Skip to content

Instantly share code, notes, and snippets.

@lategoodbye
Created June 15, 2019 16:22
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save lategoodbye/d4b5da60e905cbdf069affbd41cd14ab to your computer and use it in GitHub Desktop.
Save lategoodbye/d4b5da60e905cbdf069affbd41cd14ab to your computer and use it in GitHub Desktop.
Configuration for brcmf_cfg80211_set_pmk warning
country=DE
network={
ssid="xxx"
scan_ssid=1
key_mgmt=WPA-EAP
eap=TTLS
phase1="peaplable=0"
phase2="auth=PAP"
identity="xxx"
password="xxx"
ca_cert="/etc/wpa_supplicant/ca.pem"
}
EAP-TTLS: TLS done, proceed to Phase 2
EAP-TTLS: Derived key - hexdump(len=64): [REMOVED]
EAP-TTLS: Derived EMSK - hexdump(len=64): [REMOVED]
EAP-TTLS: Derived Session-Id - hexdump(len=65): 15 3f f1 2e df b9 f4 0b ea 3a 06 4d 59 75 e8 58 46 22 f4 72 22 9b 1d 63 d7 64 dc ec 76 9a f5 47 24 60 00 f8 77 07 7f a8 7b b6 78 3c 58 8c 17 59 d8 d5 4f 61 3b f4 ea 7d fb a1 54 5c b2 6b 3a 60 12
EAP-TTLS: received 0 bytes encrypted data for Phase 2
EAP-TTLS: empty data in beginning of Phase 2 - use fake EAP-Request Identity
EAP-TTLS: Phase 2 PAP Request
EAP-TTLS: Encrypting Phase 2 data - hexdump(len=36): [REMOVED]
OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
SSL: 65 bytes left to be sent out (of total 65 bytes)
EAP-TTLS: Authentication completed successfully
EAP: method process -> ignore=FALSE methodState=DONE decision=COND_SUCC eapRespData=0xaaaae344f990
EAP: Session-Id - hexdump(len=65): 15 3f f1 2e df b9 f4 0b ea 3a 06 4d 59 75 e8 58 46 22 f4 72 22 9b 1d 63 d7 64 dc ec 76 9a f5 47 24 60 00 f8 77 07 7f a8 7b b6 78 3c 58 8c 17 59 d8 d5 4f 61 3b f4 ea 7d fb a1 54 5c b2 6b 3a 60 12
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=b8:27:eb:6c:5e:c9
EAPOL: SUPP_BE entering state RECEIVE
l2_packet_receive: src=b8:27:eb:6c:5e:c9 len=8
wlan0: RX EAPOL from b8:27:eb:6c:5e:c9
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Success
EAP: Status notification: completion (param=success)
EAP: EAP entering state SUCCESS
wlan0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Supplicant port status: Authorized
nl80211: Set supplicant port authorized for b8:27:eb:6c:5e:c9
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed - result=SUCCESS
Configure PMK for driver-based RSN 4-way handshake
EAPOL: Successfully fetched key (len=32)
RSN: Configure PMK for driver-based 4-way handshake - hexdump(len=32): [REMOVED]
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=5 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=32
nl80211: Set PMK to the driver for b8:27:eb:6c:5e:c9
nl80211: PMK - hexdump(len=32): [REMOVED]
nl80211: Set PMK failed: ret=-22 (Invalid argument)
Failed to set PMK to the driver
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment