TKIP -> TKIP+AES WDS LIST_CREDS ACS Failed to assign random MAC address for GAS TR SIGNAL_MONITOR PEER_ERROR INTERNAL_ERROR WPA: %02x:%02x:%02x:%02x:%02x:%02x WPA_PTK_GROUP entering state KEYERROR NL80211_CMD_VENDOR no-IR NO-IR HR FR UNKNOWN_AUTHENTICATION_SERVER NFC_REPORT_HANDOVER STATUS-DRIVER USER NL80211_CMD_TDLS_OPER INACTIVITY_TIMER UNKNOWN_PASSWORD_IDENTIFIER NL80211_CMD_SET_WDS_PEER nl80211: Add NL80211_SCAN_FLAG_RANDOM_ADDR CLEAR RADAR WPS: UUID-R WPS: * UUID-R nl80211: KEY_SEQ MESH_CHANNEL_SWITCH_REGULATORY_REQ NO_OUTSTANDING_GAS_REQ ANTI_CLOGGING_TOKEN_REQ P2P_PRESENCE_REQ RX_PROBE_REQ WLAN_FC_STYPE_PROBE_REQ WLAN_FC_STYPE_ASSOC_REQ WLAN_FC_STYPE_REASSOC_REQ P2P: SD Request for UPnP IF_OPER_UP TDLS_EXTERNAL_SETUP nl80211: Could not set interface '%s' UP OTP STA_TIMED_OUT_WAITING_FOR_GAS_RESP nl80211: Add NL80211_SCAN_FLAG_ACCEPT_BCAST_PROBE_RESP WLAN_FC_STYPE_PROBE_RESP WLAN_FC_STYPE_ASSOC_RESP WLAN_FC_STYPE_REASSOC_RESP P2P: SD Request for ASP DPP IAPP EXCEEDED_TXOP P2P_LO_STOP NL80211_CMD_CRIT_PROTOCOL_STOP MSGDUMP %sGCMP did not use HMAC-SHA1-AES with CCMP/GCMP %sCCMP DFS-JP %sTKIP CCMP+TKIP ignore Michael MIC failure report since group cipher is not TKIP ignore Michael MIC failure report since pairwise cipher is not TKIP Management frame protection cannot use TKIP BIP WPA: Selected AP supports MFP: require MFP UDP %sAP NL80211_CMD_START_AP NL80211_CMD_STOP_AP OCE_AP TTLS-PAP NL80211_CMD_SET_QOS_MAP NL80211_CMD_SET_NOACK_MAP TTLS-MSCHAP TTLS-CHAP %sEAP %sLEAP OPEN SHARED LEAP WPA2+WPA/IEEE 802.1X/EAP WPA2/IEEE 802.1X/EAP PMK from PMKSA cache - skip IEEE 802.1X/EAP NO-EAP UNKNOWN-EAP %sWPA-EAP MESH_INVALID_SECURITY_CAP start AP No network configuration found for the current AP Network configuration found for the current AP CTRL_IFACE ROAM: No network configuration known for the target AP VHT seg0 index %d for AP HT secondary channel offset %d for AP WPS: Received old AP configuration from AP WPS: PIN registration with %02x:%02x:%02x:%02x:%02x:%02x did not succeed - continue trying to find suitable AP WPS: Dualband AP Already associated or trying to connect with the selected AP IBSS AP skip - non-WPS AP P2P_MGMT_AND_NON_P2P Failed to init P2P P2P: Selected freq (%u MHz) is not valid for P2P Frequency %u MHz (oper_class %u channel %u) not allowed for P2P P2P: No social channels supported by the driver - do not enable P2P VO AUTO RO Failed to schedule PNO P2P_GO P2P-FALLBACK-TO-GO-NEG reason=peer-not-running-GO P2P: Ignore new_psk_cb on not-persistent GO Peer %02x:%02x:%02x:%02x:%02x:%02x did not acknowledge request - try to use device discoverability through its GO Unexpected GO Neg state - do not know which end becomes GO P2P CSA: Failed to select new frequency for GO P2P: Could not add network for GO P2P: Failed to copy passphrase for GO P2P: Freq=%d MHz no longer valid for GO P2P: Use shared freq (%d MHz) for GO P2P: Start group formation timeout of %d seconds until first data connection on GO P2P CSA: Selected same frequency - not moving GO P2P: CSA is in progress - not moving GO P2P: Starting GO P2P: %s called for an active GO VHT seg0 index %d for P2P GO MESH_PATH_ERROR_NO_PROXY_INFO MESH_PATH_ERROR_NO_FORWARDING_INFO NL80211_CMD_UPDATE_OWE_INFO ASSOCINFO ASSOC_DENIED_NO_PCO RX_FROM_UNKNOWN WLAN_FC_TYPE_UNKNOWN NL80211_CMD_UNKNOWN DOWN %sRSN WPA: Failed to select WPA/RSN Failed to init IBSS RSN REQ_REFUSED_SSPN UNSPECIFIED_QOS_REASON REFUSED_EXTERNAL_REASON CONNECT_FAILED_REASON REJECTED_WITH_SUGGESTED_BSS_TRANSITION INTERSECTION BSS_SELECTION EAP: EAP entering state SELECT_ACTION WLAN_FC_STYPE_ACTION UNKNOWN_AUTH_TRANSACTION NL80211_CMD_NEW_STATION NL80211_CMD_SET_STATION NL80211_CMD_GET_STATION NL80211_CMD_DEL_STATION MESH_CONFIG_POLICY_VIOLATION ROBUST_MGMT_FRAME_POLICY_VIOLATION NOT_AUTHORIZED_THIS_LOCATION WPA: %02x:%02x:%02x:%02x:%02x:%02x WPA_PTK entering state AUTHENTICATION EAP: EAP entering state NOTIFICATION PENDING_ADMITTING_FST_SESSION reason=GO_ENDING_SESSION nl80211: Add NL80211_SCAN_FLAG_OCE_PROBE_REQ_DEFERRAL_SUPPRESSION UNSUPPORTED_RSN_IE_VERSION LOGON OCE_STA_CFON NL80211_CMD_SET_BEACON NL80211_CMD_GET_BEACON UPDATE_BEACON WLAN_FC_STYPE_BEACON WPS_CHECK_PIN WPS: Too long PIN WPS: Could not generate PIN P2P: Could not generate PIN WPS: Invalidated wildcard PIN WPS: Invalidating used wildcard PIN WPS: Invalidate previously configured wildcard PIN Peer %02x:%02x:%02x:%02x:%02x:%02x requesting P2PS PIN Peer %02x:%02x:%02x:%02x:%02x:%02x accepted P2PS PIN WPS: Disabling AP PIN WPS: Disable AP PIN WPS: Re-enable AP PIN WPS: PIN P2P_EXT_LISTEN CONNECT_LISTEN P2P_LISTEN INVITE_LISTEN %sOSEN allow in OSEN %sOPEN NL80211_CMD_SET_WOWLAN NL80211_CMD_GET_WOWLAN AP_VLAN ABORT_SCAN HT_SCAN NL80211_CMD_GET_SCAN OBSS_SCAN NL80211_CMD_TRIGGER_SCAN NO_SCAN NL80211_CMD_START_SCHED_SCAN NL80211_CMD_STOP_SCHED_SCAN Request range: Destination station does not support FTM range report in RRM Request LCI: Station does not support LCI in RRM NL80211_CMD_NOTIFY_CQM NL80211_CMD_SET_CQM WNM BAD_CIPHER_OR_AKM RSN: FT set in RSNE AKM but MDE is missing from %02x:%02x:%02x:%02x:%02x:%02x - ignore FT AKM(s) because there's also a non-FT AKM WLAN_FC_STYPE_ATIM SIM OPEN_SYSTEM WMM AC: AC %d is not ACM NL80211_CMD_ROAM CTRL PL EAPOL: PMKSA caching was used - skip EAPOL nl80211: No socket to send EAPOL TX EAPOL RX EAPOL NL WLAN_FC_STYPE_QOS_NULL no_ctrl_interface -> ctrl_interface=NULL WPS: wps->wps->dh_pubkey == NULL P2P: p2p_go_configured() called with wpa_s->go_params == NULL Parameter error,wpa_s == NULL PKTCNT_POLL SIGNAL_POLL [PENDING_POLL WLAN_FC_STYPE_PSPOLL WLAN_FC_STYPE_QOS_CFACKPOLL WLAN_FC_STYPE_CFACKPOLL WLAN_FC_STYPE_QOS_DATA_CFACKPOLL WLAN_FC_STYPE_DATA_CFACKPOLL WLAN_FC_STYPE_QOS_CFPOLL WLAN_FC_STYPE_CFPOLL WLAN_FC_STYPE_QOS_DATA_CFPOLL WLAN_FC_STYPE_DATA_CFPOLL NULLFUNC POLL ALL CHALLENGE_FAIL IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x BE_AUTH entering state FAIL EAPOL: SUPP_BE entering state FAIL LOG_LEVEL BEST_CHANNEL NL80211_CMD_SET_CHANNEL NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL NL80211_CMD_REMAIN_ON_CHANNEL DENIED_WITH_SUGGESTED_BAND_AND_CHANNEL NL80211_CMD_FRAME_WAIT_CANCEL WPS_CANCEL P2P_CANCEL NL80211_CMD_SET_MAC_ACL MACACL MFP_OPTIONAL UK WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK SUPP: Do not use this PTK AUTH: Do not use this PTK rekeying PTK WPA: Clear old PMK and PTK WPA: Clear old PTK WPA: PTK MESH_INVALID_GTK RSN: Failed to configure IGTK WPA: IGTK WPA: AES unwrap failed - could not decrypt GTK RSN: Failed to install GTK rekeying GTK RSN: Failed to configure GTK RSN IBSS RX GTK WPA: TK %sPSK 4WAY_HANDSHAKE_PSK RELOAD_WPA_PSK WPA: %02x:%02x:%02x:%02x:%02x:%02x WPA_PTK entering state INITPSK WPAPSK WPS: Upgrade auth_type WPAPSK -> WPAPSK+WPA2PSK WPS: Workaround - convert mixed-mode auth_type into WPA2PSK %sWPA-PSK WPA2-PSK+WPA-PSK WPA: using KEY_MGMT WPA-PSK WPA2-PSK WPS: Failed to configure the new PSK P2P: Could not find persistent group information to store the new PSK Unable to alloc space for PSK WPS: Could not generate random PSK IEEE 802.1X: Ignore EAPOL message - STA is using PSK IEEE 802.1X: Ignore STA - using PSK WPS: Generated per-device PSK Per-device PSK * PSK WPS: EMSK NL80211_CMD_SET_TX_BITRATE_MASK SET_NETWORK CTRL_IFACE: ADD_NETWORK DRIVER_CLIENT_POLL_OK nl80211: Interface %s does not exist - ignore RTM_NEWLINK WPA: %02x:%02x:%02x:%02x:%02x:%02x WPA_PTK entering state INITPMK WPA: No current PMKSA - clear PMK RSN: Message 1/4 PMKID derived from PMK RSN: Cache PMK RSN: Replace PMKSA entry for the current AP and any PMKSA cache entry that was based on the old PMK RSN: deauthenticating due to expired PMK WPA: PMK nl80211: PMK GMK Updated PTK KEK WPA: KEK WPS: KDK Updated PTK KCK WPA: KCK EAP: EAP entering state INTEGRITY_CHECK EXT_CERT_CHECK STATION_LOW_ACK DISASSOC_LOW_ACK WAIT_FRAG_ACK EAP-WSC: Send WSC/FRAG_ACK EAP-WSC: Failed to allocate memory for FRAG_ACK WLAN_FC_STYPE_ACK WPS: Building Message WSC_ACK WPS: Received WSC_ACK WPS: No Configuration Error attribute in WSC_NACK WPS: Building Message WSC_NACK WPS: Received WSC_NACK WLAN_FC_STYPE_CFACK WLAN_FC_STYPE_QOS_DATA_CFACK WLAN_FC_STYPE_DATA_CFACK WLAN_FC_STYPE_CFENDACK P2PS PD completion on Follow-on PD Request ACK did not ACK BK EAP: EAP entering state NAK CTRL-EVENT-EAP-PROPOSED-METHOD vendor=%u method=%u -> NAK VI GAS: Failed to get random address with same OUI DFS-ETSI SCHED_SCAN_RELATIVE_RSSI DISASSOC_FROM_CLI shortGI FI STA_REQ_ASSOC_WITHOUT_AUTH NL80211_CMD_EXTERNAL_AUTH WLAN_FC_STYPE_AUTH EAPOL: SUPP_PAE entering state S_FORCE_AUTH IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x AUTH_PAE entering state FORCE_AUTH EAPOL: SUPP_PAE entering state S_FORCE_UNAUTH IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x AUTH_PAE entering state FORCE_UNAUTH UNPROT_DEAUTH WLAN_FC_STYPE_DEAUTH IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x CTRL_DIR entering state IN_OR_BOTH IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x CTRL_DIR entering state FORCE_BOTH DENIED_INSUFFICIENT_BANDWIDTH NOT_ENOUGH_BANDWIDTH NL80211_CMD_NEW_MPATH NL80211_CMD_SET_MPATH NL80211_CMD_GET_MPATH NL80211_CMD_DEL_MPATH ERP_FLUSH P2P_FLUSH nl80211: Add NL80211_SCAN_FLAG_FLUSH P2P_SERVICE_FLUSH PMKSA_FLUSH NL80211_CMD_JOIN_MESH NL80211_CMD_LEAVE_MESH EAP: EAP entering state INITIALIZE_PASSTHROUGH EAP: getDecision: -> PASSTHROUGH UPDATE_DH TDLS_CHANNEL_SWITCH NL80211_CMD_CHANNEL_SWITCH CH_SWITCH PEERKEY_MISMATCH SEARCH REATTACH DETACH DEBUG WPS: Received WSC_MSG MESG RELOG DEAUTH_LEAVING STA_LEAVING REJECT_U_PID_SETTING IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x AUTH_PAE entering state ABORTING EAPOL: SUPP_PAE entering state CONNECTING IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x AUTH_PAE entering state CONNECTING WPA: %02x:%02x:%02x:%02x:%02x:%02x WPA_PTK_GROUP entering state REKEYNEGOTIATING WPA: %02x:%02x:%02x:%02x:%02x:%02x WPA_PTK entering state PTKINITNEGOTIATING WPA: %02x:%02x:%02x:%02x:%02x:%02x WPA_PTK entering state PTKCALCNEGOTIATING ASSOCIATING EAPOL: SUPP_PAE entering state AUTHENTICATING IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x AUTH_PAE entering state AUTHENTICATING QOS_MAPPING WARNING PROVISIONING SCANNING QUERY_RESP_OUTSTANDING NOT_SUPPORTED_AUTH_ALG GET_CONFIG NL80211_CMD_SET_MESH_CONFIG NL80211_CMD_GET_MESH_CONFIG NL80211_CMD_REQ_SET_REG NL80211_CMD_SET_REG NL80211_CMD_GET_REG GO_NEG BG 5G 2G EAPOL: SUPP_PAE entering state LOGOFF IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x REAUTH_TIMER entering state INITIALIZE EAP: EAP entering state INITIALIZE WPA: %02x:%02x:%02x:%02x:%02x:%02x WPA_PTK entering state INITIALIZE IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x BE_AUTH entering state INITIALIZE EAPOL: SUPP_BE entering state INITIALIZE IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x AUTH_PAE entering state INITIALIZE OWE REMOVE INACTIVE EXCESSIVE IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x KEY_RX entering state NO_KEY_RECEIVE EAPOL: KEY_RX entering state NO_KEY_RECEIVE IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x KEY_RX entering state KEY_RECEIVE EAPOL: KEY_RX entering state KEY_RECEIVE EAPOL: SUPP_BE entering state RECEIVE NL80211_CMD_SET_POWER_SAVE NL80211_CMD_GET_POWER_SAVE EAPOL: Clearing prior altAccept TRUE EAP: getDecision: no identity known yet -> CONTINUE EAP: getDecision: another method available -> CONTINUE INVITE INVALID_FTE FULL_AP_CLIENT_STATE nl80211: Add NL80211_SCAN_FLAG_OCE_PROBE_REQ_MIN_TX_RATE NL80211_CMD_SET_MCAST_RATE TDLS_WAKEUP_ALTERNATE TERMINATE NL80211_CMD_ASSOCIATE NL80211_CMD_UNPROT_DISASSOCIATE NL80211_CMD_DISASSOCIATE REASSOCIATE COUNTRY_UPDATE P2P_SERVICE_UPDATE NL80211_CMD_NEW_PEER_CANDIDATE PMKID_CANDIDATE NL80211_CMD_PMKSA_CANDIDATE NL80211_CMD_AUTHENTICATE IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x REAUTH_TIMER entering state REAUTHENTICATE NL80211_CMD_UNPROT_DEAUTHENTICATE NL80211_CMD_DEAUTHENTICATE -VERBOSE FT_RESPONSE EAP: EAP entering state METHOD_RESPONSE EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state AAA_RESPONSE IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x BE_AUTH entering state RESPONSE EAPOL: SUPP_BE entering state RESPONSE FALSE P2P_GET_PASSPHRASE PSK_PASSPHRASE EAP: EAP entering state TIMEOUT_FAILURE UNSPECIFIED_QOS_FAILURE FILS_AUTHENTICATION_FAILURE TRANSMISSION_FAILURE WPA: group state machine entering state FATAL_FAILURE reason=PSK_FAILURE EXPECTED_FAILURE UNSPECIFIED_FAILURE NL80211_CMD_MICHAEL_MIC_FAILURE EAP: EAP entering state FAILURE EAP: getDecision: stop identity request loop -> FAILURE EAP: getDecision: user not found from database -> FAILURE EAP: getDecision: no more methods available -> FAILURE EAP: getDecision: method failed -> FAILURE RECONFIGURE IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x BE_AUTH entering state IGNORE CORE %sNONE %sWPA-NONE WPA: using KEY_MGMT WPA-NONE key_mgmt is NONE CCMP TKIP NONE WPA-PSK WPA-EAP IEEE8021X WPA-NONE NONE RRM: Notifying neighbor report - NONE SET_KEYS_AFTER_ASSOC_DONE WPA: %02x:%02x:%02x:%02x:%02x:%02x WPA_PTK entering state PTKINITDONE WPS-ER-AP-SET-SEL-REG uuid=%s state=DONE RESUME nl80211: Ignore auth event when using driver SME nl80211: Ignore assoc event when using driver SME nl80211: Ignore disconnect event when using userspace SME nl80211: Ignore connect event (cmd=%d) when using userspace SME REQ_REFUSED_HOME AP_MLME ASSOC_DENIED_NO_SHORT_SLOT_TIME nl80211: Add NL80211_SCAN_FLAG_FILS_MAX_CHANNEL_TIME UNACCEPTABLE_LIFETIME NL80211_CMD_CONTROL_PORT_FRAME NL80211_CMD_REGISTER_FRAME NL80211_CMD_UNEXPECTED_4ADDR_FRAME NL80211_CMD_FRAME NL80211_CMD_UNEXPECTED_FRAME IFNAME REJECT_WITH_SCHEDULE WAIT_PEER_IDLE EAP: EAP entering state AAA_IDLE reason=IDLE WPA: %02x:%02x:%02x:%02x:%02x:%02x WPA_PTK_GROUP entering state IDLE EAP: EAP entering state IDLE IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x BE_AUTH entering state IDLE EAPOL: SUPP_BE entering state IDLE DISABLE P2P_CAPABLE ENABLE NO_PSK_AVAILABLE INTERFACE_UNAVAILABLE reason=UNAVAILABLE ADV_SRV_UNREACHABLE MESH_PATH_ERROR_DEST_UNREACHABLE TDLS_TEARDOWN_UNREACHABLE R0KH_UNREACHABLE 4WAY_HANDSHAKE GROUP_HANDSHAKE COUNTRY_IE DRIVER_IE INVALID_IE NL80211_CMD_SET_MGMT_EXTRA_IE INVALID_FTIE INVALID_RSNIE GET_COOKIE INVALID_MDIE Added supported operating classes IE Failed to add supported operating classes IE WPA: Unrecognized EAPOL-Key Key Data IE WPS: No Request Type attribute in (Re)AssocReq WPS IE selected based on WPS IE P2P: Parsing WPS IE Multi-AP: Failed to build Multi-AP IE P2P: Update GO Beacon P2P IE P2P: Parsing P2P IE P2P: Update GO Probe Response P2P IE P2P: Could not figure out whether group is persistent - BSS %02x:%02x:%02x:%02x:%02x:%02x did not include P2P IE WPA: set own WPA/RSN IE WPA: clearing own WPA/RSN IE selected based on RSN IE selected based on TSN in RSN IE WPA: set AP RSN IE WPA: clearing AP RSN IE WMM AC: No WMM IE WPA: WMM IE selected based on WPA IE selected based on TSN in WPA IE WPA: Failed to generate WPA IE WPA: set AP WPA IE WPA: clearing AP WPA IE ASSOC_DENIED_LISTEN_INT_TOO_LARGE SIGNAL_CHANGE NL80211_CMD_WIPHY_REG_CHANGE NL80211_CMD_REG_CHANGE EE SUCCESS_POWER_SAVE_MODE NL80211_CMD_TESTMODE INVALID_MDE NL80211_CMD_SET_COALESCE NL80211_CMD_GET_COALESCE NL80211_CMD_START_P2P_DEVICE NL80211_CMD_STOP_P2P_DEVICE DEDICATED_P2P_DEVICE NL80211_CMD_NEW_INTERFACE NL80211_CMD_SET_INTERFACE NL80211_CMD_GET_INTERFACE NL80211_CMD_DEL_INTERFACE P2P_DEDICATED_INTERFACE BE %sSAE FT-SAE Line %d: key_mgmt for mesh network should be open or SAE RSN: Cache PMK from SAE WPS: Found a wildcard PIN. Assigned it for this UUID-E WPS: Removed UUID-E WPS: UUID-E WPS: * UUID-E MESH_CLOSE_RCVD AP_UAPSD NEW_PASSWORD EAP: EAP entering state DISCARD EAP: EAP entering state GET_METHOD EAP: EAP entering state PICK_UP_METHOD EAP: EAP entering state PROPOSE_METHOD EAP: EAP entering state METHOD P2P_STOP_FIND P2P_FIND SD_DURING_FIND PD_DURING_FIND P2P: Stop any on-going P2P FIND SUSPEND WLAN_FC_STYPE_CFEND REJECT_DSE_BAND MD CUSTOM_WORLD EAPOL: SUPP_PAE entering state HELD IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x AUTH_PAE entering state HELD WPS: Invalidated PIN for UUID WPS: Expired PIN for UUID Line %d: invalid UUID WPS: Add one for the requested UUID WPS: Requested UUID WPS: Use configured UUID WPS: UUID nl80211: Ignore port authorized event without BSSID Failed to get BSSID Invalid BSSID Allow reassociation - selected BSS has preferred BSSID CTRL: SET_NEIGHBOR: Bad BSSID CTRL: REMOVE_NEIGHBOR: Bad BSSID RRM: Ignore scan results due to mismatching TSF BSSID disallow_aps SSID STA %02x:%02x:%02x:%02x:%02x:%02x sent probe request for %s SSID Invitation for SSID P2P: Start WPS Enrollee for SSID scan SSID Scan SSID CTRL: REMOVE_NEIGHBORr: Bad or missing SSID CTRL: SET_NEIGHBOR: Bad or missing SSID WPS: Credential did not include SSID Starting AP scan for wildcard SSID SSID subelement with zero length - wildcard SSID P2P: Forced SSID CTRL: Send Neighbor Report: bad SSID specific SSID WPS: Use specific AP SSID P2P: P2P Group ID SSID WPS: SSID P2P: * P2P Group ID: SSID WPS: * SSID PWR_CAPABILITY_NOT_VALID GROUP_CIPHER_NOT_VALID PAIRWISE_CIPHER_NOT_VALID AKMP_NOT_VALID SUPPORTED_CHANNEL_NOT_VALID PREV_AUTH_NOT_VALID INVALID_PMKID OKC match for PMKID RSN: Search for PMKID RSN: the new PMK matches with the PMKID RSN: Derived PMKID RSN: matched PMKID RSN: added PMKID RSN IE: STA PMKID RSN: PMKSA cache entry found - PMKID Ignore PD Response with unexpected Advertisement ID IEEE 802.11: SA Query Transaction ID Ignore PD Response with unexpected Session ID P2P: Ignore Probe Request due to mismatch with Device ID WPS: Device Password ID NL80211_CMD_PORT_AUTHORIZED UNINITIALIZED DIRECT_LINK_NOT_ALLOWED GAS_RESP_NOT_RECEIVED EAP: EAP entering state RECEIVED TCLAS_RESOURCES_EXCHAUSTED SCAN_REQUESTED reason=REQUESTED U_APSD_COEX_NOT_SUPPORTED DENIED_QOS_NOT_SUPPORTED REQ_TCLAS_NOT_SUPPORTED REQUESTED_TCLAS_NOT_SUPPORTED FINITE_CYCLIC_GROUP_NOT_SUPPORTED GAS_ADV_PROTO_NOT_SUPPORTED U_APSD_COEX_MODE_NOT_SUPPORTED REJECTED_EMERGENCY_SERVICE_NOT_SUPPORTED CAPS_UNSUPPORTED NL80211_CMD_SCAN_ABORTED DFS_CAC_ABORTED SCHED_SCAN_STARTED CH_SWITCH_STARTED DFS_CAC_STARTED SCAN_COMPLETED DFS_RADAR_DETECTED MGMT_TX_RANDOM_TA_CONNECTED WPA: %02x:%02x:%02x:%02x:%02x:%02x WPA_PTK entering state DISCONNECTED EAPOL: SUPP_PAE entering state DISCONNECTED IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x AUTH_PAE entering state DISCONNECTED ACS_CHANNEL_SELECTED CIPHER_SUITE_REJECTED TCLAS_PROCESSING_TERMINATED ASSOCIATED TS_NOT_CREATED EAPOL: SUPP_PAE entering state AUTHENTICATED IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x AUTH_PAE entering state AUTHENTICATED GTK_NOT_USED WIRED SPEC_MGMT_REQUIRED DFS_PRE_CAC_EXPIRED CTRL_IFACE: ADD_CRED %sSHARED NL80211_CMD_SCHED_SCAN_STOPPED REQUEST_DECLINED MESH_PEERING_CANCELLED reason=FORMATION_FAILED NL80211_CMD_CONN_FAILED IEEE_802_1X_AUTH_FAILED WPS-ER-AP-SET-SEL-REG uuid=%s state=FAILED SECURITY_DISABLED INTERFACE_DISABLED EAP: EAP entering state DISABLED INTERFACE_ENABLED AUTHORIZATION_DEENABLED ENABLEMENT_DENIED REJECT_NO_WAKEUP_SPECIFIED TDLS_TEARDOWN_UNSPECIFIED MESH_CHANNEL_SWITCH_UNSPECIFIED WPS_BUTTON_PUSHED DFS_NOP_FINISHED DFS_CAC_FINISHED WPA: %02x:%02x:%02x:%02x:%02x:%02x WPA_PTK_GROUP entering state REKEYESTABLISHED AUTHORIZED_ACCESS_LIMIT_REACHED CHANNEL_LIST_CHANGED STATION_OPMODE_CHANGED NL80211_CMD_STA_OPMODE_CHANGED INTERFACE_MAC_CHANGED MCCA_TRACK_LIMIT_EXCEEDED MAF_LIMIT_EXCEEDED P2P_GROUP_ADD NL80211_CMD_SET_REKEY_OFFLOAD KEY_MGMT_OFFLOAD DFS_OFFLOAD ACS_OFFLOAD PROBE_RESP_OFFLOAD P2P_LISTEN_OFFLOAD FILS_SK_OFFLOAD RELOAD WPS_NFC_TAG_READ WPS: Unexpected state (%d) for receiving M2D WPS: Building Message M2D WPS: Received M2D WSC nl80211: TSC WPA: RSC SET_KEYS_AFTER_ASSOC REASSOC_NO_ASSOC UNPROT_DISASSOC BSS_TRANSITION_DISASSOC WLAN_FC_STYPE_DISASSOC SSP_REQUESTED_DISASSOC ADHOC WLAN_FC_STYPE_NULLFUNC RSN: Consider %02x:%02x:%02x:%02x:%02x:%02x for OKC WPA: EAPOL-Key Key MIC WPA: Derived Key MIC WPA: Failed to generate EAPOL-Key version %d key_mgmt 0x%x MIC WPA: Earlier SNonce did not result in matching MIC WPA: Earlier SNonce resulted in matching MIC WPA: KCK not set - cannot calculate MIC received EAPOL-Key with invalid MIC received EAPOL-Key request with invalid MIC Peer using NFC WMM AC: missing or wrong length TSPEC NL80211_CMD_UNSPEC ASSOC_DENIED_UNSPEC UNCOND_SUCC DFS-FCC WPS_PBC WPS: Use default PIN for PBC WPA: EAPOL-Key MIC using AES-CMAC %sAES-128-CMAC WPA: using MGMT group cipher AES-128-CMAC WPA: AP did not use the negotiated AES-128-CMAC P2PS Follow-on PD with mismatch Advertisement ID/MAC P2PS Follow-on PD with mismatch Session ID/MAC Ignore PD Response with unexpected Advertisement MAC Ignore PD Response with unexpected Session MAC DFS: restarting pending CAC MIB RESTRICTION_FROM_AUTHORIZED_GDB INVALID_RSN_IE_CAPAB WPA2-EAP-SUITE-B P2P: Presence Request NoA Failed to fetch current NoA P2P: Current NoA P2P: Disable periodic NoA P2P: Legacy STA(s) connected - do not enable periodic NoA P2P: Enable periodic NoA P2P: P2P Presence Response - NoA WPS: Invalid KWA UA MGMT_TX_RANDOM_TA AP_UNABLE_TO_HANDLE_NEW_STA DEST_STA_NOT_QOS_STA CLASS2_FRAME_FROM_NONAUTH_STA OCE_STA UNASSOC_STA CLASS3_FRAME_FROM_NONASSOC_STA Data frame from unknown STA %02x:%02x:%02x:%02x:%02x:%02x - adding a new STA New STA received EAPOL-Start from STA received EAPOL-Logoff from STA No WPA/RSN IE from STA %s: Ignore Probe Request from %02x:%02x:%02x:%02x:%02x:%02x since no room for additional STA IEEE 802.1X data frame from not associated/Pre-authenticating STA Polling STA no PSK configured for the STA AUTH_GET_MSK: Cannot find STA Ignore intra-BSS 20/40 BSS Coexistence Management frame from not-associated STA Failed to add STA Dropped unprotected Robust Action frame from an MFP STA nl80211: KEY_DATA WLAN_FC_STYPE_QOS_DATA WLAN_FC_STYPE_DATA NL80211_CMD_SET_PMKSA NL80211_CMD_DEL_PMKSA NL80211_CMD_FLUSH_PMKSA WPA: Set PMK based on current PMKSA STA identity from PMKSA Copied %lu Class attribute(s) from PMKSA RSN: Trying to use cached PMKSA AP_CSA %sWPA RSN WPA UNKNOWN_TS_BA current_mode != IEEE80211A P2P-PROV-DISC-FAILURE p2p_dev_addr=%02x:%02x:%02x:%02x:%02x:%02x status=N/A ?? P2P-SERV-DISC-RESP %02x:%02x:%02x:%02x:%02x:%02x %u <long response: %u bytes> IFACE=%s <%d> 40 MHz pri/sec mismatch with BSS %02x:%02x:%02x:%02x:%02x:%02x <%d,%d> (chan=%d%c) vs. <%d,%d> new_key= wep_default_key= delay= ieee80211w= timeout= test= cpt= persistent= go_intent= wpa_key_mgmt= sec_channel_offset= status= probe_rx_events= bss= vendor_elems= auth_algs= %02x:%02x:%02x:%02x:%02x:%02x flags= aid=%d capability=0x%x listen_interval=%d supported_rates= supp_op_classes= neighbor= nr= rsn_pairwise_cipher= wpa_pairwise_cipher= peer= p2p_dev_addr= go_dev_addr= new_encr= freq= group= provisioning_sp= multi_ap= tstCap= info= reason= session= pin= sp_fqdn= wpa_psk= psk= ht_mcs_bitmask= seek= lci= new_auth= max_oper_chwidth= bandwidth= pkhash= hash= bss_config= pref= passive= wps_state= rsn_pairwise= wpa_pairwise= wpa_passphrase= dev_type= role= enable= beacon_ie= req_mode= iface= method= bssid= new_ssid= group_ssid= ssid= dev_pw_id= dev_id= adv_id= eap_session_id= scan_id= use_id= civic= adv_mac= session_mac= ext_capab= wpa= HYSTERESIS= MASK= IFNAME= RANGE= THRESHOLD= LAST_ID= VLAN_ID= center_freq2= freq2= ssid2= alpha2= center_freq1= %u: ext: vht: Mode[%s] Channels: udp: hash: sqlite: b:Bde:f:hi:KP:sSTtu:vg:G: ssha256: ssha512: ssha1: %s - hexdump(len=%lu): wpa_supplicant v2.9 WPS: Unexpected state (%d) for receiving M8 WPS: Building Message M8 WPS: Received M8 %sBIP-GMAC-128 WPA: using MGMT group cipher BIP-GMAC-128 WPS: Unexpected state (%d) for receiving M7 WPS: Building Message M7 WPS: Received M7 WPS: Unexpected state (%d) for receiving M6 WPS: Building Message M6 WPS: Received M6 sha256 FT-FILS-SHA256 %sEAP-SHA256 %sWPA-EAP-SHA256 WPA2-EAP-SHA256 %sPSK-SHA256 %sWPA-PSK-SHA256 WPA2-PSK-SHA256 WPA: using KEY_MGMT 802.1X with SHA256 WPA: using KEY_MGMT PSK with SHA256 %sGCMP-256 %sCCMP-256 %sBIP-GMAC-256 WPA: using MGMT group cipher BIP-GMAC-256 %sBIP-CMAC-256 WPA: using MGMT group cipher BIP-CMAC-256 RSN: Derive PMKID using HMAC-SHA-256 WPS: Unexpected state (%d) for receiving M5 WPS: Building Message M5 WPS: Received M5 WPA: EAPOL-Key MIC using HMAC-MD5 Line %d: Invalid wpa_group_update_count=%lu; allowed range 1..4294967295 Line %d: Invalid wpa_pairwise_update_count=%lu; allowed range 1..4294967295 WPS: Unexpected state (%d) for receiving M4 WPS: Building Message M4 WPS: Received M4 WPA: Encrypt Key Data using RC4 WPA: Decrypt Key Data using RC4 FT-FILS-SHA384 Disable OFDM/HT/VHT/HE on channel 14 WEP104 WEP-104 WPA: Sending EAPOL-Key 4/4 RSN: No GTK KDE included in EAPOL-Key msg 3/4 P2P: Add IP Address Request KDE into EAPOL-Key 2/4 WPA: Sending EAPOL-Key 2/4 WPA: WPA IE for msg 2/4 WPA IE in msg 2/4 WPA IE from (Re)AssocReq did not match with msg 2/4 WPA: No wpa_ie set - cannot generate msg 2/4 Try to process received EAPOL-Key 4/4 based on old Replay Counter and SNonce from an earlier EAPOL-Key 1/4 Process SNonce update from STA based on retransmitted EAPOL-Key 1/4 RSN: No KCK available to derive PMKID for message 1/4 country3 wep_key3 gas_address3 WPS: Unexpected state (%d) for receiving M3 WPS: Building Message M3 WPS: Received M3 wep_key2 private_key2 client_cert2 server_cert2 ca_cert2 check_cert_subject2 vht_center_freq2 pin2 ca_path2 WPS: R-Hash2 WPS: * R-Hash2 WPS: E-Hash2 WPS: * E-Hash2 domain_suffix_match2 altsubject_match2 domain_match2 phase2 engine2 dh_file2 WPS: R-SNonce2 WPS: * R-SNonce2 WPS: E-SNonce2 WPS: * E-SNonce2 WPA: Nonce2 private_key_passwd2 ssid2 TTLS-MSCHAPV2 EAP: EAP entering state SEND_REQUEST2 EAP: EAP entering state RETRANSMIT2 EAP: EAP entering state SUCCESS2 WPS: R-S2 WPS: E-S2 WPA: %02x:%02x:%02x:%02x:%02x:%02x WPA_PTK entering state AUTHENTICATION2 WPS: Unexpected state (%d) for receiving M2 WPS: Building Message M2 WPS: Received M2 WPS: PSK2 WPA: %02x:%02x:%02x:%02x:%02x:%02x WPA_PTK entering state PTKCALCNEGOTIATING2 EAP: EAP entering state TIMEOUT_FAILURE2 EAP: EAP entering state FAILURE2 EAP: EAP entering state IDLE2 EAP: EAP entering state DISCARD2 EAP: EAP entering state RECEIVED2 allow in non-WPA/WPA2 WPS: Invalid key length %lu for WPA/WPA2 WPS: No suitable encryption type for WPA/WPA2 reject due to mismatch with WPA/WPA2 WPA2-EAP-SUITE-B-192 sha512 WPA: Sending EAPOL-Key 2/2 WPA: No GTK IE in Group Key msg 1/2 WPA: GCMP is used, but EAPOL-Key descriptor version (%d) is not 2 WPA: CCMP is used, but EAPOL-Key descriptor version (%d) is not 2 wep_key1 vht_center_freq1 Can not allocate memory for wps_vendor_ext_m1 Line %d: invalid wps_vendor_ext_m1 WPS: Cannot allocate memory for vendor_ext_m1 pbc_in_m1 WPS: R-Hash1 WPS: * R-Hash1 WPS: E-Hash1 WPS: * E-Hash1 phase1 WPS: R-SNonce1 WPS: * R-SNonce1 WPS: E-SNonce1 WPS: * E-SNonce1 WPA: Nonce1 sha1 WPS: R-S1 WPS: E-S1 WPS: * Vendor Extension M1 WPS: Unexpected state (%d) for receiving M1 WPS: Building Message M1 WPS: Received M1 WPS: PSK1 WPA: EAPOL-Key MIC using HMAC-SHA1 retry=1 no_offchannel_tx=1 only_new=1 allow_canned_success=1 vendor_elems=1 use_monitor=1 multi_ap=1 force_bss_selection=1 osen=1 use_p2p_group_interface=1 tod=1 force_connect_cmd=1 RTM_DELLINK: Interface '%s' removed - mark if_removed=1 CTRL-EVENT-DISCONNECTED bssid=%02x:%02x:%02x:%02x:%02x:%02x reason=%d locally_generated=1 pbc=1 /sys/class/net/%s/phy80211 nl80211 Linux nl80211/cfg80211 IEEE 802.11 RSN: Derive PMKID using HMAC-SHA-1 CTRL-EVENT-SCAN-FAILED ret=-1 wep_key0 \0 tx=0 P2P: Use freq %d MHz common with the peer and allowing VHT80 80+80 12345670 160 p2p_go_ht40 ht40 CCMP TKIP WEP104 WEP40 WEP-40 20 EAPOL: Ignore EAP packet with unknown code 10 00000000 RSN: using IEEE 802.11i/D9.0 WPA: using IEEE 802.11i/D3.0 WPS: STA supports WPS 2.0 WFA-SimpleConfig-Registrar-1-0 WFA-SimpleConfig-Enrollee-1-0 Beacon request: Duration is 0 P2P: Could not find any BSS with p2p_dev_addr %02x:%02x:%02x:%02x:%02x:%02x, hence override group_capab from 0x%x to 0 RSC %02x%02x%02x%02x%02x%02x%02x%02x is likely bogus, using 0 EAPOL: startWhen --> 0 IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x - reAuthWhen --> 0 IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x - quietWhile --> 0 IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x - (EAP) retransWhile --> 0 EAPOL: authWhile --> 0 EAPOL: idleWhile --> 0 EAPOL: heldWhile --> 0 IEEE 802.1X: %02x:%02x:%02x:%02x:%02x:%02x - aWhile --> 0 RSN: Could not allocate memory. Line %d: network block was not terminated properly. Line %d: cred block was not terminated properly. Could not generate random individual WEP key. Invalid BSSID mask %02x:%02x:%02x:%02x:%02x:%02x for start address %02x:%02x:%02x:%02x:%02x:%02x. SSL: Failed to initialize TLS context. Failed to allocate EAPOL context. Failed to allocate WPA context. Authentication with %02x:%02x:%02x:%02x:%02x:%02x timed out. Line %d: failed to add network block to priority list. Could not remove STA %02x:%02x:%02x:%02x:%02x:%02x from list. RRM: Currently handling previous Neighbor Report. RRM: No network support for Neighbor Report. Failed to initialize P2P random MAC address. Restore last used MAC address. Failed to initialize EAPOL state machines. Failed to configure WPA IE for the kernel driver. EAPOL: Failed to set WEP key to the driver. WPA: Failed to select pairwise cipher. Could not set WEP encryption. Could not set individual WEP encryption. RRM: No RRM in current connection. Failed to get random data for WPA initialization. You may need to add support for this EAP method during wpa_supplicant build time configuration. See README for more information. Line %d: failed to parse network block. Line %d: failed to parse cred block. WPA: wpa_auth_release_group called more often than wpa_auth_ensure_group for VLAN ID %d, skipping. Could not open configuration file '%s' for reading. Skip stop_listen since not in listen_only state. Two or more EAP methods used the same EAP type. %s: Setup of interface done. Failed to prepare rates table. Failed to allocate memory for rate table. WPA: Failed to get random data for ANonce. %s: Unable to setup interface. Line %d: failed to parse password. MAC list file '%s' not found. EAP user file '%s' not found. WPA PSK file '%s' not found. No configuration found. Failed to read new configuration file - continuing with old. EAP user file in SQLite DB, but CONFIG_SQLITE was not enabled in the build. Fetching hardware channel/rate support not supported. WPA-PSK enabled, but PSK or passphrase is not configured. Line %d: no key_mgmt values configured. Line %d: no cipher values configured. Line %d: no proto values configured. Line %d: no auth_alg values configured. Line %d: both PSK and passphrase configured. Interface name is required. WPA-PSK setup failed. %s driver initialization failed. PMKSA cache initialization failed. IEEE 802.1X initialization failed. ACL initialization failed. WPA initialization failed. IEEE 802.11F (IAPP) initialization failed. WPA-PSK using RADIUS enabled, but no RADIUS checking (macaddr_acl=2) enabled. Failed to set TX queue parameters for queue %d. Failed to allocate memory for configuration data. RRM: No connection, no RRM. Could not generate WPA IE. Daemonize.. Line %d: not allowed group management cipher (0x%x). Line %d: not allowed group cipher (0x%x). Line %d: not allowed pairwise cipher (0x%x). Start address must be the first address in the block (i.e., addr AND mask == addr). Invalid IEEE 802.1X configuration (no EAP authenticator configured). Could not set station %02x:%02x:%02x:%02x:%02x:%02x flags for kernel driver (errno=%d). No rates remaining in supported/basic rate sets (%d,%d). Invalid group cipher (%d). Invalid pairwise cipher (%d). Invalid key management type (%d). SSL: Failed to initialize TLS context (2). Line %d: Invalid BSSID hint '%s'. Line %d: Invalid GO P2P Device Address '%s'. Line %d: failed to parse %s '%s'. Line %d: invalid cipher '%s'. Line %d: invalid quotation '%s'. Failed to read or parse configuration '%s'. Line %d: invalid field '%s' string value '%s'. Line %d: failed to parse '%s'. Line %d: Invalid configuration line '%s'. Line %d: Invalid cred line '%s'. Line %d: Invalid SSID line '%s'. Too long interface name '%s'. Too long bridge interface name '%s'. Failed to get absolute path for configuration file '%s'. Duplicate BSSID %02x:%02x:%02x:%02x:%02x:%02x on interface '%s' and '%s'. Line %d: unknown global field '%s'. Line %d: unknown network field '%s'. Line %d: unknown cred field '%s'. Line %d: Too long WEP key %d '%s'. Line %d: Invalid WEP key %d '%s'. Line %d: Invalid PSK '%s'. Line %d: Invalid BSSID '%s'. Line %d: invalid EAPOL version (%d): '%s'. Line %d: Invalid passphrase length %lu (expected: 8..63) '%s'. p2p-dev- [%s- p2p- NEXT- DIRECT- CTRL-RSP- P2P- ID- STA- , + * P2P: Send Provision Discovery Request prior to joining an existing group (GO %02x:%02x:%02x:%02x:%02x:%02x freq=%u MHz) P2P: Trying to force us to use the requested channel (%u MHz) P2P: New freq selected for the GO (%u MHz) Trying to associate with %02x:%02x:%02x:%02x:%02x:%02x (SSID='%s' freq=%d MHz) nl80211: Start radar detection (CAC) %d MHz (ht_enabled=%d, vht_enabled=%d, he_enabled=%d, bandwidth=%d MHz, cf1=%d MHz, cf2=%d MHz) nl80211: Set freq %d (ht_enabled=%d, vht_enabled=%d, he_enabled=%d, bandwidth=%d MHz, cf1=%d MHz, cf2=%d MHz) %s: register ap_handle_timer timeout for %02x:%02x:%02x:%02x:%02x:%02x (%d seconds - ap_max_inactivity) %s: %s: reschedule ap_handle_timer timeout for %02x:%02x:%02x:%02x:%02x:%02x (%d seconds - ap_max_inactivity) P2P: Add operating class %u (client only) P2P: Channels (client only) WPA: Failed to set GTK to the driver (Group only) (PTP only) (PTMP only) EAP-WSC: Sending out %lu bytes (message sent completely) authentication OK (shared key) nl80211: Driver does not support setting Beacon frame rate (legacy) nl80211: Ignored event %d (%s) for foreign interface (ifindex %d wdev 0x%llx) %s: Unsupported management group cipher 0x%x (%08x) %s: invalid group cipher 0x%x (%08x) nl80211: Freq survey dump event (freq=%d MHz noise=%d channel_time=%ld busy_time=%ld tx_time=%ld rx_time=%ld filled=%04x) TS was deleted successfully (tsid=%u address=%02x:%02x:%02x:%02x:%02x:%02x) Not associated - Delay processing of received EAPOL frame (state=%s bssid=%02x:%02x:%02x:%02x:%02x:%02x) WPA: Failed to set PTK to the driver (alg=%d keylen=%d bssid=%02x:%02x:%02x:%02x:%02x:%02x) WPA: ANonce from message 1 of 4-Way Handshake differs from 3 of 4-Way Handshake - drop packet (src=%02x:%02x:%02x:%02x:%02x:%02x) WPA: %s (src=%02x:%02x:%02x:%02x:%02x:%02x) WPA: Invalid %s key length %d (src=%02x:%02x:%02x:%02x:%02x:%02x) Failed to add BSS (BSSID=%02x:%02x:%02x:%02x:%02x:%02x) MLME-DELETEKEYS.request(%02x:%02x:%02x:%02x:%02x:%02x) MLME-MichaelMICFailure.indication(%02x:%02x:%02x:%02x:%02x:%02x) MLME-REASSOCIATE.indication(%02x:%02x:%02x:%02x:%02x:%02x) MLME-ASSOCIATE.indication(%02x:%02x:%02x:%02x:%02x:%02x) WPS: MAC Address in the AP Settings (%02x:%02x:%02x:%02x:%02x:%02x) does not match with own address (%02x:%02x:%02x:%02x:%02x:%02x) WPS: MAC Address in the Credential (%02x:%02x:%02x:%02x:%02x:%02x) does not match with own address (%02x:%02x:%02x:%02x:%02x:%02x) WPS: * MAC Address (%02x:%02x:%02x:%02x:%02x:%02x) nl80211: Clear possible state mismatch (%02x:%02x:%02x:%02x:%02x:%02x) P2P: Update target GO device address based on BSS entry: %02x:%02x:%02x:%02x:%02x:%02x (was %02x:%02x:%02x:%02x:%02x:%02x) Ignore WPS registration success notification for %02x:%02x:%02x:%02x:%02x:%02x (GO Negotiation peer %02x:%02x:%02x:%02x:%02x:%02x) P2P: Storing credentials for a persistent group (GO Dev Addr %02x:%02x:%02x:%02x:%02x:%02x) nl80211: Ignore port authorized event for %02x:%02x:%02x:%02x:%02x:%02x (not the currently connected BSSID %02x:%02x:%02x:%02x:%02x:%02x) Do not update peer entry based on old frame (rx_time=%u.%06u last_seen=%u.%06u flags=0x%x) Station tried to associate before authentication (aid=%d flags=0x%x) Unsupported config methods in Provision Discovery Request (own=0x%x peer=0x%x) WPA: EAPOL-Key MIC algorithm not known (AKM-defined - akmp=0x%x) WPS: * Encryption Type Flags (0x%x) WPS: * Authentication Type Flags (0x%x) Invalid group management cipher (0x%x) WPS: * Encryption Type (0x%x) WPS: * Authentication Type (0x%x) %s=%d (0x%x) WPS: * Multi-AP (0x%x) WPS: * Version2 (0x%x) Send pending Provision Discovery Request to %02x:%02x:%02x:%02x:%02x:%02x (config methods 0x%x) Busy with other operations; postpone Provision Discovery Request with %02x:%02x:%02x:%02x:%02x:%02x (config methods 0x%x) WPS: No match in supported encryption types (own 0x%x Enrollee 0x%x) WPS: No match in supported authentication types (own 0x%x Enrollee 0x%x) WPS: * Selected Registrar Config Methods (%x) WPS: * Config Methods (%x) WPS: * RF Bands (%x) %s: Drop duplicate RX(prev) Off-channel: Failed to allocate Action frame TX buffer (len=%llu) nl80211: Probe client event (addr=%02x:%02x:%02x:%02x:%02x:%02x ack=%d cookie=%llu) WPA: AES-WRAP key data too long (keydatalen=%lu maxkeylen=%lu) EAP: Ignored truncated expanded EAP-Packet (plen=%lu) EAP: Ignored truncated EAP-Packet (len=%lu plen=%lu) nl80211: Failed to allocate EAPOL buffer(len=%lu) malloc() failed for ieee802_1x_send(len=%lu) EAPOL: Successfully fetched key (len=%lu) IEEE 802.11: Too short SA Query Action frame (len=%lu) EAPOL: Requested key length (%lu) not available (len=%lu) short vendor specific information element ignored (len=%lu) short WMM information element ignored (len=%lu) WMM AC: Short ADDTS response ignored (len=%lu) handle_action - too short payload (len=%lu) handle_beacon - too short payload (len=%lu) handle_deauth - too short payload (len=%lu) handle_auth - too short payload (len=%lu) handle_disassoc - too short payload (len=%lu) handle_auth_cb - too short payload (len=%lu) handle_assoc(reassoc=%d) - too short payload (len=%lu) handle_assoc_cb(reassoc=%d) - too short payload (len=%lu) * FILS ERP rRK (len=%lu) Too short WMM IE (len=%lu) RSN: Too long GTK in GTK IE (len=%lu) SUPP: %s(dest=%02x:%02x:%02x:%02x:%02x:%02x proto=0x%04x len=%lu) unknown vendor specific information element ignored (vendor OUI %02x:%02x:%02x len=%lu) WPA: Sending EAPOL-Key Request (error=%d pairwise=%d ptk_set=%d len=%lu) unknown WMM information element ignored (subtype=%d len=%lu) WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=%d len=%lu) Unknown Microsoft information element ignored (type=%d len=%lu) Unknown Broadcom information element ignored (type=%d len=%lu) Unknown WFA information element ignored (type=%d len=%lu) Unknown QCA information element ignored (type=%d len=%lu) WPA: Too short maxkeylen (%lu) WPA: RC4 key data too long (%lu) WPA: EAPOL frame too short to be a WPA EAPOL-Key (len %lu, expecting at least %lu) RSN: EAPOL frame payload size %lu invalid (frame size %lu) WPA: EAPOL frame payload size %lu invalid (frame size %lu) WPA: Invalid EAPOL-Key frame - key_data overflow (%d > %lu) Ignore old scan result for %02x:%02x:%02x:%02x:%02x:%02x (rx_time=%u.%06u find_start=%u.%06u) Peer found with Listen frequency %d MHz (rx_time=%u.%06u) GAS: No response to comeback request received (retry=%u) GAS: Received comeback response from %02x:%02x:%02x:%02x:%02x:%02x (dialog_token=%u frag_id=%u more_frags=%u comeback_delay=%u) GAS: Received initial response from %02x:%02x:%02x:%02x:%02x:%02x (dialog_token=%u comeback_delay=%u) New scan results available (own=%u ext=%u) BSS Load: Invalid BSS load update configuration (period=%u beacon_int=%u) nl80211: Frame command failed: ret=%d (%s) (freq=%u wait=%u) Try to schedule a radio work (num_active_works=%u) Unexpected listen callback for freq=%u duration=%u (pending_listen_freq=%u) Off-channel: Pending Action frame TX waiting for another freq=%u (off_channel_freq=%u assoc_freq=%u) WPS: Network configuration replaced - try to associate with the received credential (freq=%u) Driver ended Listen state (freq=%u) P2P: Schedule new radio work for Action frame TX (listen_freq=%d send_freq=%d freq=%u) P2P: remain-on-channel callback (off_channel_freq=%u pending_listen_freq=%d roc_waiting_drv_freq=%d freq=%u duration=%u) P2P: Ignore remain-on-channel callback (off_channel_freq=%u pending_listen_freq=%d freq=%u duration=%u) Ignored too long SSID element (elen=%u) IEEE 802.11 element parsing ignored unknown element extension (ext_id=%u elen=%u) WPS: * Network Key (len=%u) WPS: Ignore too long Device Name (len=%u) Too short vendor specific IE ignored (len=%u) * FILS KEK (len=%u) WPS: Ignore too long SSID (len=%u) WPA: PMK from EAPOL state machine (MSK len=%lu PMK len=%u) Determining HT/VHT options based on driver capabilities (freq=%u chan=%u) Peer does not support selected operating channel (reg_class=%u channel=%u) Unknown operational channel (country=%c%c reg_class=%u channel=%u) nl80211: Set %s ACL (num_mac_acl=%u) P2P: * Feature Cap (length=%u) P2P: Clear Action TX work @%p (wait_time=%u) P2P: Free Action frame radio work @%p (freq=%u dst=%02x:%02x:%02x:%02x:%02x:%02x src=%02x:%02x:%02x:%02x:%02x:%02x bssid=%02x:%02x:%02x:%02x:%02x:%02x wait_time=%u) Add service info for %s (adv_id=%u) scan plan %u: Too many iterations(%u), use the maximum allowed(%u) scan plan %u: Scan interval too long(%u), use the maximum allowed(%u) WPS: Too long Vendor Extension (%u) WPS: * AP Channel (%u) Too many bits in the BSSID mask (%u) WPA: MSK not long enough (%u) to create PMK (%u) P2P: Invitation from peer %02x:%02x:%02x:%02x:%02x:%02x was rejected (status %u) nl80211: Packet loss event for %02x:%02x:%02x:%02x:%02x:%02x (num_packets %u) WPA/RSN information element rejected? (res %u) WPA: Use EAPOL-Key timeout of %u ms (retry counter %u) Starting search (+ freq %u) wpa_sta_disconnect STA %02x:%02x:%02x:%02x:%02x:%02x (reason %u) Determining shared radio frequencies (max len %u) P2P: Too short Connection Capability (length %u) P2P: Too short Feature Capability (length %u) P2P: Invalid Persistent Group Info (length %u) P2P: Too short Session ID Info (length %u) P2P: Too short Service Hash (length %u) P2P: Too short Service Instance (length %u) P2P: Too short Advertisement ID (length %u) WPA: Decrypt Key Data using AES-UNWRAP (KEK length %u) WPA: Encrypt Key Data using AES-WRAP (KEK length %u) Unprotected Disassociation frame dropped: %02x:%02x:%02x:%02x:%02x:%02x -> %02x:%02x:%02x:%02x:%02x:%02x (reason code %u) Unprotected Deauthentication frame dropped: %02x:%02x:%02x:%02x:%02x:%02x -> %02x:%02x:%02x:%02x:%02x:%02x (reason code %u) Reenable 4-address WDS mode for STA %02x:%02x:%02x:%02x:%02x:%02x (aid %u) Enable 4-address WDS mode for STA %02x:%02x:%02x:%02x:%02x:%02x (aid %u) Ignore Device Discoverability Response with unexpected dialog token %u (expected %u) Ignore Provision Discovery Response with unexpected Dialog Token %u (expected %u) Unexpected Dialog Token %u (expected %u) WPS: Unknown Vendor Extension (Vendor ID %u) WPA: Invalid EAPOL-Key frame - key_data overflow (%u > %u) nl80211: CQM TXE event for %02x:%02x:%02x:%02x:%02x:%02x (rate: %u pkts: %u interval: %u) short information element (Ext) Starting sched scan after %u seconds (no timeout) (SSID list) (request) nl80211: Enable multi-channel concurrent (driver advertised support) nl80211: Use separate P2P group interface (driver advertised support) EAP: retransmit timeout %d seconds (from EAP method hint) %s: ie too short (for key mgmt) nl80211: Driver-advertised extended capabilities (default) nl80211: Driver-advertised extended capabilities mask (default) P2P: Starting pending join-existing-group operation (no ACK for PD Req attempts) WPA: Failed to set WPA key management and encryption suites (no scan results) Line %d: Invalid password hash length (expected 32 hex digits) BSS count %lu, BSSID mask %02x:%02x:%02x:%02x:%02x:%02x (%d bits) Line %d: invalid WEP key len %d (= %d bits) (success) CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully (based on lower layer success) * beacon_rate = legacy:%u (* 100 kbps) WPS: Skipped Vendor Extension attribute (max %d vendor extensions) P2P: * Configuration Timeout: GO %d (*10ms) client %d (*10ms) WPS: Skipped Credential attribute (max %d credentials) No enabled networks (%d disabled networks) RSN: Too short IE buffer (%lu bytes) WPS: Skipped Requested Device Type attribute (max %u types) %s: ie too short (for capabilities) nl80211: Received scan results (%lu BSSes) %s: register ap_handle_timer timeout for %02x:%02x:%02x:%02x:%02x:%02x (%lu seconds) RRM: Ignore scan result for %02x:%02x:%02x:%02x:%02x:%02x due to old update (age(ms) %u, calculated age %u.%06u seconds) WPA: Start PTK rekeying timer for %02x:%02x:%02x:%02x:%02x:%02x (%d seconds) HT: Start 20->40 MHz transition timer (%d seconds) System resume notification (slept %d seconds) P2P: * Service Hash(s) skip - disabled temporarily for %d second(s) Selected network is temporarily disabled for %d second(s) Disassociation frame IE(s) Deauthentication frame IE(s) key_info 0x%x (ver=%d keyidx=%d rsvd=%d %s%s%s%s%s%s%s%s) 20/40 BSS Coexistence Information field: 0x%x (%s%s%s%s%s%s) RTM_NEWLINK: ifi_index=%d ifname=%s%s ifi_family=%d ifi_flags=0x%x (%s%s%s%s) RTM_DELLINK: ifi_index=%d ifname=%s%s ifi_family=%d ifi_flags=0x%x (%s%s%s%s) New last_update: %u.%06u (freq %d%s) Previous last_update: %u.%06u (freq %d%s) EAP: Status notification: %s (param=%s) authentication reply: STA=%02x:%02x:%02x:%02x:%02x:%02x auth_alg=%d auth_transaction=%d resp=%d (IE len=%lu) (dbg=%s) Action frame TX callback (state=%d freq=%u dst=%02x:%02x:%02x:%02x:%02x:%02x src=%02x:%02x:%02x:%02x:%02x:%02x bssid=%02x:%02x:%02x:%02x:%02x:%02x result=%d p2p_state=%s) Clear timeout (state=%s) Timeout (state=%s) Starting short listen state (state=%s) nl80211: Interface up (%s/%s) nl80211: Interface down (%s/%s) %s(%s) Timing out external radio work %u (%s) Flushing%s external radio work %u (%s) Starting external radio work %u (%s) Completed external radio work %u (%s) EAP: Failed to initialize EAP method: vendor %u method %u (%s) EAP: Initialize selected EAP method: vendor %u method %u (%s) Operation in progress - skip Extended Listen timeout (%s) nl80211: Failed to allocate netlink callbacks (%s) nl80211: Regulatory information - country=%s (%s) nl80211: Unsubscribe mgmt frames handle %p (%s) %s: free hapd %p (%s) nl80211: Failed to connect to generic netlink (%s) Skip Extended Listen timeout in active state (%s) received EAPOL-Key frame (%s) group key handshake completed (%s) pairwise key handshake completed (%s) nl80211: Set %s operstate %d->%d (%s) nl80211: MLME command failed: reason=%u ret=%d (%s) Failed to request a scan of neighboring BSSes ret=%d (%s) nl80211: MLME command failed (auth): count=%d ret=%d (%s) nl80211: Client probe request for %02x:%02x:%02x:%02x:%02x:%02x failed: ret=%d (%s) nl80211: Sched scan start failed: ret=%d (%s) nl80211: MLME connect failed: ret=%d (%s) nl80211: Set TX rates failed: ret=%d (%s) nl80211: Scan trigger failed: ret=%d (%s) nl80211: Sched scan stop failed: ret=%d (%s) nl80211: Abort scan failed: ret=%d (%s) nl80211: wait cancel failed: ret=%d (%s) nl80211: Station flush failed: ret=%d (%s) nl80211: Scan result fetch failed: ret=%d (%s) nl80211: External Auth status update failed: ret=%d (%s) nl80211: Register beacons command failed: ret=%d (%s) nl80211: Update connect params command failed: ret=%d (%s) nl80211: Join IBSS failed: ret=%d (%s) nl80211: Leave IBSS failed: ret=%d (%s) nl80211: Set PMK failed: ret=%d (%s) nl80211: Register spurious class3 failed: ret=%d (%s) nl80211: Register frame command failed (type=%u): ret=%d (%s) nl80211: MLME command failed (assoc): ret=%d (%s) nl80211: del_ts failed err=%d (%s) nl80211: add_ts failed err=%d (%s) nl80211: update_ft_ies failed err=%d (%s) nl80211: switch_channel failed err=%d (%s) nl80211: update_dh_ie failed err=%d (%s) WPS-FAIL msg=%d config_error=%d reason=%d (%s) netlink: Operstate: ifindex=%d linkmode=%d (%s), operstate=%d (%s) CTRL_IFACE: GET_PREF_FREQ_LIST iface_type=%d (%s) nl80211: Create interface iftype %d (%s) nl80211: Set mode ifindex %d iftype %d (%s) nl80211: sta_remove -> DEL_STATION %s %02x:%02x:%02x:%02x:%02x:%02x --> %d (%s) nl80211: NL80211_CMD_%s_STATION result: %d (%s) nl80211: Could not add multicast membership for regulatory events: %d (%s) nl80211: Could not re-add multicast membership for %s events: %d (%s) nl80211: Could not add multicast membership for vendor events: %d (%s) nl80211: Could not add multicast membership for scan events: %d (%s) nl80211: Could not add multicast membership for mlme events: %d (%s) Failed to create interface %s: %d (%s) nl80211: Failed to start radar detection: %d (%s) nl80211: Failed to cancel remain-on-channel: %d (%s) nl80211: Failed to set STA flag: %d (%s) Supplicant used different EAP type: %d (%s) authentication failed - EAP type: %d (%s) nl80211: Frequency set failed: %d (%s) nl80211: Beacon set failed: %d (%s) nl80211: Setting PS state %s failed: %d (%s) nl80211: NL80211_CMD_SET_PMKSA failed: %d (%s) nl80211: NL80211_CMD_DEL_PMKSA failed: %d (%s) i802_send_eapol - packet len: %lu - failed: %d (%s) nl80211: NL80211_ATTR_STA_VLAN (addr=%02x:%02x:%02x:%02x:%02x:%02x ifname=%s vlan_id=%d) failed: %d (%s) nl80211: Failed to set interface %d to mode %d: %d (%s) nl80211: Failed to set fragmentation threshold %d: %d (%s) nl80211: Failed to set RTS threshold %d: %d (%s) nl80211: Failed to set MAC ACL: %d (%s) nl80211: Failed to request remain-on-channel (freq=%d duration=%u): %d (%s) nl80211: Failed to set channel (freq=%d): %d (%s) P2P: * Session Info Data (%s) nl80211: NL80211_CMD_SET_TX_BITRATE_MASK (ifindex=%d %s) nl80211: set_key failed; err=%d %s) nl80211: set_key default failed; err=%d %s) P2P: Join target GO operating frequency from BSS table: %d MHz (SSID %s) P2P: Target GO operating frequency from BSS table: %d MHz (SSID %s) P2P: Join target GO (SSID %s) (DFS state = %s) %s called (CAC active: %s, CSA active: %s) nl80211: %s 4addr mode (bridge_ifname: %s) P2P: Invitation from %02x:%02x:%02x:%02x:%02x:%02x to join an active group (SSID: %s) MLME-AUTHENTICATE.indication(%02x:%02x:%02x:%02x:%02x:%02x, %s) (no outdoor) (no indoor) Removed BSSID %02x:%02x:%02x:%02x:%02x:%02x from blacklist (clear) Use only the first %u scan plans, and the last one (in infinite loop) Off-channel: Dropped pending Action frame TX to %02x:%02x:%02x:%02x:%02x:%02x (pending_action_tx=%p) Off-channel: Sending pending Action frame to %02x:%02x:%02x:%02x:%02x:%02x using interface %s (pending_action_tx=%p) Off-channel: Delete matching pending action frame (dst=%02x:%02x:%02x:%02x:%02x:%02x pending_action_tx=%p) Off-channel: Stored pending action frame (dst=%02x:%02x:%02x:%02x:%02x:%02x pending_action_tx=%p) P2P: Cancel remain-on-channel callback (p2p_long_listen=%d ms pending_action_tx=%p) nl80211: Mgmt reporting already on! (nl_mgmt=%p) nl80211: Connect handle already created (nl_connect=%p) AUTH: %s (addr=%02x:%02x:%02x:%02x:%02x:%02x prev_psk=%p) %s(%p) WPS: No Device Password available for the Enrollee (context %p registrar %p) (unknown) P2P: Set GO freq %d MHz (no preference known) WPS: Authorized MACs union (start with own) (pre-authentication) (auto_join) P2P: Current BSS entry for peer updated at %ld.%06ld (%supdated in last scan) Starting search (pending full scan) authentication OK (open system) nl80211: flush -> DEL_STATION %s (all) Off-channel: Already on requested channel (TX interface operating channel) (local) TX EAPOL (preauth) (finish) (match) (p2p_in_provisioning) PSK (set in config) Hardware does not support configured mode (%d) (hw_mode in hostapd.conf) WPS: Clear consecutive AP PIN failure counter - total validation failures %u (%u consecutive) WPS: AP PIN authentication failure number %u (%u consecutive) (initiate) (response) PSK (from passphrase) PSK (ASCII passphrase) (failure) RX EAPOL from %02x:%02x:%02x:%02x:%02x:%02x to %02x:%02x:%02x:%02x:%02x:%02x (bridge - not for this interface - ignore) EAP: Workaround for unexpected identifier field in EAP Success: reqId=%d lastId=%d (these are supposed to be same) (PMKSA cache) RX EAPOL from %02x:%02x:%02x:%02x:%02x:%02x to %02x:%02x:%02x:%02x:%02x:%02x (bridge) (unknown code) * aid=1 (%s workaround) EAP-WSC: Sending out %lu bytes (%lu more to send) skip - scan result not recent enough (%u.%06u seconds too old) Single Channel Survey: (freq=%d channel_time=%ld channel_time_busy=%ld) Line %d: too long %s (len=%lu max_len=%ld) Line %d: too short %s (len=%lu min_len=%ld) Line %d: too large %s (value=%d max_value=%ld) Line %d: too small %s (value=%d min_value=%ld) WMM AC: param %s (%ld) is out of range (%ld-%ld) (fixed) EAP: Building EAP-Nak (requested type %u vendor=%u method=%u not allowed) key_id (reserved) Too many scheduled scan plans (only %u supported) netlink: Sending operstate IFLA failed: %s (assume operstate is not supported) (started) Line %d: invalid required_roaming_consortium length %d (3..15 expected) Line %d: invalid roaming_consortium length %d (3..15 expected) WPS: * AP Settings (pre-configured) WPS: * Credential (pre-configured) CSA failed (%s was stopped) (P2P disabled) (forced) nl80211: proberesp (offload) SUPP: %s(alg=%d addr=%02x:%02x:%02x:%02x:%02x:%02x key_idx=%d set_tx=%d) nl80211: Connect (ifindex=%d) nl80211: Update connection params (ifindex=%d) nl80211: Remove beacon (ifindex=%d) nl80211: Associate (ifindex=%d) nl80211: Authenticate (ifindex=%d) nl80211: Join IBSS (ifindex=%d) did not Ack EAPOL-Key frame (%scast index=%d) IEEE 802.1X: Sending EAPOL-Key to %02x:%02x:%02x:%02x:%02x:%02x (%s index=%d) WPA: Not reinstalling already in-use IGTK to the driver (keyidx=%d) Failed to clear default mgmt encryption keys (ifname=%s keyidx=%d) Failed to clear default encryption keys (ifname=%s keyidx=%d) WPA: Failed to set GTK to the driver (alg=%d keylen=%d keyidx=%d) Failed to remove interface (ifidx=%d) AUTH: %s(alg=%d addr=%02x:%02x:%02x:%02x:%02x:%02x key_idx=%d) AUTH: %s(alg=%d key_idx=%d) nl80211: set_p2p_powersave (legacy_ps=%d opp_ps=%d ctwindow=%d) WPS: A new PIN configured (timeout=%d) WPS: Enabling AP PIN (timeout=%d) %s(hapd=%p (%s), first=%d) AUTH: %s(addr=%02x:%02x:%02x:%02x:%02x:%02x data_len=%lu encrypt=%d) %s: SA Query timer for STA %02x:%02x:%02x:%02x:%02x:%02x (count=%d) WPS: * AuthorizedMACs (count=%d) EAP: retransmit timeout %d seconds (from dynamic back off; retransCount=%d) skip - blacklisted (count=%d limit=%d) P2P: Attribute underflow (len=%u left=%d) %s: PMKID underflow (num_pmkid=%u left=%d) nl80211: Set beacon (beacon_set=%d) nl80211: Sched scan requested (ret=%d) nl80211: Connect event (status=%u ignore_next_local_disconnect=%d) Limit connection to BSSID %02x:%02x:%02x:%02x:%02x:%02x freq=%u MHz based on scan results (bssid_set=%d wps=%d) WPA: EAPOL-Key Key Data underflow (ie=%d len=%d pos=%d) Use normal scan instead of sched_scan for initial scans (normal_scans=%d) hardware does not support required rate %d.%d Mbps (freq=%d mode==%d num_rates=%d) Failed to parse WPA/RSN IE from %02x:%02x:%02x:%02x:%02x:%02x (res=%d) EAPOL: Could not get enough master key data for decrypting EAPOL-Key keys (res=%d) WPA: RX message 1 of Group Key Handshake from %02x:%02x:%02x:%02x:%02x:%02x (ver=%d) WPA: RX message 3 of 4-Way Handshake from %02x:%02x:%02x:%02x:%02x:%02x (ver=%d) WPA: RX message 1 of 4-Way Handshake from %02x:%02x:%02x:%02x:%02x:%02x (ver=%d) WPA: EAPOL-Key MIC algorithm not known (ver=%d) WPA: Send EAPOL(version=%d secure=%d mic=%d ack=%d install=%d pairwise=%d kde_len=%lu keyidx=%d encr=%d) Received GO Negotiation Request from %02x:%02x:%02x:%02x:%02x:%02x(freq=%d) Received Device Discoverability Request from %02x:%02x:%02x:%02x:%02x:%02x (freq=%d) Received Invitation Request from %02x:%02x:%02x:%02x:%02x:%02x (freq=%d) Received GO Negotiation Response from %02x:%02x:%02x:%02x:%02x:%02x (freq=%d) Received Provision Discovery Request from %02x:%02x:%02x:%02x:%02x:%02x with config methods 0x%x (freq=%d) Timeout getting ADDTS response (tsid=%d up=%d) Could not set station %02x:%02x:%02x:%02x:%02x:%02x flags for kernel driver (errno=%d) Ignore local driver frequency preference %u MHz since it is not acceptable for P2P use (go=%d) WMM AC: TS setup request (addr=%02x:%02x:%02x:%02x:%02x:%02x tsid=%u user priority=%u direction=%d) IEEE 802.11 element parse ignored unknown element (id=%d elen=%d) IEEE 802.11 element parse ignored MB IE (id=%d elen=%d) Send GAS Comeback Response (frag_id %d more=%d frag_len=%d) SUPP: %s(type=%d data_len=%d) WPS: * Network Key (len=%d) Received GAS Initial Response from %02x:%02x:%02x:%02x:%02x:%02x (len=%d) Received GAS Comeback Response from %02x:%02x:%02x:%02x:%02x:%02x (len=%d) WPA: Installing GTK to the driver (keyidx=%d tx=%d len=%d) WPA: Not reinstalling already in-use GTK to the driver (keyidx=%d tx=%d len=%d) Cannot determine operating class and channel (freq=%u chanwidth=%d sec_channel=%d) Add associated STA %02x:%02x:%02x:%02x:%02x:%02x (added_unassoc=%d auth_alg=%u ft_over_ds=%u reassoc=%d authorized=%d ft_tk=%d fils_tk=%d) nl80211: Send Action frame (ifindex=%d, freq=%u MHz wait=%d ms no_cck=%d) nl80211: Action TX status: cookie=0x%llx%s (ack=%d) EAPOL: Invalid key data length %d (key_length=%d) p2p_scan timeout (running=%d) Auto connect enabled: try to reconnect (wps=%d/%d wpa_state=%d) SUPP: %s(addr=%02x:%02x:%02x:%02x:%02x:%02x protection_type=%d key_type=%d) Starting find (type=%d) Off-channel: Send Action callback (without_roc=%d pending_action_tx=%p pending_action_tx_done=%d) skip - WPS AP without active PIN Registrar (scan_runs=%d age=%d) WPS: Processing received message (len=%lu op_code=%d) %s(reason_code=%d) %s(addr=%02x:%02x:%02x:%02x:%02x:%02x reason_code=%d) nl80211: Ignored unknown event (cmd=%d) nl80211: %s[%d]: set_sta_vlan(%02x:%02x:%02x:%02x:%02x:%02x, ifname=%s[%d], vlan_id=%d) EAP: Building EAP-Success (id=%d) EAP: Building EAP-Failure (id=%d) P2P: Use specific SSID for scan during P2P group formation (p2p_in_provisioning=%d show_group_started=%d) invalid frequency for channel switch (freq=%d, sec_channel_offset=%d, vht_enabled=%d, he_enabled=%d) WPS: Internal Registrar selected (pbc=%d) nl80211: Channel switch request (cs_count=%u block_tx=%u freq=%d width=%d cf1=%d cf2=%d) Enable HT support (p2p_group=%d 11a=%d ht40_hw_capab=%d ssid->ht40=%d) no more room for new STAs (%d/%d) Invalid TX queue cwMin/cwMax values. cwMin(%d) greater than cwMax(%d) Invalid WMM AC cwMin/cwMax values. cwMin(%d) greater than cwMax(%d) %d(%d) P2P: * Feature Capability (%d) received EAP packet (code=%d id=%d len=%d) from STA: EAP Response-%s (%d) WPS: * Configuration Error (%d) Unknown authentication transaction number (%d) Clear drv_in_listen (%d) Unsupported authentication algorithm (%d) Too large Listen Interval (%d) interface status ifindex %d mismatch (%d) WPS: * Wi-Fi Protected Setup State (%d) WPS: * Response Type (%d) WPS: * Message Type (%d) nl80211: received invalid radiotap frame (%d) WPA: Unsupported %s Group Cipher key length %d (%d) WMM AC: TSID %i already exists on different ac (%d) WPS: * Device Password ID (%d) nl80211: Unexpected beacon event? (%d) Could not select hw_mode and channel. (%d) EAP: processing NAK (current EAP method index %d) Failed to request a scan of neighboring BSSes ret=%d (%s) - try to scan again (attempt %d) skip - PBSS mismatch (ssid %d bss %d) Sending EAP Packet (identifier %d) Sending canned EAP packet %s (identifier %d) Sending Device Discoverability Response to %02x:%02x:%02x:%02x:%02x:%02x (status %u freq %d) GAS Initial Request from %02x:%02x:%02x:%02x:%02x:%02x (dialog token %u, freq %d) nl80211: Add own interface ifindex %d (ifidx_reason %d) authentication (shared key, transaction %d) P2P: Invalid Device Name length %u (buf len %d) Update Listen frequency based on scan results (%02x:%02x:%02x:%02x:%02x:%02x %d -> %d MHz (DS param %d) P2P: Too short Capability attribute (length %d) P2P: Too short Manageability attribute (length %d) P2P: Too short Configuration Timeout attribute (length %d) P2P: Too short Channel List attribute (length %d) P2P: Too short GO Intent attribute (length %d) P2P: Too short Status attribute (length %d) P2P: Too short Intended P2P Interface Address attribute (length %d) P2P: Too short Device Info attribute (length %d) P2P: Too short Listen Channel attribute (length %d) P2P: Too short Operating Channel attribute (length %d) P2P: Too short OOB GO Neg Channel attribute (length %d) P2P: Too short Extended Listen Timing attribute (length %d) P2P: Too short Invitation Flag attribute (length %d) P2P: Too short Minor Reason Code attribute (length %d) P2P: Too short Notice of Absence attribute (length %d) P2P: Too short P2P Group BSSID attribute (length %d) P2P: Too short Device ID attribute (length %d) P2P: Skipped unknown attribute %d (length %d) associated (aid %d) association OK (aid %d) EAP-WSC: Unexpected Op-Code %d in fragment (expected %d) RRM: Discarding neighbor report with token %d (expected %d) rfkill: Unexpected event size %d (expected %d) Best channel event received (%d %d %d) WPA: group state machine entering state GTK_INIT (VLAN-ID %d) WPA: group state machine entering state SETKEYS (VLAN-ID %d) WPA: group state machine entering state SETKEYSDONE (VLAN-ID %d) Allow reassociation due to difference in signal level (%d >= %d) Assoc conflicting freq found (%d != %d) RRM: Notifying neighbor report (token = %d) Skip roam - too small difference in signal level (%d < %d) nl80211: Ignore vendor event for foreign wiphy %u (own: %d) MLME-DISASSOCIATE.indication(%02x:%02x:%02x:%02x:%02x:%02x, %d) MLME-DEAUTHENTICATE.indication(%02x:%02x:%02x:%02x:%02x:%02x, %d) Starting AP scan for wildcard SSID (Interleave with specific) P2P: * Extended Listen Timing (period %u msec interval %u msec) Mismatching country (ours=%c%c peer's=%c%c) %s: register ap_handle_timer timeout for %02x:%02x:%02x:%02x:%02x:%02x (%d seconds - AP_DEAUTH_DELAY) %s: register ap_handle_timer timeout for %02x:%02x:%02x:%02x:%02x:%02x (%d seconds - AP_DISASSOC_DELAY) Added PMKSA cache entry (IEEE 802.1X) nl80211: Driver does not support setting Beacon frame rate (VHT) 20(no-HT) nl80211: Driver does not support setting Beacon frame rate (HT) 20 MHz (no HT) P2P: Scan results received (%d BSS) skip - blacklisted (WPS) (DFS) Interface initialization will be completed in a callback (ACS) (NO_IR) (no IR) intersection(GO) CTRL_IFACE: Could not find SSID id=%d for persistent P2P group (GO) nl80211: Setup AP operations for P2P group (GO) No common channels found (GO) P2P: Request scan (that will be skipped) to start GO) GO Negotiation with %02x:%02x:%02x:%02x:%02x:%02x completed (%s will be GO) SUPP: %s (TODO) selected based on WPS IE (Authorized MAC or Active PIN) (no OFDM) (no CCK) (no ACK) %s: %s: reschedule ap_handle_timer timeout for %02x:%02x:%02x:%02x:%02x:%02x (%d seconds - AP_MAX_INACTIVITY_AFTER_DEAUTH) deauthenticated due to inactivity (timer DEAUTH/REMOVE) AP teardown (dev SME) nl80211: Subscribe to mgmt frames with AP handle %p (device SME) WPS: * MAC Address (AP BSSID) * FILS nonces (for AAD) %s: reschedule ap_handle_timer timeout for %02x:%02x:%02x:%02x:%02x:%02x (%d seconds - AP_MAX_INACTIVITY_AFTER_DISASSOC) WPA: EAPOL-Key header (ending before Key MIC) selected based on WPS IE (Active PBC) Skip connect-listen since GO Neg channel known (OOB) IEEE 802.1X (no WPA) IE in 3/4 msg does not match with IE in Beacon/ProbeResp (no IE?) WPA: PTK derivation using PRF(SHA256) Line %d: Invalid local_pwr_constraint %d (expected 0..255) Line %d: invalid beacon_int %d (expected 10..65535) WPA: No SSID info found (msg 1 of 4) Line %d: invalid WPA passphrase length %d (expected 8..63) RSN: Cache PMK (2) EAP-WSC: No AP PIN (password) configured for Enrollee functionality - allow for probing capabilities (M1) WPA: PTK derivation using PRF(SHA1) WPS: * Network Index (1) WPS: * Request to Enroll (1) Line %d: invalid send_probe_response %d (expected 0 or 1) WPS: * Version (hardcoded 0x10) WMM: Invalid Nominal MSDU Size (0) RSN: Unsupported EAPOL-Key descriptor version %d (expected AKM defined = 0) nl80211: Remain-on-channel event (cancel=%d freq=%u channel_type=%u duration=%u cookie=0x%llx (%s)) %s(hapd=%p (%s)) received EAPOL-Key Error Request (STA detected Michael MIC failure (group=%d)) Unknown forced freq %d MHz from invitation_process() Setting up AP (SSID='%s') ctrl_interface_group=%d (from group name '%s') Override interface parameter: driver ('%s' -> '%s') Override interface parameter: ctrl_interface ('%s' -> '%s') %s='%s' CTRL-EVENT-EAP-TLS-CERT-ERROR reason=%d depth=%d subject='%s' err='%s' CTRL-EVENT-EAP-STATUS status='%s' parameter='%s' P2P-PROV-DISC-FAILURE p2p_dev_addr=%02x:%02x:%02x:%02x:%02x:%02x status=%d adv_id=%x deferred_session_resp='%s' nl80211: driver param='%s' P2P: Pending virtual address unknown?! ifname='%s' CTRL_IFACE: DUP_NETWORK ifname=%s->%s id=%d->%d name='%s' CTRL_IFACE: SET_NETWORK id=%d name='%s' CTRL_IFACE: GET_NETWORK id=%d name='%s' CTRL_IFACE: SET_CRED id=%d name='%s' CTRL_IFACE: GET_CRED id=%d name='%s' CTRL_IFACE: id=%d bssid='%s' CTRL_IFACE: BLACKLIST bssid='%s' selected BSS %02x:%02x:%02x:%02x:%02x:%02x ssid='%s' id=%d ssid='%s' GLOBAL_CTRL_IFACE SET '%s'='%s' EAP-Response/Identity '%s' Line %d: invalid WEP key '%s' Line %d: Invalid psk_list '%s' Line %d: invalid key_mgmt '%s' Line %d: unknown check_cert_subject '%s' Line %d: Invalid psk_list address '%s' Line %d: Invalid %s address '%s' Line %d: Ignore likely truncated %s address '%s' CTRL_IFACE IBSS_RSN: invalid address '%s' CTRL_IFACE ROAM: invalid address '%s' CTRL_IFACE PREAUTH: invalid address '%s' Line %d: invalid IP address '%s' P2P: Invalid MAC address '%s' CTRL_IFACE WPS_PBC: invalid P2P Device Address '%s' Line %d: Invalid sae_groups '%s' P2P-SERV-ASP-RESP %02x:%02x:%02x:%02x:%02x:%02x %x %x %x %x %s '%s' Line %d: Invalid %s '%s' Line %d: invalid/unknown driver '%s' Failed to initialize driver '%s' Unsupported driver '%s' Invalid BSS config identifier '%s' Unknown/unsupported wowlan trigger '%s' Line %d: Invalid p2p_device_persistent_mac_addr '%s' Unknown group '%s' Line %d: Invalid group '%s' Line %d: Invalid multi_ap '%s' Line %d: invalid proto '%s' Failed to update wowlan_triggers to '%s' nl80211: Set drv->ssid based on scan res info to '%s' nl80211: Set drv->ssid based on req_ie to '%s' Failed to add the PSK to '%s' Invalid MAC address '%s' at line %d in '%s' Invalid salted %s hash on line %d in '%s' Invalid password hash on line %d in '%s' PSK keyid too long on line %d in '%s' Invalid hex password on line %d in '%s' Invalid salt for password on line %d in '%s' Invalid hash password on line %d in '%s' Invalid salted password on line %d in '%s' No EAP method on line %d in '%s' No EAP types configured on line %d in '%s' No PSK on line %d in '%s' Invalid EAP identity (no " in start) on line %d in '%s' Invalid EAP identity (no " in end) on line %d in '%s' Invalid EAP password (no " in end) on line %d in '%s' Unrecognized '%s=%s' on line %d in '%s' Invalid MAC address '%s' on line %d in '%s' Unsupported EAP type '%s' on line %d in '%s' Invalid PSK '%s' on line %d in '%s' Line %d: could not read Credentials from '%s' Line %d: could not read AP Settings from '%s' Line %d: unknown configuration item '%s' Driver interface rejected driver_param '%s' Driver interface replaced interface name with '%s' Unset configuration string '%s' Line %d: invalid auth_alg '%s' Line %d: Invalid sae_groups value '%s' Unexpected disallow_aps value '%s' Failed to set configuration field '%s' to value '%s' CTRL_IFACE: Unknown P2P_SET field value '%s' Invalid disallow_aps BSSID value '%s' Invalid disallow_aps SSID value '%s' Invalid SSID value '%s' Line %d: unsupported group cipher suite '%s' Line %d: unsupported pairwise cipher suite '%s' Line %d: invalid line '%s' Unknown tx_queue name '%s' P2PS: Unsupported CPT name '%s' Unknown WMM name '%s' Line %d: Failed to read deny_mac_file '%s' Line %d: Failed to read accept_mac_file '%s' %d errors found in configuration file '%s' Reading configuration file '%s' CTRL_IFACE: Failed to set network variable '%s' CTRL_IFACE: Failed to get network variable '%s' CTRL_IFACE: Failed to set cred variable '%s' CTRL_IFACE: Failed to get cred variable '%s' Initializing interface '%s' conf '%s' driver '%s' ctrl_interface '%s' bridge '%s' Line %d: unknown hw_mode '%s' Failed to set country code '%s' Unknown service '%s' Global control interface '%s' CTRL_IFACE creating interface '%s' Remove interface '%s' CTRL_IFACE deleting the interface '%s' Receiving packets from bridge interface '%s' Failed to open l2_packet connection for the bridge interface '%s' Add interface '%s' updated existing dynamic VLAN interface '%s' Line %d: unknown EAP method '%s' EXT PW: Initialize backend '%s' Control interface command '%s' Line %d: unknown wps_rf_band '%s' CTRL_IFACE: Unknown field '%s' Unknown tx_queue field '%s' Unknown wmm_ac_ field '%s' CTRL_IFACE: Unknown GET_CAPABILITY field '%s' Line %d: Invalid hessid '%s' CTRL_IFACE: GET_CAPABILITY '%s' CTRL_IFACE GET '%s' Remove BSS '%s' CTRL_IFACE: REMOVE_CRED provisioning SP FQDN '%s' CTRL_IFACE: REMOVE_CRED SP FQDN '%s' Line %d: Invalid psk_list PSK '%s' CTRL_IFACE GLOBAL INTERFACE_REMOVE '%s' CTRL_IFACE WPS_PIN: invalid BSSID '%s' CTRL_IFACE WPS_REG: invalid BSSID '%s' CTRL_IFACE: invalid BSSID '%s' CTRL_IFACE WPS_PBC: invalid BSSID '%s' nl80211: Scan probed for SSID '%s' Station tried to associate with unknown SSID '%s' Trying to associate with SSID '%s' Line %d: invalid SSID '%s' CTRL_IFACE GLOBAL INTERFACE_ADD '%s' Configuration file '%s' -> '%s' CTRL: Invalid P2P LO Start parameter: '%s' INTERFACE_ADD unsupported extra parameter: '%s' CTRL: Invalid WMM_AC_ADDTS parameter: '%s' CTRL: Invalid P2P_GROUP_ADD parameter: '%s' INTERFACE_ADD unsupported interface type: '%s' DUP: no dst ifname found: '%s' DUP: no src ifname found: '%s' DUP: no dst ifname found in cmd: '%s' DUP: no src ifname found in cmd: '%s' WPS: Failed to set phase1 '%s' Unset configuration string 'password' country='%c%c' Control interface command '%s [REMOVED]' svc_info=' P2P: * Channel List: Country String '%c%c(0x%02x)' "dev_pw_id=%u%s" "pin=%s dev_pw_id=%u%s" "pin=%08d dev_pw_id=%u%s" CTRL-EVENT-SSID-REENABLED id=%d ssid="%s" Line %d: invalid number "%s" Using interface %s with hwaddr %02x:%02x:%02x:%02x:%02x:%02x and ssid "%s" passphrase=" "WFA-SimpleConfig-Registrar-1-0" "WFA-SimpleConfig-Enrollee-1-0" "" ctrl_iface already exists! WMM AC: tspec (ac=%d, dir=%d) already exists! nl80211: failed to parse nested attributes! WMM AC: Failed to save tspecs! None of our preferred channels are supported by peer! driver switched to bad channel! sta stats missing! nl80211: survey data missing! Increasing the MAX BSS count to %d because all BSSes are in use. We should normally not get here! No common preferred channels found! 160MHZ channel width is not supported! 80+80 channel width is not supported! No driver wrappers registered! stopping sched_scan failed! EAPOL: SUPP_BE REQUEST: both eapResp and eapNoResp set?! RSN: PMKID mismatch - authentication server may have derived different MSK?! WPS: Selected BSS does not include WPS IE?! any %d %02x:%02x:%02x:%02x:%02x:%02x not Ignore Probe Request frame from %02x:%02x:%02x:%02x:%02x:%02x due to ACL reject asp upnp done Apple bssid add P2P-INVITATION-RESULT status=%d WMM AC: adding a new TS with TSID=%u address=%02x:%02x:%02x:%02x:%02x:%02x medium time=%u access category=%d dir=%d GET_CAPABILITY SA_QUERY STA-NEXT WPS-TIMEOUT GET_PREF_FREQ_LIST RX-PROBE-REQUEST P2P_LO_START BSS_EXPIRE_COUNT P2P_REMOVE_CLIENT P2P_SET EAPOL_SET VENDOR_ELEM_GET P2P_CONNECT STA_AUTOCONNECT P2P_REJECT CTRL-EVENT-SCAN-RESULTS WMM_AC_DELTS WMM_AC_ADDTS CTRL-EVENT-BEACON-LOSS WPS-SUCCESS P2P-GROUP-FORMATION-SUCCESS BSS LIST_NETWORKS WPS-NEW-AP-SETTINGS VENDOR SET_NEIGHBOR REMOVE_NEIGHBOR NFC_REPORT_HANDOVER P2P_PEER P2P_GROUP_MEMBER NFC_GET_HANDOVER_REQ P2P_SERV_DISC_CANCEL_REQ P2P_PRESENCE_REQ P2P_SERV_DISC_REQ P2P-REMOVE-AND-REFORM-GROUP P2P_ASP_PROVISION_RESP P2P_SERV_DISC_RESP P2P_SERVICE_REP WPA-EAP IBSS_RSN CTRL-EVENT-EAP-NOTIFICATION P2P_ASP_PROVISION REQ_BEACON WPS_PIN WPS_AP_PIN WPS_CHECK_PIN WPS-AP-AVAILABLE-PIN P2P_EXT_LISTEN P2P_LISTEN WPS_NFC_TOKEN AP_SCAN MAC_RAND_SCAN ROAM WPS-FAIL LEVEL NFC_GET_HANDOVER_SEL P2P_SERVICE_DEL DENY_ACL ACCEPT_ACL SCAN_INTERVAL P2P_SERV_DISC_EXTERNAL WPA-PSK RADIO_WORK SET_NETWORK GET_NETWORK SELECT_NETWORK DUP_NETWORK REMOVE_NETWORK DISABLE_NETWORK ENABLE_NETWORK MAGICLINK REQ_LCI EAPOL_REAUTH PREAUTH WPS-AP-AVAILABLE-AUTH BSS_FLUSH CHAN_SWITCH CTRL-EVENT-CHANNEL-SWITCH CTRL-EVENT-STARTED-CHANNEL-SWITCH ATTACH CTRL-EVENT-TERMINATING WPS_CONFIG WPS_REG P2P_UNAUTHORIZE P2P_GROUP_REMOVE VENDOR_ELEM_REMOVE INTERFACE_REMOVE WPS-PBC-ACTIVE NOTE P2P_INVITE DISASSOCIATE DEAUTHENTICATE P2P-GROUP-FORMATION-FAILURE WPS-PBC-DISABLE WPS-AP-AVAILABLE REQ_RANGE BSS_EXPIRE_AGE CTRL-EVENT-NETWORK-NOT-FOUND P2P_FIND BSSID %s-%d:%s needed for SSID WDS-STA-INTERFACE-REMOVED WPS-CRED-RECEIVED CTRL-EVENT-SCAN-STARTED WPS-OVERLAP-DETECTED SET_CRED GET_CRED REMOVE_CRED P2P-FIND-STOPPED RRM-NEIGHBOR-REP-REQUEST-FAILED ACS-FAILED AP-DISABLED WPS-AP-PIN-DISABLED INTERFACE-DISABLED AP-ENABLED P2P-FALLBACK-TO-GO-NEG-ENABLED INTERFACE-ENABLED WPS-AP-SETUP-UNLOCKED WPS-AP-SETUP-LOCKED WDS-STA-INTERFACE-ADDED P2P_GROUP_ADD VENDOR_ELEM_ADD P2P_SERVICE_ADD INTERFACE_ADD MESH_PMKSA_ADD WPS_NFC_TAG_READ WPS-M2D P2P_PROV_DISC WPS_PBC WPS-AP-AVAILABLE-PBC DEL_MAC ADD_MAC MIB WPA-EAP-SUITE-B NEW_STA POLL_STA %ld.%06u: %s: WPA-EAP-SHA256 WPA-PSK-SHA256 WPA-EAP-SUITE-B-192 Po vht_oper_chwidth=%d vht_oper_centr_freq_seg0_idx=%d vht_oper_centr_freq_seg1_idx=%d vht_caps_info=%08x capabilities=0x%04x wps_config_methods=0x%04x wps_selected_registrar_config_methods=0x%04x ht_caps_info=0x%04x rx_vht_mcs_map=%04x tx_vht_mcs_map=%04x ht_caps_info=%04x p2p_device_address=%02x:%02x:%02x:%02x:%02x:%02x ifname=%s address=%02x:%02x:%02x:%02x:%02x:%02x p2p_device_addr=%02x:%02x:%02x:%02x:%02x:%02x dot1xSuppEapolFramesRx=%u dot1xSuppEapolFramesTx=%u dot1xSuppEapolStartFramesTx=%u dot1xSuppEapolLogoffFramesTx=%u dot1xSuppEapolRespFramesTx=%u dot1xSuppEapolReqIdFramesRx=%u dot1xSuppEapolReqFramesRx=%u dot1xSuppInvalidEapolFramesRx=%u dot1xSuppEapLengthErrorFramesRx=%u dot1xSuppLastEapolFrameVersion=%u dot1xSuppLastEapolFrameSource=%02x:%02x:%02x:%02x:%02x:%02x dot1xAuthEapolFramesRx=%u dot1xAuthEapolFramesTx=%u dot1xAuthEapolStartFramesRx=%u dot1xAuthEapolLogoffFramesRx=%u dot1xAuthEapolRespIdFramesRx=%u dot1xAuthEapolRespFramesRx=%u dot1xAuthEapolReqIdFramesTx=%u dot1xAuthEapolReqFramesTx=%u dot1xAuthInvalidEapolFramesRx=%u dot1xAuthEapLengthErrorFramesRx=%u dot1xAuthLastEapolFrameVersion=%u dot1xAuthLastEapolFrameSource=%02x:%02x:%02x:%02x:%02x:%02x bssid=%02x:%02x:%02x:%02x:%02x:%02x Peer Address: %02x:%02x:%02x:%02x:%02x:%02x p2p_config_methods=0x%x state=%s phy=%s freq=%d num_sta_non_erp=%d num_sta_no_short_slot_time=%d num_sta_no_short_preamble=%d olbc=%d num_sta_ht_no_gf=%d num_sta_no_ht=%d num_sta_ht_20_mhz=%d num_sta_ht40_intolerant=%d olbc_ht=%d ht_op_mode=0x%x p2p_dev_capab=0x%x p2p_group_capab=0x%x tsf=%016llu wdev_id=%llu TXGOOD=%lu TXBAD=%lu RXGOOD=%lu update_idx=%u age=%d listen_freq=%d wps_method=%s interface_addr=%02x:%02x:%02x:%02x:%02x:%02x member_in_go_dev=%02x:%02x:%02x:%02x:%02x:%02x member_in_go_iface=%02x:%02x:%02x:%02x:%02x:%02x go_neg_req_sent=%d go_state=%s dialog_token=%u intended_addr=%02x:%02x:%02x:%02x:%02x:%02x country=%c%c oper_freq=%d req_config_methods=0x%x flags=%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s status=%d invitation_reqs=%u capa.key_mgmt=0x%x capa.enc=0x%x capa.auth=0x%x capa.flags=0x%llx capa.rrm_flags=0x%x capa.max_scan_ssids=%d capa.max_sched_scan_ssids=%d capa.sched_scan_supported=%d capa.max_match_sets=%d capa.max_remain_on_chan=%u capa.max_stations=%u capa.probe_resp_offloads=0x%x capa.max_acl_mac_addrs=%u capa.num_multichan_concurrent=%u capa.mac_addr_rand_sched_scan_supported=%d capa.mac_addr_rand_scan_supported=%d capa.conc_capab=%u capa.max_conc_chan_2_4=%u capa.max_conc_chan_5_0=%u capa.max_sched_scan_plans=%u capa.max_sched_scan_plan_interval=%u capa.max_sched_scan_plan_iterations=%u dot1xAuthEntersConnecting=%u dot1xAuthEapLogoffsWhileConnecting=%u dot1xAuthEntersAuthenticating=%u dot1xAuthAuthSuccessesWhileAuthenticating=%u dot1xAuthAuthTimeoutsWhileAuthenticating=%u dot1xAuthAuthFailWhileAuthenticating=%u dot1xAuthAuthEapStartsWhileAuthenticating=%u dot1xAuthAuthEapLogoffWhileAuthenticating=%u dot1xAuthAuthReauthsWhileAuthenticated=%u dot1xAuthAuthEapStartsWhileAuthenticated=%u dot1xAuthAuthEapLogoffWhileAuthenticated=%u dot1xAuthBackendResponses=%u dot1xAuthBackendAccessChallenges=%u dot1xAuthBackendOtherRequestsToSupplicant=%u dot1xAuthBackendAuthSuccesses=%u dot1xAuthBackendAuthFails=%u dot11RSNAAuthenticationSuiteSelected=%02x-%02x-%02x-%d dot11RSNAPairwiseCipherSelected=%02x-%02x-%02x-%d dot11RSNAGroupCipherSelected=%02x-%02x-%02x-%d dot11RSNAPMKIDUsed=%s dot11RSNAAuthenticationSuiteRequested=%02x-%02x-%02x-%d dot11RSNAPairwiseCipherRequested=%02x-%02x-%02x-%d dot11RSNAGroupCipherRequested=%02x-%02x-%02x-%d dot11RSNAConfigNumberOfGTKSAReplayCounters=0 dot11RSNA4WayHandshakeFailures=%u dot11RSNAStatsSTAAddress=%02x:%02x:%02x:%02x:%02x:%02x dot11RSNAStatsVersion=1 dot11RSNAStatsSelectedPairwiseCipher=%02x-%02x-%02x-%d dot11RSNAStatsTKIPLocalMICFailures=%u dot11RSNAStatsTKIPRemoteMICFailures=%u cac_time_seconds=%u cac_time_left_seconds=%u max_txpower=%u freq=%u wifi_generation=%u ext_listen_period=%u ext_listen_interval=%u chan_util_avg=%u connected_time=%u wps_device_password_id=%u RSSI=%d LINKSPEED=%d NOISE=%d FREQUENCY=%u hostapd v2.9 User space daemon for IEEE 802.11 AP management, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator Copyright (c) 2002-2019, Jouni Malinen <j@w1.fi> and contributors %d = %d MHz%s%s %s %s%s%s%s%s Index / AA / PMKID / expiration (in seconds) / opportunistic%s country=%s timeout_next=%s pairwise_cipher=%s group_cipher=%s key_mgmt=%s Supplicant PAE state=%s suppPortStatus=%s ip_address=%s %s=%s id_str=%s pmf=%d mgmt_group_cipher=%s wpsUuid=%s wpsPrimaryDeviceType=%s wpsDeviceName=%s wpsManufacturer=%s wpsModelName=%s wpsModelNumber=%s wpsSerialNumber=%s psk=%s wps_state=%s p2p_device_address=%02x:%02x:%02x:%02x:%02x:%02x p2p_state=%s wpa_state=%s heldPeriod=%u authPeriod=%u startPeriod=%u maxStart=%u portControl=%s Supplicant Backend state=%s EAP state=%s passphrase=%s sec_dev_type=%s wps_primary_device_type=%s p2p_primary_device_type=%s wds_sta_ifname=%s wps_device_name=%s p2p_device_name=%s dot1xAuthSessionId=%016llX dot1xAuthSessionAuthenticMethod=%d dot1xAuthSessionTime=%u dot1xAuthSessionTerminateCause=999 dot1xAuthSessionUserName=%s %s ctrl_iface=%s keyid=%s uuid=%s oper_ssid=%s bssid=%02x:%02x:%02x:%02x:%02x:%02x ssid=%s dot1xAuthPaeState=%d dot1xAuthBackendAuthState=%d dot1xAuthAdminControlledDirections=%d dot1xAuthOperControlledDirections=%d dot1xAuthAuthControlledPortStatus=%d dot1xAuthAuthControlledPortControl=%d dot1xAuthQuietPeriod=%u dot1xAuthServerTimeout=%u dot1xAuthReAuthPeriod=%u dot1xAuthReAuthEnabled=%s dot1xAuthKeyTxEnabled=%s dot11RSNAOptionImplemented=TRUE dot11RSNAPreauthenticationImplemented=%s dot11RSNAEnabled=%s dot11RSNAPreauthenticationEnabled=%s WIDTH=%s %02x:%02x:%02x:%02x:%02x:%02x %s %s = %s Last WPS result: %s PBC Status: %s Failure Reason: %s %ld %s %02x:%02x:%02x:%02x:%02x:%02x %s %s %s %s %s %s %d %s %s %s %s mode=station mode=P2P GO - group formation usage: hostapd [-hdBKtv] [-P <PID file>] [-e <entropy file>] \ [-g <global ctrl_iface>] [-G <group>]\ [-i <comma-separated list of interface names>]\ <configuration file(s)> options: -h show this usage -d show more debug messages (-dd for even more) -B run daemon in the background -e entropy file -g global control interface path -G group for control interfaces -P PID file -K include key data in debug messages -f log output to debug file instead of stdout -i list of interface names to use -S start all the interfaces synchronously -t include timestamps in some debug messages -v show hostapd version mode=mesh example: wpa_supplicant -D%s -iwlan0 -c/etc/wpa_supplicant.conf %s@%s:%u:%u:%ld.%06ld wps_state=unconfigured wps_state=configured nl80211: wifi status sockopt failed Not associated to a WMM AP, WMM AC is Disabled WMM AC is Enabled ieee80211w=%d est_throughput=%d reqMethod=%d methodState=%s decision=%s ClientTimeout=%d dot11RSNAOptionImplemented=TRUE dot11RSNAPreauthenticationImplemented=TRUE dot11RSNAEnabled=%s dot11RSNAPreauthenticationEnabled=%s dot11RSNAConfigVersion=%d dot11RSNAConfigPairwiseKeysSupported=5 dot11RSNAConfigGroupCipherSize=%d dot11RSNAConfigPMKLifetime=%d dot11RSNAConfigPMKReauthThreshold=%d dot11RSNAConfigNumberOfPTKSAReplayCounters=1 dot11RSNAConfigSATimeout=%d beacon_int=%d persistent=%d %s=%d snr=%d min_txpower=%d max_txpower=%d freq=%d %02x:%02x:%02x:%02x:%02x:%02x pri_dev_type=%s device_name=%s manufacturer=%s model_name=%s model_number=%s serial_number=%s config_methods=0x%x dev_capab=0x%x group_capab=0x%x level=%d qual=%d last_ack_signal=%d rx_packets=%lu tx_packets=%lu rx_bytes=%llu tx_bytes=%llu inactive_msec=%lu signal=%d wpa=%d AKMSuiteSelector=%02x-%02x-%02x-%d hostapdWPAPTKState=%d hostapdWPAPTKGroupState=%d hostapdWPAGroupState=%d dot1xSuppPaeState=%d dot1xSuppHeldPeriod=%u dot1xSuppAuthPeriod=%u dot1xSuppStartPeriod=%u dot1xSuppMaxStart=%u dot1xSuppSuppControlledPortStatus=%s dot1xSuppBackendPaeState=%d noise=%d age=%d %s: acm=%d uapsd=%d channel=%u secondary_channel=%d ieee80211n=%d ieee80211ac=%d ieee80211ax=%d beacon_int=%u dtim_period=%d vlan_id=%d ssid=%s id=%d wpa=%d bss[%d]=%s bssid[%d]=%02x:%02x:%02x:%02x:%02x:%02x ssid[%d]=%s num_sta[%d]=%d AVG_BEACON_RSSI=%d AVG_RSSI=%d %02x:%02x:%02x:%02x:%02x:%02x VLAN_ID=%d CENTER_FRQ2=%d CENTER_FRQ1=%d %02x:%02x:%02x:%02x:%02x:%02x %u %d %d %d Current level: %s Timestamp: %d Index / SPA / PMKID / expiration (in seconds) / opportunistic %s - hexdump_ascii(len=%lu): [NULL] %s - hexdump_ascii(len=%lu): [REMOVED] authMultiSessionId=%016llX # WPS configuration - START 3. Neither the name(s) of the above-listed copyright holder(s) nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT mode=IBSS mode=AP mode=P2P GO FAIL OK FAIL-NO-IFNAME-MATCH dot1xPaePortNumber=%d dot1xPaePortProtocolVersion=%d dot1xPaePortCapabilities=1 dot1xPaePortInitialize=%d dot1xPaePortReauthenticate=FALSE # WPS configuration - END cac_time_seconds=%d cac_time_left_seconds=N/A ==== %s %s usage: wpa_supplicant [-BddhKLqqtvW] [-P<pid file>] [-g<global ctrl>] \ [-G<group>] \ -i<ifname> -c<config file> [-C<ctrl>] [-D<driver>] [-p<driver_param>] \ [-b<br_ifname>] [-e<entropy file>] [-f<debug file>] \ [-o<override driver>] [-O<override ctrl>] \ [-N -i<ifname> -c<conf> [-C<ctrl>] [-D<driver>] \ [-m<P2P Device config file>] \ [-p<driver_param>] [-b<br_ifname>] [-I<config file>] ...] drivers: Mode[%s] Channels: Pre-authentication EAPOL state machines: %016llX: %s - hexdump_ascii(len=%lu): wps_state=2 in_interface_list=1 ignore_if_down_event=1 in_deinit=1 beacon_set=1 ignore_next_local_disconnect=1 data_tx_status=1 scan_complete_events=1 auth_algs=1 disabled_11b_rates=1 use_monitor=1 wps_selected_registrar=1 sae_require_mfp=1 pending_remain_on_chan=1 ignore_next_local_deauth=1 retry_auth=1 scan_for_auth=1 device_ap_sme=1 added_if_into_bridge=1 already_in_bridge=1 added_bridge=1 poll_command_supported=1 wps_ap_setup_locked=1 if_dynamic=1 ieee80211ac=1 dot11RSNAConfigVersion=%u dot11RSNAConfigPairwiseKeysSupported=9999 dot11RSNAConfigGroupRekeyStrict=%u dot11RSNAConfigGroupUpdateCount=%u dot11RSNAConfigPairwiseUpdateCount=%u dot11RSNAConfigGroupCipherSize=%u dot11RSNAConfigPMKLifetime=%u dot11RSNAConfigPMKReauthThreshold=%u dot11RSNAConfigNumberOfPTKSAReplayCounters=0 dot11RSNAConfigSATimeout=%u dot11RSNAAuthenticationSuiteSelected=%02x-%02x-%02x-%d dot11RSNAPairwiseCipherSelected=%02x-%02x-%02x-%d dot11RSNAGroupCipherSelected=%02x-%02x-%02x-%d dot11RSNAPMKIDUsed=%s dot11RSNAAuthenticationSuiteRequested=%02x-%02x-%02x-%d dot11RSNAPairwiseCipherRequested=%02x-%02x-%02x-%d dot11RSNAGroupCipherRequested=%02x-%02x-%02x-%d dot11RSNATKIPCounterMeasuresInvoked=%u dot11RSNA4WayHandshakeFailures=%u dot11RSNAConfigNumberOfGTKSAReplayCounters=0 eloop: could not process SIGINT or SIGTERM in two seconds. Looks like there is a bug that ends up in a busy loop that prevents clean shutdown. Killing program forcefully. This software may be distributed under the terms of the BSD license. See README for more details. Failed to initialize control interface '%s'. You may have another wpa_supplicant process already running or the file was left by an unclean termination of wpa_supplicant in which case you will need to manually remove this file before starting wpa_supplicant again. selectedMethod=%d (EAP-%s) last_eap_type_as=%d (%s) last_eap_type_sta=%d (%s) dev_name='%s' #### TSID=%u UP=%u Address = %02x:%02x:%02x:%02x:%02x:%02x WMM AC dir = %s Total admitted time = %u This software may be distributed under the terms of the BSD license. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. (No Traffic Stream) Po Po %02x:%02x:%02x:%02x:%02x:%02x %d %d : NONE IEEE8021X WPA-EAP MULTIBSS-STA feature_cap= COOKIE= DIRECT- network id / ssid / bssid / flags cred id / realm / username / domain / imsi bssid / frequency / signal level / flags / ssid FAIL-BUSY FAIL-PBC-OVERLAP FAIL-INVALID-PIN FAIL-CHECKSUM FAIL-NO-IFNAME-MATCH FAIL-CHANNEL-UNAVAILABLE UNKNOWN COMMAND FAIL-CHANNEL-UNSUPPORTED p2p_state=DISABLED ---- mesh ---- ---- AP ---- ^ / Rd K UX _]` ? < x d $ , 4 < d l t | $ 4 d t P 7 n ( P Q R S T s$0 t$, u(0 v4@ w4< x8@ yd zd {h | } ~  $ 2r $ s v | y } Q t w z ~ ~ u x {   S!T" s v y Q t w z u x { S T } s Q R v!v"y#y$t%w&w'z(z)u*x+x,{-{8S9T:y; s v } t w ~ Q S T ( ( P p @ cc || ww {{ kk oo T P00` gg }++V b M vv E @ }} YY GG Ag _ E # S rr [ u =j&&LZ66lA??~ O \44h Q4 qq s S11b? * R e##F^ ( 0 7 / 6 $ = & i''N  uu t,,X. 4- 6 nn ZZ [ RR M;;va }{))R> q//^ SS h , ` @ y [[ jj F gK99r JJ LL XX J k * O CC MM U33f EE  PP D<<x % K QQ ] @@ ? !H88p c wu c!!B0 m L 5 &/ __ 5 DD 9 .W U ~~ G==z dd ]] + 2 ss `` OO  f""D~**T ; FF ) k< (y ^^ v ; V22dN::t II l$$H \\ ] n C bb 9 17 yy 2 C Y77n mm d NN I ll VV % ee zz G o xx o%%Jr..\$ 8 W sQ # | tt ! > KK a pp B>>| q ff HH aa _55j WW i X ' : '8 +3 " ii p 3 -" < I UU x((Pz Y e1 BB hh AA )w--Z { TT m: ,P QSeA~ ^': k ; E X KU 0 mv v %L O * D5& b IZ g % E ] u/ L F k _ zm YR - !tX)i ID j uxy k>X q ' O f : } J c 1 `3Q ESb wd k + XhHp E l {R# s KrW * Uf ( / { 7 (0 # j \ + y iN e b4 S.4 U 2 u 9 `@ q^Q n !>= > F M T ] qo P`$ C@ w g B 8[ yG | B| H +2 p NrZl V8 ='9-6d ! \h T[ :.6$ g W O aiKwZ * C "< - WL u ` & r\ ;fD4~ [v)C # h c 1 cB@" }$J = 2 m ) K/ 0 R wl + p H "d G ? ,}V 3" NI 8 6 ( z & ? :, xP _jbF~T ^ 9. ] | i - o % ; } nc { ; x& Yn O en ~ ! 6oJ | ) 11#?*0 f 57 Nt 3J A P / MvM CTM jL , QeF ^ ]5 st .A Z g R 3V G m a z 7 Y < ' 5 a < GzY ?s Uy 7 s S[ _ o= Dx > h ,4$8_@ r % I<(A q 9 Vda {p 2 t\lHBW R j 06 8 @ | 9 / 4 CD T{ 2 #= L B N . f( $ v[ Im %r d h \ ]e lpHP ^ FW X E , ? k: AOg s t" 5 7 u nG q ) o b V>K y x Z 3 1 Y' _`Q J - z ;M * < S a + ~ w & i cU! } @ 6 / B D7q [ V9 Y ? ^ [ 1$ } Ut] r t i G $o, - tJ \ vRQ> m 1 ' Y G Qc g)) '8! . m,M 8STs e jv. ,r Kf p K Ql $ 5 p j l7 LwH' 4 9J NO [ o.h toc x x lP xq " ( / B e # D7q/;M 8 H [ V9 Y O ? m ^ B opE [ N 1$ } Uo { t] r ; 5 % &i t J i %O8 G e w $u +Yo, - n tJ A \ S v f RQ> 2 -m 1 ?! ' Y = % G o Qc pn g)) / F '& &\8! . * Z m,M 8S c Ts e w< jv G. ;5 ,r d L 0B Kf p K 0 T Ql R eU$ * qW 5 2p j S AQ l7 LwH' H 4cZ 9 A J Ns cwO [ o.h ] t`/ Coc xr x 9d ( c# lP y +Sr xq a& >' ! } x n O} o r g }c ? G 5 q } # w ( $ @{ 2 <L g C B> L*~e )Y : o _ XGJ Dl ( P B" """ "" 1 ] . P 0 $ 4 d t !h 4 b ) N g t ; "QJ y 4 :C 0+ m _ 7O 5mmQ E vb^~ LB 7 k \ 8k Z $ |K I(fQ [= | c H6 U i ? $ _ e]# b V R ) p mg 5NJ tl #s'  Q a bc1E n h ' E3 : S ( < n ! 6 / " B 1/?cz&!t [z [ 5 D O % $ 3( r- >\P m$ * 4 ~ g Q 1y B ] j KK6 %^L x 6 e | } s ~  t u | } s ~  t u ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/ ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_ P P * _tcp local _udp 0 @ 0123456789ABCDEFX 0123456789abcdefx 0123456789ABCDEFX 0123456789abcdefx
5 ( 0 ( E H C H D 0 E ( 0 : 0 , , t 0 0 d L P T H T P T P T t @ @ ( n u l l ) (null) (nil) (null) ( n u l l ) (nil)
.ARM.exidx .text .got .got.plt .rel.plt .bss .ARM.attributes .dynstr .data.rel.ro .rel.dyn .dynsym .gnu.hash .note.gnu.build-id .dynamic .ARM.extab .shstrtab .rodata .data