This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

DM814x / DM816x OpenLink WL127x support

Other Parts Discussed in Thread: WL1271

Hi, TI Team, 

 

With the announcement of the DM814x and DM816x platforms recently, I haven't seen updates in this http://processors.wiki.ti.com/index.php/ARM_Processor_Open_Source_Wireless_Connectivity  to reflect support of WL127x products with these two product families.

 

Can you confirm that OpenLink mac80211 drivers and such will run on these DSPS platforms?  They're not referenced at openlink.org, and the DM81x products are absent as I said from the processors wiki re: wireless connectivity.

 

Thank you!

Theresa

  • HI,

    We don't have any plans at this for enable WL127x on the DM816x processor.

    There are plans for DM814x which are current gated by availability of functional WL1271 Adapter for that processor. Once we have a line of sight on functional hardware, we will announced Software plans on thw Wiki.

    Openlink Drivers can run on any TI ARM based processor after porting, integration and validation with the Software Release for that processor and EVM.

     

    Adnan

  • Hi, Adnan, what does "functional WL1271 Adapter" refer to?  Is that HW or SW?  (thanks!)

  • There is a re-desing of the Catalog and VCAM Daughter cards for DM814x EVM  underway in order to accomodate a WL1271 Adapter.

     

    Adnan

  • So will the COM6L board we have work with the COM7 connector on the Centaurus platform?  (I was under the impression it would) :: http://e2e.ti.com/support/dsp/davinci_digital_media_processors/f/716/p/131324/520826.aspx#520826

     

  • Hi Adnan

    Do you have WL1271 driver that support DM8148 evm now?

    When will be WL1271 Adapter (daughter board) available?

    Regards,

    Jammy

  • Hi Jammy

    The Linux EZSDK Release 5.04.00.11 is available for download from http://software-dl.ti.com/dsps/dsps_public_sw/ezsdk/latest/index_FDS.html 
     
    This release supports DM816x and DM814x and has been validated on DM8168 PG2.0 and PG1.1 EVMs with DDR3 and DM8148 PG2.1 EVMs
    that includes WLAN and Wireless Connectivity drivers (on DM814x)
     
    This release includes the features and components listed in the following Wiki page http://processors.wiki.ti.com/index.php/EZSDK_Feature_List
    Regards,
    Eyal
  • Hi Eyal

    I have downloaded the EZSDK (5.04.00.11) for dm814x-evm and am testing the WLAN interface. I am able to connect to the Access point modes (b, g) in different security encryptions (wep, wpa, wpa2) successfully, but i am unable to connect to access point in 'n' mode with security encryptions (wep, wpa, wpa2). However I am able to connect to n mode Access point in open authentication.  Please give your suggestions on this issue. I have attached the log of the wpa_supplicant in debug mode while trying to connect to access point ( in 'n' mode and WPA encryption).

    root@dm814x-evm:~# wpa_supplicant -iwlan0 -Dnl80211 -c wpa_supplicant.txt -ddd &
    root@dm814x-evm:~# wpa_supplicant v0.8.x
    random: Trying to read entropy from /dev/random
    Initializing interface 'wlan0' conf 'wpa_supplicant.txt' driver 'nl80211' ctrl_interface 'N/A' brid'
    Configuration file 'wpa_supplicant.txt' -> '/home/root/wpa_supplicant.txt'
    Reading configuration file '/home/root/wpa_supplicant.txt'
    ap_scan=1
    update_config=1
    ctrl_interface='/var/run/wpa_supplicant'
    Line: 5 - start of a new network block
    ssid - hexdump_ascii(len=7):
         61 73 65 6c 73 61 6e                              wifi_test         
    proto: 0x1
    key_mgmt: 0x2
    pairwise: 0x18
    group: 0x18
    PSK (ASCII passphrase) - hexdump_ascii(len=10): [REMOVED]
    disabled=1 (0x1)
    PSK (from passphrase) - hexdump(len=32): [REMOVED]
    Line: 16 - start of a new network block
    ssid - hexdump_ascii(len=7):
         61 73 65 6c 73 61 6e                              wifi_test         
    key_mgmt: 0x4
    wep_key0 - hexdump(len=13): [REMOVED]
    wep_tx_keyidx=0 (0x0)
    disabled=1 (0x1)
    Line: 24 - start of a new network block
    ssid - hexdump_ascii(len=7):
         61 73 65 6c 73 61 6e                              wifi_test         
    key_mgmt: 0x4
    wep_key0 - hexdump(len=5): [REMOVED]
    wep_tx_keyidx=0 (0x0)
    disabled=1 (0x1)
    Line: 33 - start of a new network block
    ssid - hexdump_ascii(len=7):
         61 73 65 6c 73 61 6e                              wifi_test         
    proto: 0x2
    key_mgmt: 0x2
    pairwise: 0x10
    group: 0x18
    PSK (ASCII passphrase) - hexdump_ascii(len=10): [REMOVED]
    disabled=1 (0x1)
    PSK (from passphrase) - hexdump(len=32): [REMOVED]
    Line: 45 - start of a new network block
    ssid - hexdump_ascii(len=7):
         61 73 65 6c 73 61 6e                              wifi_test         
    scan_ssid=1 (0x1)
    proto: 0x1
    key_mgmt: 0x2
    pairwise: 0x8
    auth_alg: 0x1
    PSK (ASCII passphrase) - hexdump_ascii(len=10): [REMOVED]
    disabled=0 (0x0)
    PSK (from passphrase) - hexdump(len=32): [REMOVED]
    Line 54: removed CCMP from group cipher list since it was not allowed for pairwise cipher
    Line: 55 - start of a new network block
    ssid - hexdump_ascii(len=7):
         61 73 65 6c 73 61 6e                              wifi_test         
    scan_ssid=1 (0x1)
    auth_alg: 0x1
    key_mgmt: 0x4
    disabled=1 (0x1)
    Line: 63 - start of a new network block
    ssid - hexdump_ascii(len=7):
         61 73 65 6c 73 61 6e                              wifi_test         
    scan_ssid=1 (0x1)
    auth_alg: 0x1
    key_mgmt: 0x4
    disabled=1 (0x1)
    Priority group 0
       id=0 ssid='wifi_test'
       id=1 ssid='wifi_test'
       id=2 ssid='wifi_test'
       id=3 ssid='wifi_test'
       id=4 ssid='wifi_test'
       id=5 ssid='wifi_test'
       id=6 ssid='wifi_test'
    nl80211: interface wlan0 in phy phy0
    rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
    netlink: Operstate: linkmode=1, operstate=5
    nl80211: Using driver-based off-channel TX
    nl80211: driver param='(null)'
    wlan0: Own MAC address: 00:12:34:56:78:90
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
    wlan0: RSN: flushing PMKID list in the driver
    WPS: Set UUID for interface wlan0
    WPS: UUID based on MAC address - hexdump(len=16): e8 f0 1f 99 6e b1 52 34 bf 7b 31 ba d1 79 f7 e8
    EAPOL: SUPP_PAE entering state DISCONNECTED
    EAPOL: Supplicant port status: Unauthorized
    EAPOL: KEY_RX entering state NO_KEY_RECEIVE
    EAPOL: SUPP_BE entering state INITIALIZE
    EAP: EAP entering state DISABLED
    EAPOL: Supplicant port status: Unauthorized
    EAPOL: Supplicant port status: Unauthorized
    Using existing control interface directory.
    P2P: Own listen channel: 1
    P2P: Random operating channel: 81:6
    nl80211: Regulatory information - country=00
    nl80211: 2402-2472 @ 40 MHz
    nl80211: 2457-2482 @ 20 MHz
    nl80211: 2474-2494 @ 20 MHz
    nl80211: 5170-5250 @ 40 MHz
    nl80211: 5735-5835 @ 40 MHz
    P2P: Add operating class 81
    P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
    wlan0: Added interface wlan0
    random: Got 20/20 bytes from /dev/random
    wlan0: Starting delayed sched scan
    wlan0: add to filter ssid: wifi_test
    wlan0: add to active scan ssid: wifi_test
    WPS: Building WPS IE for Probe Request
    WPS:  * Version (hardcoded 0x10)
    WPS:  * Request Type
    WPS:  * Config Methods (2388)
    WPS:  * UUID-E
    WPS:  * Primary Device Type
    WPS:  * RF Bands (3)
    WPS:  * Association State
    WPS:  * Configuration Error (0)
    WPS:  * Device Password ID (0)
    WPS:  * Manufacturer
    WPS:  * Model Name
    WPS:  * Model Number
    WPS:  * Device Name
    WPS:  * Version2 (0x20)
    P2P: * P2P IE header
    P2P: * Capability dev=23 group=00
    P2P: * Listen Channel: Regulatory Class 81 Channel 1
    wlan0: Starting sched scan: interval 3
    nl80211: Sched scan filter SSID - hexdump_ascii(len=7):
         61 73 65 6c 73 61 6e                              wifi_test         
    nl80211: Sched scan SSID - hexdump_ascii(len=7):
         61 73 65 6c 73 61 6e                              wifi_test         
    nl80211: Sched scan extra IEs - hexdump_ascii(len=126):
         dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00   _i_P___J____:___
         10 08 00 02 23 88 10 47 00 10 e8 f0 1f 99 6e b1   ____#__G______n_
         52 34 bf 7b 31 ba d1 79 f7 e8 10 54 00 08 00 00   R4_{1__y___T____
         00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00   _______<________
         00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00   ______________!_
         01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01   _ _#__ _$__ ____
         20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a    _I___7*__ __Po_
         09 02 02 00 23 00 06 05 00 58 58 04 51 01         ____#____XX_Q_  
    nl80211: Sched scan requested (ret=0) - scan interval 3000 msec
    nl80211: Event message available
    nl80211: Sched scan started
    nl80211: Event message available
    nl80211: New sched scan results available
    wlan0: Event 3 received on interface wlan0
    Received scan results (1 BSSes)
    wlan0: BSS: Start scan result update 1
    wlan0: BSS: Add new id 0 BSSID 00:25:9c:bb:01:cf SSID 'wifi_test'
    Add randomness: count=1 entropy=0
    random pool - hexdump(len=128): [REMOVED]
    random_mix_pool - hexdump(len=8): [REMOVED]
    random_mix_pool - hexdump(len=5): [REMOVED]
    random pool - hexdump(len=128): [REMOVED]
    wlan0: New scan results available
    WPS: attr type=0x104a len=1
    WPS: attr type=0x1044 len=1
    WPS: attr type=0x1041 len=1
    WPS: attr type=0x103b len=1
    WPS: attr type=0x1047 len=16
    WPS: attr type=0x1021 len=19
    WPS: attr type=0x1023 len=7
    WPS: attr type=0x1024 len=7
    WPS: attr type=0x1042 len=12
    WPS: attr type=0x1054 len=8
    WPS: attr type=0x1011 len=20
    WPS: attr type=0x1008 len=2
    WPS: attr type=0x104a len=1
    WPS: attr type=0x1044 len=1
    WPS: attr type=0x1041 len=1
    WPS: attr type=0x103b len=1
    WPS: attr type=0x1047 len=16
    WPS: attr type=0x1021 len=19
    WPS: attr type=0x1023 len=7
    WPS: attr type=0x1024 len=7
    WPS: attr type=0x1042 len=12
    WPS: attr type=0x1054 len=8
    WPS: attr type=0x1011 len=20
    WPS: attr type=0x1008 len=2
    WPS: attr type=0x104a len=1
    WPS: attr type=0x1044 len=1
    WPS: attr type=0x1041 len=1
    WPS: attr type=0x103b len=1
    WPS: attr type=0x1047 len=16
    WPS: attr type=0x1021 len=19
    WPS: attr type=0x1023 len=7
    WPS: attr type=0x1024 len=7
    WPS: attr type=0x1042 len=12
    WPS: attr type=0x1054 len=8
    WPS: attr type=0x1011 len=20
    WPS: attr type=0x1008 len=2
    wlan0: Selecting BSS from priority group 0
    wlan0: 0: 00:25:9c:bb:01:cf ssid='wifi_test' wpa_ie_len=22 rsn_ie_len=0 caps=0x531 level=-45 wps
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    selected based on WPA IE
    wlan0:    selected BSS 00:25:9c:bb:01:cf ssid='wifi_test'
    wlan0: Request association: reassociate: 0  selected: 00:25:9c:bb:01:cf  bssid: 00:00:00:00:00:00  D
    wlan0: Automatic auth_alg selection: 0x1
    wlan0: Overriding auth_alg selection: 0x1
    wlan0: WPA: using IEEE 802.11i/D3.0
    wlan0: WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
    WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 02
    wlan0: WPA: clearing AP RSN IE
    wlan0: WPA: using GTK TKIP
    wlan0: WPA: using PTK TKIP
    wlan0: WPA: using KEY_MGMT WPA-PSK
    WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02
    P2P: * P2P IE header
    P2P: * Capability dev=23 group=00
    P2P: * Device Info
    wlan0: Cancelling sched scan
    nl80211: Sched scan stop sent (ret=0)
    wlan0: Cancelling scan request
    wlan0: SME: Trying to authenticate with 00:25:9c:bb:01:cf (SSID='wifi_test' freq=2437 MHz)
    wlan0: No keys have been configured - skip key clearing
    wlan0: State: DISCONNECTED -> AUTHENTICATING
    EAPOL: External notification - EAP success=0
    EAPOL: Supplicant port status: Unauthorized
    EAPOL: External notification - EAP fail=0
    EAPOL: Supplicant port status: Unauthorized
    EAPOL: External notification - portControl=Auto
    EAPOL: Supplicant port status: Unauthorized
    nl80211: Authenticate (ifindex=4)
      * bssid=00:25:9c:bb:01:cf
      * freq=2437
      * SSID - hexdump_ascii(len=7):
         61 73 65 6c 73 61 6e                              wifi_test         
      * IEs - hexdump(len=0): [NULL]
      * Auth Type 0
    nl80211: Authentication request send successfully
    wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
    nl80211: Event message available
    nl80211: Sched scan stopped
    wlan0: Event 45 received on interface wlan0
    nl80211: Event message available
    nl80211: MLME event 37
    nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 00 12 34 56 78 90 00 25 9c bb 01 cf 00 25 0
    wlan0: Event 11 received on interface wlan0
    wlan0: SME: Authentication response: peer=00:25:9c:bb:01:cf auth_type=0 status_code=0
    SME: Authentication response IEs - hexdump(len=0): [NULL]
    wlan0: Trying to associate with 00:25:9c:bb:01:cf (SSID='wifi_test' freq=2437 MHz)
    wlan0: State: AUTHENTICATING -> ASSOCIATING
    wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
    netlink: Operstate: linkmode=-1, operstate=5
    WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 012
    nl80211: Associate (ifindex=4)
      * bssid=00:25:9c:bb:01:cf
      * freq=2437
      * SSID - hexdump_ascii(len=7):
         61 73 65 6c 73 61 6e                              wifi_test         
      * IEs - hexdump(len=59): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 0
      * pairwise=0xfac02
      * group=0xfac02
      * P2P group
    nl80211: Association request send successfully
    EAPOL: disable timer tick
    EAPOL: Supplicant port status: Unauthorized
    nl80211: Event message available
    nl80211: Delete station 00:25:9c:bb:01:cf
    nl80211: Event message available
    nl80211: MLME event 38
    nl80211: MLME event frame -wl1271: ERROR invalid hlid. dropping skb 0xcb31dcc0
     hexdump(len=147): 10 00 3a 01 00 12 34 56 78 90 00 25 9c bb 01 cf 00 25 9c bb 01 cf 10 00 31 05 0a0
    wlan0: Event 13 received on interface wlan0
    wlan0: CTRL-EVENT-ASSOC-REJECT bssid=00:25:9c:bb:01:cf status_code=10
    wlan0: SME: Association with 00:25:9c:bb:01:cf failed: status code 10
    wpa_driver_nl80211_deauthenticate(addr=00:25:9c:bb:01:cf reason_code=3)
    Added BSSID 00:25:9c:bb:01:cf into blacklist
    wlan0: Setting scan request: 0 sec 100000 usec
    wlan0: State: ASSOCIATING -> DISCONNECTED
    wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
    netlink: Operstate: linkmode=-1, operstate=5
    nl80211: Event message available
    nl80211: Ignore connect event (cmd=46) when using userspace SME
    nl80211: Event message available
    nl80211: MLME event 39
    nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 25 9c bb 01 cf 00 12 34 56 78 90 00 25 0
    wlan0: Event 12 received on interface wlan0
    wlan0: Deauthentication notification
    wlan0:  * reason 3
    wlan0:  * address 00:25:9c:bb:01:cf
    Deauthentication frame IE(s) - hexdump(len=0): [NULL]
    wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
    Added BSSID 00:00:00:00:00:00 into blacklist
    wlan0: Not rescheduling scan to ensure that specific SSID scans occur
    wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
    wlan0: Disconnect event - remove keys
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0xe04b4 key_idx=0 set_tx=0 seq_len=0 key_len=0
       addr=00:00:00:00:00:00
    wlan0: State: DISCONNECTED -> DISCONNECTED
    wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
    netlink: Operstate: linkmode=-1, operstate=5
    EAPOL: External notification - portEnabled=0
    EAPOL: Supplicant port status: Unauthorized
    EAPOL: External notification - portValid=0
    EAPOL: Supplicant port status: Unauthorized
    EAPOL: External notification - EAP success=0
    EAPOL: Supplicant port status: Unauthorized
    wlan0: State: DISCONNECTED -> SCANNING
    wlan0: Starting AP scan for specific SSID(s)
    WPS: Building WPS IE for Probe Request
    WPS:  * Version (hardcoded 0x10)
    WPS:  * Request Type
    WPS:  * Config Methods (2388)
    WPS:  * UUID-E
    WPS:  * Primary Device Type
    WPS:  * RF Bands (3)
    WPS:  * Association State
    WPS:  * Configuration Error (0)
    WPS:  * Device Password ID (0)
    WPS:  * Manufacturer
    WPS:  * Model Name
    WPS:  * Model Number
    WPS:  * Device Name
    WPS:  * Version2 (0x20)
    P2P: * P2P IE header
    P2P: * Capability dev=23 group=00
    P2P: * Listen Channel: Regulatory Class 81 Channel 1
    nl80211: Scan SSID - hexdump_ascii(len=7):
         61 73 65 6c 73 61 6e                              wifi_test         
    nl80211: Scan extra IEs - hexdump_ascii(len=126):
         dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00   _i_P___J____:___
         10 08 00 02 23 88 10 47 00 10 e8 f0 1f 99 6e b1   ____#__G______n_
         52 34 bf 7b 31 ba d1 79 f7 e8 10 54 00 08 00 00   R4_{1__y___T____
         00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00   _______<________
         00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00   ______________!_
         01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01   _ _#__ _$__ ____
         20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a    _I___7*__ __Po_
         09 02 02 00 23 00 06 05 00 58 58 04 51 01         ____#____XX_Q_  
    Scan requested (ret=0) - scan timeout 10 seconds
    nl80211: Event message available
    nl80211: Scan trigger
    nl80211: Event message available
    nl80211: New scan results available
    wlan0: Event 3 received on interface wlan0
    Received scan results (1 BSSes)
    wlan0: BSS: Start scan result update 2
    Add randomness: count=2 entropy=1
    random pool - hexdump(len=128): [REMOVED]
    random_mix_pool - hexdump(len=8): [REMOVED]
    random_mix_pool - hexdump(len=5): [REMOVED]
    random pool - hexdump(len=128): [REMOVED]
    wlan0: New scan results available
    WPS: attr type=0x104a len=1
    WPS: attr type=0x1044 len=1
    WPS: attr type=0x1041 len=1
    WPS: attr type=0x103b len=1
    WPS: attr type=0x1047 len=16
    WPS: attr type=0x1021 len=19
    WPS: attr type=0x1023 len=7
    WPS: attr type=0x1024 len=7
    WPS: attr type=0x1042 len=12
    WPS: attr type=0x1054 len=8
    WPS: attr type=0x1011 len=20
    WPS: attr type=0x1008 len=2
    WPS: attr type=0x104a len=1
    WPS: attr type=0x1044 len=1
    WPS: attr type=0x1041 len=1
    WPS: attr type=0x103b len=1
    WPS: attr type=0x1047 len=16
    WPS: attr type=0x1021 len=19
    WPS: attr type=0x1023 len=7
    WPS: attr type=0x1024 len=7
    WPS: attr type=0x1042 len=12
    WPS: attr type=0x1054 len=8
    WPS: attr type=0x1011 len=20
    WPS: attr type=0x1008 len=2
    WPS: attr type=0x104a len=1
    WPS: attr type=0x1044 len=1
    WPS: attr type=0x1041 len=1
    WPS: attr type=0x103b len=1
    WPS: attr type=0x1047 len=16
    WPS: attr type=0x1021 len=19
    WPS: attr type=0x1023 len=7
    WPS: attr type=0x1024 len=7
    WPS: attr type=0x1042 len=12
    WPS: attr type=0x1054 len=8
    WPS: attr type=0x1011 len=20
    WPS: attr type=0x1008 len=2
    wlan0: Selecting BSS from priority group 0
    wlan0: 0: 00:25:9c:bb:01:cf ssid='wifi_test' wpa_ie_len=22 rsn_ie_len=0 caps=0x531 level=-45 wps
    wlan0:    skip - blacklisted (count=1 limit=0)
    wlan0: No APs found - clear blacklist and try again
    Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
    Removed BSSID 00:25:9c:bb:01:cf from blacklist (clear)
    wlan0: Selecting BSS from priority group 0
    wlan0: 0: 00:25:9c:bb:01:cf ssid='wifi_test' wpa_ie_len=22 rsn_ie_len=0 caps=0x531 level=-45 wps
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    selected based on WPA IE
    wlan0:    selected BSS 00:25:9c:bb:01:cf ssid='wifi_test'
    wlan0: Request association: reassociate: 0  selected: 00:25:9c:bb:01:cf  bssid: 00:00:00:00:00:00  G
    wlan0: Automatic auth_alg selection: 0x1
    wlan0: Overriding auth_alg selection: 0x1
    wlan0: WPA: using IEEE 802.11i/D3.0
    wlan0: WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
    WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 02
    wlan0: WPA: clearing AP RSN IE
    wlan0: WPA: using GTK TKIP
    wlan0: WPA: using PTK TKIP
    wlan0: WPA: using KEY_MGMT WPA-PSK
    WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02
    P2P: * P2P IE header
    P2P: * Capability dev=23 group=00
    P2P: * Device Info
    wlan0: cancel_sched_scan called when no sched scan
    wlan0: Cancelling scan request
    wlan0: SME: Trying to authenticate with 00:25:9c:bb:01:cf (SSID='wifi_test' freq=2437 MHz)
    wlan0: No keys have been configured - skip key clearing
    wlan0: State: SCANNING -> AUTHENTICATING
    EAPOL: External notification - EAP success=0
    EAPOL: Supplicant port status: Unauthorized
    EAPOL: External notification - EAP fail=0
    EAPOL: Supplicant port status: Unauthorized
    EAPOL: External notification - portControl=Auto
    EAPOL: Supplicant port status: Unauthorized
    nl80211: Authenticate (ifindex=4)
      * bssid=00:25:9c:bb:01:cf
      * freq=2437
      * SSID - hexdump_ascii(len=7):
         61 73 65 6c 73 61 6e                              wifi_test         
      * IEs - hexdump(len=0): [NULL]
      * Auth Type 0
    nl80211: Authentication request send successfully
    wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    wlan0: Event 5 received on interface wlan0
    nl80211: Event message available
    nl80211: MLME event 37
    nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 00 12 34 56 78 90 00 25 9c bb 01 cf 00 25 0
    wlan0: Event 11 received on interface wlan0
    wlan0: SME: Authentication response: peer=00:25:9c:bb:01:cf auth_type=0 status_code=0
    SME: Authentication response IEs - hexdump(len=0): [NULL]
    wlan0: Trying to associate with 00:25:9c:bb:01:cf (SSID='wifi_test' freq=2437 MHz)
    wlan0: State: AUTHENTICATING -> ASSOCIATING
    wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
    netlink: Operstate: linkmode=-1, operstate=5
    WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 012
    nl80211: Associate (ifindex=4)
      * bssid=00:25:9c:bb:01:cf
      * freq=2437
      * SSID - hexdump_ascii(len=7):
         61 73 65 6c 73 61 6e                              wifi_test         
      * IEs - hexdump(len=59): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 0
      * pairwise=0xfac02
      * group=0xfac02
      * P2P group
    nl80wl1271: ERROR invalid hlid. dropping skb 0xcb31d780
    211: Association request send successfully
    nl80211: Event message available
    nl80211: Delete station 00:25:9c:bb:01:cf
    nl80211: Event message available
    nl80211: MLME event 38
    nl80211: MLME event frame - hexdump(len=147): 10 00 3a 01 00 12 34 56 78 90 00 25 9c bb 01 cf 00 250
    wlan0: Event 13 received on interface wlan0
    wlan0: CTRL-EVENT-ASSOC-REJECT bssid=00:25:9c:bb:01:cf status_code=10
    wlan0: SME: Association with 00:25:9c:bb:01:cf failed: status code 10
    wpa_driver_nl80211_deauthenticate(addr=00:25:9c:bb:01:cf reason_code=3)
    Added BSSID 00:25:9c:bb:01:cf into blacklist
    wlan0: Setting scan request: 0 sec 100000 usec
    wlan0: State: ASSOCIATING -> DISCONNECTED
    wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
    netlink: Operstate: linkmode=-1, operstate=5
    nl80211: Event message available
    nl80211: Ignore connect event (cmd=46) when using userspace SME
    nl80211: Event message available
    nl80211: MLME event 39
    nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 25 9c bb 01 cf 00 12 34 56 78 90 00 25 0
    wlan0: Event 12 received on interface wlan0
    wlan0: Deauthentication notification
    wlan0:  * reason 3
    wlan0:  * address 00:25:9c:bb:01:cf
    Deauthentication frame IE(s) - hexdump(len=0): [NULL]
    wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
    Added BSSID 00:00:00:00:00:00 into blacklist
    wlan0: Not rescheduling scan to ensure that specific SSID scans occur
    wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
    wlan0: Disconnect event - remove keys
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0xe04b4 key_idx=0 set_tx=0 seq_len=0 key_len=0
       addr=00:00:00:00:00:00
    wlan0: State: DISCONNECTED -> DISCONNECTED
    wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
    netlink: Operstate: linkmode=-1, operstate=5
    EAPOL: External notification - portEnabled=0
    EAPOL: Supplicant port status: Unauthorized
    EAPOL: External notification - portValid=0
    EAPOL: Supplicant port status: Unauthorized
    EAPOL: External notification - EAP success=0
    EAPOL: Supplicant port status: Unauthorized
    wlan0: State: DISCONNECTED -> SCANNING
    wlan0: Starting AP scan for wildcard SSID
    WPS: Building WPS IE for Probe Request
    WPS:  * Version (hardcoded 0x10)
    WPS:  * Request Type
    WPS:  * Config Methods (2388)
    WPS:  * UUID-E
    WPS:  * Primary Device Type
    WPS:  * RF Bands (3)
    WPS:  * Association State
    WPS:  * Configuration Error (0)
    WPS:  * Device Password ID (0)
    WPS:  * Manufacturer
    WPS:  * Model Name
    WPS:  * Model Number
    WPS:  * Device Name
    WPS:  * Version2 (0x20)
    P2P: * P2P IE header
    P2P: * Capability dev=23 group=00
    P2P: * Listen Channel: Regulatory Class 81 Channel 1
    nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
    nl80211: Scan extra IEs - hexdump_ascii(len=126):
         dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00   _i_P___J____:___
         10 08 00 02 23 88 10 47 00 10 e8 f0 1f 99 6e b1   ____#__G______n_
         52 34 bf 7b 31 ba d1 79 f7 e8 10 54 00 08 00 00   R4_{1__y___T____
         00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00   _______<________
         00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00   ______________!_
         01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01   _ _#__ _$__ ____
         20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a    _I___7*__ __Po_
         09 02 02 00 23 00 06 05 00 58 58 04 51 01         ____#____XX_Q_  
    Scan requested (ret=0) - scan timeout 30 seconds
    nl80211: Event message available
    nl80211: Scan trigger
    nl80211: Event message available
    nl80211: New scan results available
    wlan0: Event 3 received on interface wlan0
    Received scan results (3 BSSes)
    wlan0: BSS: Start scan result update 3
    wlan0: BSS: Add new id 1 BSSID 00:24:a8:b3:16:51 SSID 'Mistral - WiFi'
    wlan0: BSS: Add new id 2 BSSID 00:24:a8:b3:16:50 SSID 'Mistral-Guest-WiFi'
    Add randomness: count=3 entropy=2
    random pool - hexdump(len=128): [REMOVED]
    random_mix_pool - hexdump(len=8): [REMOVED]
    random_mix_pool - hexdump(len=5): [REMOVED]
    random pool - hexdump(len=128): [REMOVED]
    Add randomness: count=4 entropy=3
    random pool - hexdump(len=128): [REMOVED]
    random_mix_pool - hexdump(len=8): [REMOVED]
    random_mix_pool - hexdump(len=5): [REMOVED]
    random pool - hexdump(len=128): [REMOVED]
    Add randomness: count=5 entropy=4
    random pool - hexdump(len=128): [REMOVED]
    random_mix_pool - hexdump(len=8): [REMOVED]
    random_mix_pool - hexdump(len=5): [REMOVED]
    random pool - hexdump(len=128): [REMOVED]
    wlan0: New scan results available
    WPS: attr type=0x104a len=1
    WPS: attr type=0x1044 len=1
    WPS: attr type=0x1041 len=1
    WPS: attr type=0x103b len=1
    WPS: attr type=0x1047 len=16
    WPS: attr type=0x1021 len=19
    WPS: attr type=0x1023 len=7
    WPS: attr type=0x1024 len=7
    WPS: attr type=0x1042 len=12
    WPS: attr type=0x1054 len=8
    WPS: attr type=0x1011 len=20
    WPS: attr type=0x1008 len=2
    WPS: attr type=0x104a len=1
    WPS: attr type=0x1044 len=1
    WPS: attr type=0x1041 len=1
    WPS: attr type=0x103b len=1
    WPS: attr type=0x1047 len=16
    WPS: attr type=0x1021 len=19
    WPS: attr type=0x1023 len=7
    WPS: attr type=0x1024 len=7
    WPS: attr type=0x1042 len=12
    WPS: attr type=0x1054 len=8
    WPS: attr type=0x1011 len=20
    WPS: attr type=0x1008 len=2
    WPS: attr type=0x104a len=1
    WPS: attr type=0x1044 len=1
    WPS: attr type=0x1041 len=1
    WPS: attr type=0x103b len=1
    WPS: attr type=0x1047 len=16
    WPS: attr type=0x1021 len=19
    WPS: attr type=0x1023 len=7
    WPS: attr type=0x1024 len=7
    WPS: attr type=0x1042 len=12
    WPS: attr type=0x1054 len=8
    WPS: attr type=0x1011 len=20
    WPS: attr type=0x1008 len=2
    wlan0: Selecting BSS from priority group 0
    wlan0: 0: 00:25:9c:bb:01:cf ssid='wifi_test' wpa_ie_len=22 rsn_ie_len=0 caps=0x531 level=-45 wps
    wlan0:    skip - blacklisted (count=1 limit=0)
    wlan0: 1: 00:24:a8:b3:16:51 ssid='Mistral - WiFi' wpa_ie_len=0 rsn_ie_len=20 caps=0x831 level=-45
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - SSID mismatch
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0: 2: 00:24:a8:b3:16:50 ssid='Mistral-Guest-WiFi' wpa_ie_len=0 rsn_ie_len=0 caps=0x821 level=-45
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - SSID mismatch
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0: No APs found - clear blacklist and try again
    Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
    Removed BSSID 00:25:9c:bb:01:cf from blacklist (clear)
    wlan0: Selecting BSS from priority group 0
    wlan0: 0: 00:25:9c:bb:01:cf ssid='wifi_test' wpa_ie_len=22 rsn_ie_len=0 caps=0x531 level=-45 wps
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    selected based on WPA IE
    wlan0:    selected BSS 00:25:9c:bb:01:cf ssid='wifi_test'
    wlan0: Request association: reassociate: 0  selected: 00:25:9c:bb:01:cf  bssid: 00:00:00:00:00:00  G
    wlan0: Automatic auth_alg selection: 0x1
    wlan0: Overriding auth_alg selection: 0x1
    wlan0: WPA: using IEEE 802.11i/D3.0
    wlan0: WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
    WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 02
    wlan0: WPA: clearing AP RSN IE
    wlan0: WPA: using GTK TKIP
    wlan0: WPA: using PTK TKIP
    wlan0: WPA: using KEY_MGMT WPA-PSK
    WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02
    P2P: * P2P IE header
    P2P: * Capability dev=23 group=00
    P2P: * Device Info
    wlan0: cancel_sched_scan called when no sched scan
    wlan0: Cancelling scan request
    wlan0: SME: Trying to authenticate with 00:25:9c:bb:01:cf (SSID='wifi_test' freq=2437 MHz)
    wlan0: No keys have been configured - skip key clearing
    wlan0: State: SCANNING -> AUTHENTICATING
    EAPOL: External notification - EAP success=0
    EAPOL: Supplicant port status: Unauthorized
    EAPOL: External notification - EAP fail=0
    EAPOL: Supplicant port status: Unauthorized
    EAPOL: External notification - portControl=Auto
    EAPOL: Supplicant port status: Unauthorized
    nl80211: Authenticate (ifindex=4)
      * bssid=00:25:9c:bb:01:cf
      * freq=2437
      * SSID - hexdump_ascii(len=7):
         61 73 65 6c 73 61 6e                              wifi_test         
      * IEs - hexdump(len=0): [NULL]
      * Auth Type 0
    nl80211: Authentication request send successfully
    wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    wlan0: Event 5 received on interface wlan0
    nl80211: Event message available
    nl80211: MLME event 37
    nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 00 12 34 56 78 90 00 25 9c bb 01 cf 00 25 0
    wlan0: Event 11 received on interface wlan0
    wlan0: SME: Authentication response: peewl1271: ERROR invalid hlid. dropping skb 0xcb31de40
    r=00:25:9c:bb:01:cf auth_type=0 status_code=0
    SME: Authentication response IEs - hexdump(len=0): [NULL]
    wlan0: Trying to associate with 00:25:9c:bb:01:cf (SSID='wifi_test' freq=2437 MHz)
    wlan0: State: AUTHENTICATING -> ASSOCIATING
    wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
    netlink: Operstate: linkmode=-1, operstate=5
    WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 012
    nl80211: Associate (ifindex=4)
      * bssid=00:25:9c:bb:01:cf
      * freq=2437
      * SSID - hexdump_ascii(len=7):
         61 73 65 6c 73 61 6e                              wifi_test         
      * IEs - hexdump(len=59): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 0
      * pairwise=0xfac02
      * group=0xfac02
      * P2P group
    root@dm814x-evm:~# wpa_supplicant -iwlan0 -Dnl80211 -c wpa_supplicant.txt -ddd &
    nl80211: Association request send successfully
    nl80211: Event message available
    nl80211: Delete station 00:25:9c:bb:01:cf
    nl80211: Event message available
    nl80211: MLME event 38
    nl80211: MLME event frame - hexdump(len=147): 10 00 3a 01 00 12 34 56 78 90 00 25 9c bb 01 cf 00 250
    wlan0: Event 13 received on interface wlan0
    wlan0: CTRL-EVENT-ASSOC-REJECT bssid=00:25:9c:bb:01:cf status_code=10
    wlan0: SME: Association with 00:25:9c:bb:01:cf failed: status code 10
    wpa_driver_nl80211_deauthenticate(addr=00:25:9c:bb:01:cf reason_code=3)
    Added BSSID 00:25:9c:bb:01:cf into blacklist
    wlan0: Setting scan request: 0 sec 100000 usec
    wlan0: State: ASSOCIATING -> DISCONNECTED
    wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
    netlink: Operstate: linkmode=-1, operstate=5
    nl80211: Event message available
    nl80211: Ignore connect event (cmd=46) when using userspace SME
    nl80211: Event message available
    nl80211: MLME event 39
    nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 25 9c bb 01 cf 00 12 34 56 78 90 00 25 0
    wlan0: Event 12 received on interface wlan0
    wlan0: Deauthentication notification
    wlan0:  * reason 3
    wlan0:  * address 00:25:9c:bb:01:cf
    Deauthentication frame IE(s) - hexdump(len=0): [NULL]
    wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
    Added BSSID 00:00:00:00:00:00 into blacklist
    wlan0: Not rescheduling scan to ensure that specific SSID scans occur
    wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
    wlan0: Disconnect event - remove keys
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0xe04b4 key_idx=0 set_tx=0 seq_len=0 key_len=0
       addr=00:00:00:00:00:00
    wlan0: State: DISCONNECTED -> DISCONNECTED
    wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
    netlink: Operstate: linkmode=-1, operstate=5
    EAPOL: External notification - portEnabled=0
    EAPOL: Supplicant port status: Unauthorized
    EAPOL: External notification - portValid=0
    EAPOL: Supplicant port status: Unauthorized
    EAPOL: External notification - EAP success=0
    EAPOL: Supplicant port status: Unauthorized
    wlan0: State: DISCONNECTED -> SCANNING
    wlan0: Starting AP scan for specific SSID(s)
    WPS: Building WPS IE for Probe Request
    WPS:  * Version (hardcoded 0x10)
    WPS:  * Request Type
    WPS:  * Config Methods (2388)
    WPS:  * UUID-E
    WPS:  * Primary Device Type
    WPS:  * RF Bands (3)
    WPS:  * Association State
    WPS:  * Configuration Error (0)
    WPS:  * Device Password ID (0)
    WPS:  * Manufacturer
    WPS:  * Model Name
    WPS:  * Model Number
    WPS:  * Device Name
    WPS:  * Version2 (0x20)
    P2P: * P2P IE header
    P2P: * Capability dev=23 group=00
    P2P: * Listen Channel: Regulatory Class 81 Channel 1
    nl80211: Scan SSID - hexdump_ascii(len=7):
         61 73 65 6c 73 61 6e                              wifi_test         
    nl80211: Scan extra IEs - hexdump_ascii(len=126):
         dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00   _i_P___J____:___
         10 08 00 02 23 88 10 47 00 10 e8 f0 1f 99 6e b1   ____#__G______n_
         52 34 bf 7b 31 ba d1 79 f7 e8 10 54 00 08 00 00   R4_{1__y___T____
         00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00   _______<________
         00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00   ______________!_
         01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01   _ _#__ _$__ ____
         20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a    _I___7*__ __Po_
         09 02 02 00 23 00 06 05 00 58 58 04 51 01         ____#____XX_Q_  
    Scan requested (ret=0) - scan timeout 30 seconds
    nl80211: Event message available
    nl80211: Scan trigger
    nl80211: Event message available
    nl80211: New scan results available
    wlan0: Event 3 received on interface wlan0
    Received scan results (3 BSSes)
    wlan0: BSS: Start scan result update 4
    Add randomness: count=6 entropy=5
    random pool - hexdump(len=128): [REMOVED]
    random_mix_pool - hexdump(len=8): [REMOVED]
    random_mix_pool - hexdump(len=5): [REMOVED]
    random pool - hexdump(len=128): [REMOVED]
    Add randomness: count=7 entropy=6
    random pool - hexdump(len=128): [REMOVED]
    random_mix_pool - hexdump(len=8): [REMOVED]
    random_mix_pool - hexdump(len=5): [REMOVED]
    random pool - hexdump(len=128): [REMOVED]
    Add randomness: count=8 entropy=7
    random pool - hexdump(len=128): [REMOVED]
    random_mix_pool - hexdump(len=8): [REMOVED]
    random_mix_pool - hexdump(len=5): [REMOVED]
    random pool - hexdump(len=128): [REMOVED]
    wlan0: New scan results available
    WPS: attr type=0x104a len=1
    WPS: attr type=0x1044 len=1
    WPS: attr type=0x1041 len=1
    WPS: attr type=0x103b len=1
    WPS: attr type=0x1047 len=16
    WPS: attr type=0x1021 len=19
    WPS: attr type=0x1023 len=7
    WPS: attr type=0x1024 len=7
    WPS: attr type=0x1042 len=12
    WPS: attr type=0x1054 len=8
    WPS: attr type=0x1011 len=20
    WPS: attr type=0x1008 len=2
    WPS: attr type=0x104a len=1
    WPS: attr type=0x1044 len=1
    WPS: attr type=0x1041 len=1
    WPS: attr type=0x103b len=1
    WPS: attr type=0x1047 len=16
    WPS: attr type=0x1021 len=19
    WPS: attr type=0x1023 len=7
    WPS: attr type=0x1024 len=7
    WPS: attr type=0x1042 len=12
    WPS: attr type=0x1054 len=8
    WPS: attr type=0x1011 len=20
    WPS: attr type=0x1008 len=2
    WPS: attr type=0x104a len=1
    WPS: attr type=0x1044 len=1
    WPS: attr type=0x1041 len=1
    WPS: attr type=0x103b len=1
    WPS: attr type=0x1047 len=16
    WPS: attr type=0x1021 len=19
    WPS: attr type=0x1023 len=7
    WPS: attr type=0x1024 len=7
    WPS: attr type=0x1042 len=12
    WPS: attr type=0x1054 len=8
    WPS: attr type=0x1011 len=20
    WPS: attr type=0x1008 len=2
    wlan0: Selecting BSS from priority group 0
    wlan0: 0: 00:25:9c:bb:01:cf ssid='wifi_test' wpa_ie_len=22 rsn_ie_len=0 caps=0x531 level=-45 wps
    wlan0:    skip - blacklisted (count=1 limit=0)
    wlan0: 1: 00:24:a8:b3:16:51 ssid='Mistral - WiFi' wpa_ie_len=0 rsn_ie_len=20 caps=0x831 level=-45
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - SSID mismatch
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0: 2: 00:24:a8:b3:16:50 ssid='Mistral-Guest-WiFi' wpa_ie_len=0 rsn_ie_len=0 caps=0x821 level=-45
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - SSID mismatch
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0: No APs found - clear blacklist and try again
    Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
    Removed BSSID 00:25:9c:bb:01:cf from blacklist (clear)
    wlan0: Selecting BSS from priority group 0
    wlan0: 0: 00:25:9c:bb:01:cf ssid='wifi_test' wpa_ie_len=22 rsn_ie_len=0 caps=0x531 level=-45 wps
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    selected based on WPA IE
    wlan0:    selected BSS 00:25:9c:bb:01:cf ssid='wifi_test'
    wlan0: Request association: reassociate: 0  selected: 00:25:9c:bb:01:cf  bssid: 00:00:00:00:00:00  G
    wlan0: Automatic auth_alg selection: 0x1
    wlan0: Overriding auth_alg selection: 0x1
    wlan0: WPA: using IEEE 802.11i/D3.0
    wlan0: WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
    WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 02
    wlan0: WPA: clearing AP RSN IE
    wlan0: WPA: using GTK TKIP
    wlan0: WPA: using PTK TKIP
    wlan0: WPA: using KEY_MGMT WPA-PSK
    WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02
    P2P: * P2P IE header
    P2P: * Capability dev=23 group=00
    P2P: * Device Info
    wlan0: cancel_sched_scan called when no sched scan
    wlan0: Cancelling scan request
    wlan0: SME: Trying to authenticate with 00:25:9c:bb:01:cf (SSID='wifi_test' freq=2437 MHz)
    wlan0: No keys have been configured - skip key clearing
    wlan0: State: SCANNING -> AUTHENTICATING
    EAPOL: External notification - EAP success=0
    EAPOL: Supplicant port status: Unauthorized
    EAPOL: External notification - EAP fail=0
    EAPOL: Supplicant port status: Unauthorized
    EAPOL: External notification - portControl=Auto
    EAPOL: Supplicant port status: Unauthorized
    nl80211: Authenticate (ifindex=4)
      * bssid=00:25:9c:bb:01:cf
      * freq=2437
      * SSID - hexdump_ascii(len=7):
         61 73 65 6c 73 61 6e                              wifi_test         
      * IEs - hexdump(len=0): [NULL]
      * Auth Type 0
    nl80211: Authentication request send successfully
    wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    root@dm814x-evm:~# nl80211: Event message available
    nl80211: MLME event 37
    nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 00 12 34 56 78 90 00 25 9c bb 01 cf 00 25 0
    wlan0: Event 11 received on interface wlan0
    wlan0: SME: Authentication response: peer=00:25:9c:bb:01:cf auth_type=0 status_code=0
    SME: Authentication response IEs - hexdumpwl1271: ERROR invalid hlid. dropping skb 0xcb31d900
    (len=0): [NULL]
    wlan0: Trying to associate with 00:25:9c:bb:01:cf (SSID='wifi_test' freq=2437 MHz)
    wlan0: State: AUTHENTICATING -> ASSOCIATING
    wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
    netlink: Operstate: linkmode=-1, operstate=5
    WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 012
    nl80211: Associate (ifindex=4)
      * bssid=00:25:9c:bb:01:cf
      * freq=2437
      * SSID - hexdump_ascii(len=7):
         61 73 65 6c 73 61 6e                              wifi_test         
      * IEs - hexdump(len=59): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 0
      * pairwise=0xfac02
      * group=0xfac02
      * P2P group
    nl80211: Association request send successfully
    nl80211: Event message available
    nl80211: Delete station 00:25:9c:bb:01:cf
    nl80211: Event message available
    nl80211: MLME event 38
    nl80211: MLME event frame - hexdump(len=147): 10 00 3a 01 00 12 34 56 78 90 00 25 9c bb 01 cf 00 250
    wlan0: Event 13 received on interface wlan0
    wlan0: CTRL-EVENT-ASSOC-REJECT bssid=00:25:9c:bb:01:cf status_code=10
    wlan0: SME: Association with 00:25:9c:bb:01:cf failed: status code 10
    wpa_driver_nl80211_deauthenticate(addr=00:25:9c:bb:01:cf reason_code=3)
    Added BSSID 00:25:9c:bb:01:cf into blacklist
    wlan0: Setting scan request: 0 sec 100000 usec
    wlan0: State: ASSOCIATING -> DISCONNECTED
    wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
    netlink: Operstate: linkmode=-1, operstate=5
    nl80211: Event message available
    nl80211: Ignore connect event (cmd=46) when using userspace SME
    nl80211: Event message available
    nl80211: MLME event 39
    nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 00 25 9c bb 01 cf 00 12 34 56 78 90 00 25 0
    wlan0: Event 12 received on interface wlan0
    wlan0: Deauthentication notification
    wlan0:  * reason 3
    wlan0:  * address 00:25:9c:bb:01:cf
    Deauthentication frame IE(s) - hexdump(len=0): [NULL]
    wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
    Added BSSID 00:00:00:00:00:00 into blacklist
    wlan0: Not rescheduling scan to ensure that specific SSID scans occur
    wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=3
    wlan0: Disconnect event - remove keys
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
    wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0xe04b4 key_idx=0 set_tx=0 seq_len=0 key_len=0
       addr=00:00:00:00:00:00
    wlan0: State: DISCONNECTED -> DISCONNECTED
    wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
    netlink: Operstate: linkmode=-1, operstate=5
    EAPOL: External notification - portEnabled=0
    EAPOL: Supplicant port status: Unauthorized
    EAPOL: External notification - portValid=0
    EAPOL: Supplicant port status: Unauthorized
    EAPOL: External notification - EAP success=0
    EAPOL: Supplicant port status: Unauthorized
    wlan0: State: DISCONNECTED -> SCANNING
    wlan0: Starting AP scan for wildcard SSID
    WPS: Building WPS IE for Probe Request
    WPS:  * Version (hardcoded 0x10)
    WPS:  * Request Type
    WPS:  * Config Methods (2388)
    WPS:  * UUID-E
    WPS:  * Primary Device Type
    WPS:  * RF Bands (3)
    WPS:  * Association State
    WPS:  * Configuration Error (0)
    WPS:  * Device Password ID (0)
    WPS:  * Manufacturer
    WPS:  * Model Name
    WPS:  * Model Number
    WPS:  * Device Name
    WPS:  * Version2 (0x20)
    P2P: * P2P IE header
    P2P: * Capability dev=23 group=00
    P2P: * Listen Channel: Regulatory Class 81 Channel 1
    nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
    nl80211: Scan extra IEs - hexdump_ascii(len=126):
         dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00   _i_P___J____:___
         10 08 00 02 23 88 10 47 00 10 e8 f0 1f 99 6e b1   ____#__G______n_
         52 34 bf 7b 31 ba d1 79 f7 e8 10 54 00 08 00 00   R4_{1__y___T____
         00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00   _______<________
         00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00   ______________!_
         01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01   _ _#__ _$__ ____
         20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a    _I___7*__ __Po_
         09 02 02 00 23 00 06 05 00 58 58 04 51 01         ____#____XX_Q_  
    Scan requested (ret=0) - scan timeout 30 seconds
    nl80211: Event message available
    nl80211: Scan trigger
    root@dm814x-evm:~# wpa_supplicant -iwlan0 -Dnl80211 -c wpa_supplicant.txt -ddd &
    nl80211: Event message available
    nl80211: New scan results available
    wlan0: Event 3 received on interface wlan0
    Received scan results (5 BSSes)
    wlan0: BSS: Start scan result update 5
    wlan0: BSS: Add new id 3 BSSID 00:22:75:09:8e:e6 SSID 'tikonacall'
    wlan0: BSS: Add new id 4 BSSID 5c:d9:98:5e:de:0e SSID 'RSIndiaB'
    Add randomness: count=9 entropy=8
    random pool - hexdump(len=128): [REMOVED]
    random_mix_pool - hexdump(len=8): [REMOVED]
    random_mix_pool - hexdump(len=5): [REMOVED]
    random pool - hexdump(len=128): [REMOVED]
    Add randomness: count=10 entropy=9
    random pool - hexdump(len=128): [REMOVED]
    random_mix_pool - hexdump(len=8): [REMOVED]
    random_mix_pool - hexdump(len=5): [REMOVED]
    random pool - hexdump(len=128): [REMOVED]
    Add randomness: count=11 entropy=10
    random pool - hexdump(len=128): [REMOVED]
    random_mix_pool - hexdump(len=8): [REMOVED]
    random_mix_pool - hexdump(len=5): [REMOVED]
    random pool - hexdump(len=128): [REMOVED]
    Add randomness: count=12 entropy=11
    random pool - hexdump(len=128): [REMOVED]
    random_mix_pool - hexdump(len=8): [REMOVED]
    random_mix_pool - hexdump(len=5): [REMOVED]
    random pool - hexdump(len=128): [REMOVED]
    Add randomness: count=13 entropy=12
    random pool - hexdump(len=128): [REMOVED]
    random_mix_pool - hexdump(len=8): [REMOVED]
    random_mix_pool - hexdump(len=5): [REMOVED]
    random pool - hexdump(len=128): [REMOVED]
    wlan0: New scan results available
    WPS: attr type=0x104a len=1
    WPS: attr type=0x1044 len=1
    WPS: attr type=0x1041 len=1
    WPS: attr type=0x103b len=1
    WPS: attr type=0x1047 len=16
    WPS: attr type=0x1021 len=19
    WPS: attr type=0x1023 len=7
    WPS: attr type=0x1024 len=7
    WPS: attr type=0x1042 len=12
    WPS: attr type=0x1054 len=8
    WPS: attr type=0x1011 len=20
    WPS: attr type=0x1008 len=2
    WPS: attr type=0x104a len=1
    WPS: attr type=0x1044 len=1
    WPS: attr type=0x1041 len=1
    WPS: attr type=0x103b len=1
    WPS: attr type=0x1047 len=16
    WPS: attr type=0x1021 len=19
    WPS: attr type=0x1023 len=7
    WPS: attr type=0x1024 len=7
    WPS: attr type=0x1042 len=12
    WPS: attr type=0x1054 len=8
    WPS: attr type=0x1011 len=20
    WPS: attr type=0x1008 len=2
    WPS: attr type=0x104a len=1
    WPS: attr type=0x1044 len=1
    WPS: attr type=0x1041 len=1
    WPS: attr type=0x103b len=1
    WPS: attr type=0x1047 len=16
    WPS: attr type=0x1021 len=19
    WPS: attr type=0x1023 len=7
    WPS: attr type=0x1024 len=7
    WPS: attr type=0x1042 len=12
    WPS: attr type=0x1054 len=8
    WPS: attr type=0x1011 len=20
    WPS: attr type=0x1008 len=2
    WPS: attr type=0x104a len=1
    WPS: attr type=0x1044 len=1
    WPS: attr type=0x103b len=1
    WPS: attr type=0x1047 len=16
    WPS: attr type=0x1021 len=6
    WPS: attr type=0x1023 len=15
    WPS: attr type=0x1024 len=7
    WPS: attr type=0x1042 len=14
    WPS: attr type=0x1054 len=8
    WPS: attr type=0x1011 len=32
    WPS: attr type=0x1008 len=2
    WPS: attr type=0x104a len=1
    WPS: attr type=0x1044 len=1
    WPS: attr type=0x103b len=1
    WPS: attr type=0x1047 len=16
    WPS: attr type=0x1021 len=6
    WPS: attr type=0x1023 len=15
    WPS: attr type=0x1024 len=7
    WPS: attr type=0x1042 len=14
    WPS: attr type=0x1054 len=8
    WPS: attr type=0x1011 len=32
    WPS: attr type=0x1008 len=2
    WPS: attr type=0x104a len=1
    WPS: attr type=0x1044 len=1
    WPS: attr type=0x103b len=1
    WPS: attr type=0x1047 len=16
    WPS: attr type=0x1021 len=6
    WPS: attr type=0x1023 len=15
    WPS: attr type=0x1024 len=7
    WPS: attr type=0x1042 len=14
    WPS: attr type=0x1054 len=8
    WPS: attr type=0x1011 len=32
    WPS: attr type=0x1008 len=2
    WPS: attr type=0x104a len=1
    WPS: attr type=0x1044 len=1
    WPS: attr type=0x103b len=1
    WPS: attr type=0x1047 len=16
    WPS: attr type=0x1021 len=6
    WPS: attr type=0x1023 len=13
    WPS: attr type=0x1024 len=7
    WPS: attr type=0x1042 len=4
    WPS: attr type=0x1054 len=8
    WPS: attr type=0x1011 len=22
    WPS: attr type=0x1008 len=2
    WPS: attr type=0x103c len=1
    WPS: attr type=0x1049 len=20
    WPS: Unknown Vendor Extension (Vendor ID 9442)
    WPS: attr type=0x104a len=1
    WPS: attr type=0x1044 len=1
    WPS: attr type=0x103b len=1
    WPS: attr type=0x1047 len=16
    WPS: attr type=0x1021 len=6
    WPS: attr type=0x1023 len=13
    WPS: attr type=0x1024 len=7
    WPS: attr type=0x1042 len=4
    WPS: attr type=0x1054 len=8
    WPS: attr type=0x1011 len=22
    WPS: attr type=0x1008 len=2
    WPS: attr type=0x103c len=1
    WPS: attr type=0x1049 len=20
    WPS: Unknown Vendor Extension (Vendor ID 9442)
    WPS: attr type=0x104a len=1
    WPS: attr type=0x1044 len=1
    WPS: attr type=0x103b len=1
    WPS: attr type=0x1047 len=16
    WPS: attr type=0x1021 len=6
    WPS: attr type=0x1023 len=13
    WPS: attr type=0x1024 len=7
    WPS: attr type=0x1042 len=4
    WPS: attr type=0x1054 len=8
    WPS: attr type=0x1011 len=22
    WPS: attr type=0x1008 len=2
    WPS: attr type=0x103c len=1
    WPS: attr type=0x1049 len=20
    WPS: Unknown Vendor Extension (Vendor ID 9442)
    wlan0: Selecting BSS from priority group 0
    wlan0: 0: 00:25:9c:bb:01:cf ssid='wifi_test' wpa_ie_len=22 rsn_ie_len=0 caps=0x531 level=-45 wps
    wlan0:    skip - blacklisted (count=1 limit=0)
    wlan0: 1: 00:24:a8:b3:16:51 ssid='Mistral - WiFi' wpa_ie_len=0 rsn_ie_len=20 caps=0x831 level=-45
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - SSID mismatch
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0: 2: 00:22:75:09:8e:e6 ssid='tikonacall' wpa_ie_len=28 rsn_ie_len=24 caps=0x411 level=-69 wps
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - SSID mismatch
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0: 3: 5c:d9:98:5e:de:0e ssid='RSIndiaB' wpa_ie_len=22 rsn_ie_len=0 caps=0x431 level=-76 wps
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - SSID mismatch
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0: 4: 00:24:a8:b3:16:50 ssid='Mistral-Guest-WiFi' wpa_ie_len=0 rsn_ie_len=0 caps=0x821 level=-45
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - SSID mismatch
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0: No APs found - clear blacklist and try again
    Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
    Removed BSSID 00:25:9c:bb:01:cf from blacklist (clear)
    wlan0: Selecting BSS from priority group 0
    wlan0: 0: 00:25:9c:bb:01:cf ssid='wifi_test' wpa_ie_len=22 rsn_ie_len=0 caps=0x531 level=-45 wps
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    skip - disabled
    wlan0:    selected based on WPA IE
    wlan0:    selected BSS 00:25:9c:bb:01:cf ssid='wifi_test'
    wlan0: Request association: reassociate: 0  selected: 00:25:9c:bb:01:cf  bssid: 00:00:00:00:00:00  G
    wlan0: Automatic auth_alg selection: 0x1
    wlan0: Overriding auth_alg selection: 0x1
    wlan0: WPA: using IEEE 802.11i/D3.0
    wlan0: WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
    WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 02
    wlan0: WPA: clearing AP RSN IE
    wlan0: WPA: using GTK TKIP
    wlan0: WPA: using PTK TKIP
    wlan0: WPA: using KEY_MGMT WPA-PSK
    WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02
    P2P: * P2P IE header
    P2P: * Capability dev=23 group=00
    P2P: * Device Info
    wlan0: cancel_sched_scan called when no sched scan
    wlan0: Cancelling scan request
    wlan0: SME: Trying to authenticate with 00:25:9c:bb:01:cf (SSID='wifi_test' freq=2437 MHz)
    wlan0: No keys have been configured - skip key clearing
    wlan0: State: SCANNING -> AUTHENTICATING
    EAPOL: External notification - EAP success=0
    EAPOL: Supplicant port status: Unauthorized
    EAPOL: External notification - EAP fail=0
    EAPOL: Supplicant port status: Unauthorized
    EAPOL: External notification - portControl=Auto
    EAPOL: Supplicant port status: Unauthorized
    nl80211: Authenticate (ifindex=4)
    root@dm814x-evm:~# killall -9 wpa_supplicant  * freq=2437
      * SSID - hexdump_ascii(len=7):
         61 73 65 6c 73 61 6e                              wifi_test         
      * IEs - hexdump(len=0): [NULL]
      * Auth Type 0
    nl80211: Authentication request send successfully
    wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
    RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
    RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
    wlan0: Event 5 received on interface wlan0
    nl80211: Event message available
    nl80211: MLME event 37
    nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 00 12 34 56 78 90 00 25 9c bb 01 cf 00 25 0
    wlan0: Event 11 received on interface wlan0
    wlan0: SME: Authentication response: peer=00:25:9c:bb:01:cf auth_type=0 status_code=0
    SME: Authentication response IEs - hexdump(len=0): [NULL]
    wlan0: Trying to associate with 00:25:9c:bb:01:cf (SSID='wifi_test' freq=2437 MHz)
    wlan0: State: AUTHENTICATING -> ASSOCIATING
    wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
    netlink: Operstate: linkmode=-1, operstate=5
    WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 012
    nl80211: Associate (ifindex=4)
      * bssid=00:25:9c:bb:01:cf
      * freq=2437
      * SSID - hexdump_ascii(len=7):
         61 73 65 6c 73 61 6e                              wifi_test         
      * IEs - hexdump(len=59): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 0
      * pairwise=0xfac02
      * group=0xfac02
      * P2P group
    nl80211: Association request send successfully
    
    [1] + Killed                     wpa_supplicant -iwlan0 -Dnl80211 -c wpa_supplicant.txt -ddd
    root@dm814x-evm:~# 
     CTRL-A Z for help |115200 8N1 | NOR | Minicom 2.4    | VT102 |      Offline                       
    
    

    Thanks

    Chaitanya

  • Hi Eyal

    I also want to install WL1271 on my DM8148 evm. But my first question is how to connect WL1271 module to Expansion I/O board on the evm. I cannot find any data sheet about the expansion I/O board. My second  question is how to build the WLAN driver.

    Thanks,

    Jammy

  • Hi Eyal, in continuation of my previous post on testing of WLAN with n-mode access point in security modes (wep, wpa, wpa2) I have done the same test (AP in n mode with security wpa - tkip) with a different model access point (cisco aironet 1200). The station is getting past the Association phase to 4WAYHANDSHAKE, it it Fails after this. As i see in the sniffer it says "IEEE 802.1X authentication Failed" as the reason for de-authentication. I am not using any Enterprise security here.  I have attached the log of the wpa_supplicant in debug mode while trying to connect to access point ( in 'n' mode and WPA encryption).  Also the access point model used for testing in my previous post  is WRT120N, with this access point the reason for association failure given by the access point is "Wireless association denied: 10 Cannot support all the requested capabilities" . Please give me your suggestions on both of these issues.

    0361.wlan-n-mode-wpaLog-Aironet1250.txt

    Thanks

    Chaitanya

  • Hi Chaitanya,

    I will review the logs and send response

    Regards,

    Eyal

  • Hi Jammy,

    Please see the DM814x picture for board installation in 3757.DM814.zip

    In addition please see build instructions guide in our WiKi page in http://processors.wiki.ti.com/index.php/OMAP_Wireless_Connectivity_mac80211_WLAN_build_scripts

     

    Regards,

    Eyal  

  • Hi Eyal,

    Is this module you plugged in DM814x EVM board?

    http://www.ti.com/tool/tmdxwl1271com6m

    Jeff