Created
June 15, 2019 16:22
-
-
Save lategoodbye/d4b5da60e905cbdf069affbd41cd14ab to your computer and use it in GitHub Desktop.
Configuration for brcmf_cfg80211_set_pmk warning
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
country=DE | |
network={ | |
ssid="xxx" | |
scan_ssid=1 | |
key_mgmt=WPA-EAP | |
eap=TTLS | |
phase1="peaplable=0" | |
phase2="auth=PAP" | |
identity="xxx" | |
password="xxx" | |
ca_cert="/etc/wpa_supplicant/ca.pem" | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
EAP-TTLS: TLS done, proceed to Phase 2 | |
EAP-TTLS: Derived key - hexdump(len=64): [REMOVED] | |
EAP-TTLS: Derived EMSK - hexdump(len=64): [REMOVED] | |
EAP-TTLS: Derived Session-Id - hexdump(len=65): 15 3f f1 2e df b9 f4 0b ea 3a 06 4d 59 75 e8 58 46 22 f4 72 22 9b 1d 63 d7 64 dc ec 76 9a f5 47 24 60 00 f8 77 07 7f a8 7b b6 78 3c 58 8c 17 59 d8 d5 4f 61 3b f4 ea 7d fb a1 54 5c b2 6b 3a 60 12 | |
EAP-TTLS: received 0 bytes encrypted data for Phase 2 | |
EAP-TTLS: empty data in beginning of Phase 2 - use fake EAP-Request Identity | |
EAP-TTLS: Phase 2 PAP Request | |
EAP-TTLS: Encrypting Phase 2 data - hexdump(len=36): [REMOVED] | |
OpenSSL: TX ver=0x0 content_type=256 (TLS header info/) | |
SSL: 65 bytes left to be sent out (of total 65 bytes) | |
EAP-TTLS: Authentication completed successfully | |
EAP: method process -> ignore=FALSE methodState=DONE decision=COND_SUCC eapRespData=0xaaaae344f990 | |
EAP: Session-Id - hexdump(len=65): 15 3f f1 2e df b9 f4 0b ea 3a 06 4d 59 75 e8 58 46 22 f4 72 22 9b 1d 63 d7 64 dc ec 76 9a f5 47 24 60 00 f8 77 07 7f a8 7b b6 78 3c 58 8c 17 59 d8 d5 4f 61 3b f4 ea 7d fb a1 54 5c b2 6b 3a 60 12 | |
EAP: EAP entering state SEND_RESPONSE | |
EAP: EAP entering state IDLE | |
EAPOL: SUPP_BE entering state RESPONSE | |
EAPOL: txSuppRsp | |
TX EAPOL: dst=b8:27:eb:6c:5e:c9 | |
EAPOL: SUPP_BE entering state RECEIVE | |
l2_packet_receive: src=b8:27:eb:6c:5e:c9 len=8 | |
wlan0: RX EAPOL from b8:27:eb:6c:5e:c9 | |
EAPOL: Received EAP-Packet frame | |
EAPOL: SUPP_BE entering state REQUEST | |
EAPOL: getSuppRsp | |
EAP: EAP entering state RECEIVED | |
EAP: Received EAP-Success | |
EAP: Status notification: completion (param=success) | |
EAP: EAP entering state SUCCESS | |
wlan0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully | |
EAPOL: SUPP_PAE entering state AUTHENTICATED | |
EAPOL: Supplicant port status: Authorized | |
nl80211: Set supplicant port authorized for b8:27:eb:6c:5e:c9 | |
EAPOL: SUPP_BE entering state RECEIVE | |
EAPOL: SUPP_BE entering state SUCCESS | |
EAPOL: SUPP_BE entering state IDLE | |
EAPOL authentication completed - result=SUCCESS | |
Configure PMK for driver-based RSN 4-way handshake | |
EAPOL: Successfully fetched key (len=32) | |
RSN: Configure PMK for driver-based 4-way handshake - hexdump(len=32): [REMOVED] | |
wpa_driver_nl80211_set_key: ifindex=3 (wlan0) alg=5 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=32 | |
nl80211: Set PMK to the driver for b8:27:eb:6c:5e:c9 | |
nl80211: PMK - hexdump(len=32): [REMOVED] | |
nl80211: Set PMK failed: ret=-22 (Invalid argument) | |
Failed to set PMK to the driver |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment