DHCP_OFFER packet seems to be dropped from wilink suspecting a replay attack. So not able to obtain a dynamic IP address
the TI debug log shows that the DHCP-OFFER packets are dropped within wilink-8 as REPLAY ATTACK - DROP PACKET
Example (first DHCP transaction from the excel format log;
1 0 51:16.6 0 0 dhcp.c:543 1 Dhcp_CheckRxDhcp FRAME_TYPE: DHCP RX = DHCP_DISCOVER, roleId = 0
1 0 51:16.8 0 0 ap_beacon.c:756 1 ApBeaconDtim_SendApBeaconDtim at TSF 0x02A30009, Role : 0, is sending beaconon FLID 2, with msi=144
1 0 51:17.0 0 0 dhcp.c:381 1 Dhcp_CheckTxDhcp FRAME_TYPE: DHCP TX = DHCP_OFFER1 0 51:17.0 0 0 roles.c:3820
1 Roles_StartMgmtSeq start mgmt seq: roleId = 0,mgmtType=MGMT_SEQ_TYPE_DHCP, mgmtId=0x800000, mgmtOngoing=0x800000
1 0 51:17.0 0 0 dhcp.c:731 1 Dhcp_AddMgmtSeqDHCP: Add request, role id = 0, handle = 0x834B
1 0 51:17.1 0 0 ap_beacon.c:756 1 ApBeaconDtim_SendApBeaconDtim at TSF 0x02A7B00A, Role : 0, is sending beaconon FLID 2, with msi=145
1 0 51:17.4 0 0 ap_beacon.c:756 1 ApBeaconDtim_SendApBeaconDtim at TSF 0x02AC600A, Role : 0, is sending beaconon FLID 2, with msi=146
1 0 51:17.7 0 0 ap_beacon.c:756 1 ApBeaconDtim_SendApBeaconDtim at TSF 0x02B11009, Role : 0, is sending beaconon FLID 2, with msi=147
1 0 51:17.9 0 0 rx_complete_task.c:425 1 Rx_handleRxCompleteFrame REPLAY ATTACK - DROP PACKET2402.stream.csv
This issue is not observed when connecting from a mobile phone to the same AP or from a desktop PC with wifi dongle