Skip to content

Instantly share code, notes, and snippets.

@jasta
Created February 21, 2023 19:51
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save jasta/ca10e95e786b79fe847c3a13b297e732 to your computer and use it in GitHub Desktop.
Save jasta/ca10e95e786b79fe847c3a13b297e732 to your computer and use it in GitHub Desktop.
I (7346) wpa: DPP: Authentication Request from 9e:1e:25:80:96:1a
D (7576) wpa: DPP: ECDH shared secret (M.x) - hexdump(len=32):
D (7586) wpa: DPP: PRK = HKDF-Extract(<>, IKM=M.x) - hexdump(len=32):
D (7606) wpa: DPP: k1 = HKDF-Expand(PRK, info, L) - hexdump(len=32):
D (7686) wpa: DPP: AES-SIV ciphertext - hexdump(len=41):
D (7706) wpa: DPP: AES-SIV cleartext - hexdump(len=25):
D (7726) wpa: DPP: I-nonce - hexdump(len=16):
D (7736) wpa: DPP: I-capabilities: 0x02
D (7736) wpa: DPP: Acting as Enrollee
D (7746) wpa: DPP: Build Authentication Response
D (7746) wpa: DPP: R-nonce - hexdump(len=16):
D (7916) wpa: DPP: Generating a keypair
D (8126) wpa: DPP: ECDH shared secret (N.x) - hexdump(len=32):
D (8136) wpa: DPP: PRK = HKDF-Extract(<>, IKM=N.x) - hexdump(len=32):
D (8156) wpa: DPP: k2 = HKDF-Expand(PRK, info, L) - hexdump(len=32):
D (8176) wpa: DPP: PRK = HKDF-Extract(<>, IKM) - hexdump(len=32):
D (8186) wpa: DPP: ke = HKDF-Expand(PRK, info, L) - hexdump(len=32):
D (8206) wpa: DPP: R-auth hash components
D (8216) wpa: DPP: hash component - hexdump(len=16):
D (8226) wpa: DPP: hash component - hexdump(len=16):
D (8236) wpa: DPP: hash component - hexdump(len=32):
D (8246) wpa: DPP: hash component - hexdump(len=32):
D (8266) wpa: DPP: hash component - hexdump(len=32):
D (8286) wpa: DPP: hash component - hexdump(len=1):
D (8286) wpa: DPP: R-auth - hexdump(len=32):
D (8306) wpa: DPP: {R-auth}ke - hexdump(len=52):
D (8336) wpa: DPP: Status 0
D (8336) wpa: DPP: R-Bootstrap Key Hash
D (8396) wpa: DPP: AES-SIV cleartext - hexdump(len=101):
D (8436) wpa: DPP: AES-SIV ciphertext - hexdump(len=117):
D (8486) wpa: DPP: Authentication Response frame attributes - hexdump(len=238):
D (8586) wpa: DPP: Mgmt Tx - MAC:9e:1e:25:80:96:1a, Channel-6, WaitT-500
D (8676) wpa: Mgmt Tx Status - 1, Cookie - 0x42013afc
I (8686) wifi dpp-enrollee: DPP Auth failed (Reason: ESP_ERR_DPP_TX_FAILURE), retry...
D (10236) wpa: DPP: Rx Public Action frame: action - 9
I (10246) wpa: DPP: Authentication Request from 9e:1e:25:80:96:1a
D (10476) wpa: DPP: ECDH shared secret (M.x) - hexdump(len=32):
D (10486) wpa: DPP: PRK = HKDF-Extract(<>, IKM=M.x) - hexdump(len=32):
D (10506) wpa: DPP: k1 = HKDF-Expand(PRK, info, L) - hexdump(len=32):
D (10596) wpa: DPP: AES-SIV ciphertext - hexdump(len=41):
D (10616) wpa: DPP: AES-SIV cleartext - hexdump(len=25):
D (10626) wpa: DPP: I-nonce - hexdump(len=16):
D (10636) wpa: DPP: I-capabilities: 0x02
D (10646) wpa: DPP: Acting as Enrollee
D (10646) wpa: DPP: Build Authentication Response
D (10656) wpa: DPP: R-nonce - hexdump(len=16):
D (10816) wpa: DPP: Generating a keypair
D (11036) wpa: DPP: ECDH shared secret (N.x) - hexdump(len=32):
D (11046) wpa: DPP: PRK = HKDF-Extract(<>, IKM=N.x) - hexdump(len=32):
D (11056) wpa: DPP: k2 = HKDF-Expand(PRK, info, L) - hexdump(len=32):
D (11076) wpa: DPP: PRK = HKDF-Extract(<>, IKM) - hexdump(len=32):
D (11096) wpa: DPP: ke = HKDF-Expand(PRK, info, L) - hexdump(len=32):
D (11116) wpa: DPP: R-auth hash components
D (11116) wpa: DPP: hash component - hexdump(len=16):
D (11136) wpa: DPP: hash component - hexdump(len=16):
D (11146) wpa: DPP: hash component - hexdump(len=32):
D (11156) wpa: DPP: hash component - hexdump(len=32):
D (11176) wpa: DPP: hash component - hexdump(len=32):
D (11196) wpa: DPP: hash component - hexdump(len=1):
D (11196) wpa: DPP: R-auth - hexdump(len=32):
D (11216) wpa: DPP: {R-auth}ke - hexdump(len=52):
D (11246) wpa: DPP: Status 0
D (11246) wpa: DPP: R-Bootstrap Key Hash
D (11306) wpa: DPP: AES-SIV cleartext - hexdump(len=101):
D (11346) wpa: DPP: AES-SIV ciphertext - hexdump(len=117):
D (11396) wpa: DPP: Authentication Response frame attributes - hexdump(len=238):
D (11496) wpa: DPP: Mgmt Tx - MAC:9e:1e:25:80:96:1a, Channel-6, WaitT-500
D (11576) wpa: DPP: Rx Public Action frame: action - 9
D (11576) wpa: DPP: Authentication Confirmation from 9e:1e:25:80:96:1a
D (11576) wpa: DPP: Wrapped data - hexdump(len=52):
D (11606) wpa: DPP: Responder Bootstrapping Key Hash - hexdump(len=32):
D (11626) wpa: DPP: Status 0
D (11656) wpa: DPP: AES-SIV ciphertext - hexdump(len=52):
D (11696) wpa: Mgmt Tx Status - 0, Cookie - 0x42013afc
D (11696) wpa: DPP: AES-SIV cleartext - hexdump(len=36):
D (11726) wpa: DPP: Received Initiator Authenticating Tag - hexdump(len=32):
D (11746) wpa: DPP: I-auth hash components
D (11746) wpa: DPP: hash component - hexdump(len=16):
D (11756) wpa: DPP: hash component - hexdump(len=16):
D (11776) wpa: DPP: hash component - hexdump(len=32):
D (11786) wpa: DPP: hash component - hexdump(len=32):
D (11806) wpa: DPP: hash component - hexdump(len=32):
D (11826) wpa: DPP: hash component - hexdump(len=1):
D (11826) wpa: DPP: I-auth - hexdump(len=32):
D (11846) wpa: DPP: Calculated Initiator Authenticating Tag - hexdump(len=32):
D (11866) wpa: DPP: Authentication success - clear temporary keys
D (11876) wpa: DPP: Build configuration request
D (11876) wpa: DPP: E-nonce - hexdump(len=16):
D (11886) wpa: DPP: AES-SIV cleartext - hexdump(len=95):
D (11926) wpa: DPP: AES-SIV ciphertext - hexdump(len=111):
D (11976) wpa: DPP: Configuration Request frame attributes - hexdump(len=115):
D (12026) wpa: DPP: GAS request to 9e:1e:25:80:96:1a (chan 6)
D (12036) wpa: DPP: Mgmt Tx - MAC:9e:1e:25:80:96:1a, Channel-6, WaitT-500
D (12056) wpa: Mgmt Tx Status - 0, Cookie - 0x42013afc
D (12076) wpa: DPP: Rx Public Action frame: action - 11
D (12076) wpa: DPP: AES-SIV ciphertext - hexdump(len=129):
D (12136) wpa: DPP: AES-SIV cleartext - hexdump(len=113):
D (12186) wpa: DPP: Enrollee Nonce - hexdump(len=16):
D (12196) wpa: DPP: Status 0
D (12196) wpa: DPP: Legacy akm=psk credential
D (12206) wpa: DPP: JSON parsing completed successfully
I (12216) wifi dpp-enrollee: DPP Authentication successful, connecting to AP : nasa
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment