Behave Test Report

Features: failed: 1

Scenarios: skipped: 14, failed: 1

Steps: skipped: 196, passed: 28, failed: 1

Finished in 68.9 seconds

Feature: nmcli - procedures in documentation

features/scenarios/doc_procedures.feature:325 @rhelver+=8.6, @radius, @8021x_doc_procedure, @attach_wpa_supplicant_log, @permissive, @8021x_hostapd_freeradius_doc_procedure

Scenario: nmcli - docs - set up 802.1x using FreeRadius and hostapd

  1. Before scenario (15.196s)
    Status Before Scenario
    Memory use Before Scenario
    Commands
  2. * Add " bridge " connection named " br0 " for device " br0 " with options (0.332s)
    Commands
    con-name br0
    group-forward-mask 8 connection.autoconnect-slaves 1
    ipv4.method disabled ipv6.method disabled
  3. * Add " ethernet " connection named " br0-uplink " for device " eth4 " with options " master br0 " (0.070s)
    Commands
  4. * Execute " ip l add test1 type veth peer name test1b " (0.006s)
    Commands
  5. * Execute " ip l set dev test1b up " (0.016s)
    Commands
  6. * Execute " ip l set dev test1 up " (0.009s)
    Commands
  7. * Add " ethernet " connection named " br0-client-port " for device " test1b " with options " master br0 " (0.202s)
    Commands
  8. * Bring " up " connection " br0 " (0.160s)
    Commands
  9. * Execute " cp contrib/8021x/doc_procedures/hostapd.conf /etc/hostapd/hostapd.conf " (0.015s)
    Commands
  10. Then Execute " systemctl start hostapd " (0.036s)
    Commands
  11. * Execute " systemctl status hostapd " (1.777s)
    Commands
  12. * Execute " cp -f contrib/8021x/doc_procedures/wpa_supplicant-TTLS.conf /etc/wpa_supplicant/wpa_supplicant-TTLS.conf " (0.018s)
    Commands
  13. Then Note the output of " eapol_test -c /etc/wpa_supplicant/wpa_supplicant-TTLS.conf -s client_password " (0.088s)
  14. And Noted value contains " EAP: Status notification: remote certificate verification \(param=success\) " (0.001s)
  15. And Noted value contains " CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully " (0.000s)
  16. And Noted value contains " SUCCESS " (0.000s)
  17. Then " CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully " is visible with command " wpa_supplicant -c /etc/wpa_supplicant/wpa_supplicant-TTLS.conf -D wired -i test1 -d -t " (32.059s)
    Commands
  18. * Add " ethernet " connection named " test1-ttls " for device " test1 " with options (0.041s)
    Commands
    autoconnect no 802-1x.eap ttls 802-1x.phase2-auth pap
    802-1x.identity example_user 802-1x.password user_password
    802-1x.ca-cert /etc/pki/tls/certs/8021x-ca.pem
  19. * Execute " sleep 1 " (1.005s)
    Commands
  20. When Bring up connection " test1-ttls " (4.833s)
    Commands
  21. Then Check if " test1-ttls " is active connection (0.036s)
    Commands
  22. * Disconnect device " test1 " (0.077s)
    Commands
  23. * Execute " cp -f contrib/8021x/doc_procedures/wpa_supplicant-TLS.conf /etc/wpa_supplicant/wpa_supplicant-TLS.conf " (0.061s)
    Commands
  24. Then Note the output of " eapol_test -c /etc/wpa_supplicant/wpa_supplicant-TLS.conf -a 127.0.0.1 -s client_password " (0.029s)
  25. And Noted value contains " EAP: Status notification: remote certificate verification \(param=success\) " (0.000s)
  26. And Noted value contains " CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully " (0.000s)
  27. And Noted value contains " SUCCESS " (0.000s)
  28. Then " CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully " is visible with command " wpa_supplicant -c /etc/wpa_supplicant/wpa_supplicant-TLS.conf -D wired -i test1 -d -t " (2.038s)
    Commands
  29. * Add " ethernet " connection named " test1-tls " for device " test1 " with options (0.192s)
    Commands
    autoconnect no 802-1x.eap tls 802-1x.identity spam
    802-1x.ca-cert /etc/pki/tls/certs/8021x-ca.pem 802-1x.client-cert /etc/pki/tls/certs/8021x.pem
    802-1x.private-key /etc/pki/tls/private/8021x.key 802-1x.private-key-password whatever
  30. When Bring up connection " test1-tls " (25.758s)
    Error Message
    Commands
    --------------------------------------------------
    'pexpect:</usr/bin/nmcli connection up test1-tls>' returned 1024
    STDOUT:
    Secrets are required to access the wired network 'test1-tls'
    Warning: password for '802-1x.identity' not given in 'passwd-file' and nmcli cannot ask without '--ask' option.
    Error: Connection activation failed: Secrets were required, but not provided
    Hint: use 'journalctl -xe NM_CONNECTION=3d59a979-59b5-4428-9e61-75ecf408aae9 + NM_DEVICE=test1' to get more details.
    
    

  31. After scenario (3.459s)
    Memory use After Scenario
    WPA_SUP
    ~~~~~~~~~~~~~~~~~~~~~~~~~~ WPA_SUPPLICANT LOG ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    -- Logs begin at Mon 2022-05-09 21:53:46 EDT, end at Tue 2022-05-10 03:20:11 EDT. --
    1652167140.848514 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=0 linkmode=0 ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING])
    1652167140.863587 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167140.863605 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167140.863613 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167140.863620 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167140.863628 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 master=16690 operstate=2 ifi_family=7 ifi_flags=0x1003 ([UP])
    1652167141.037756 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=6 ifname=eth4 operstate=6 linkmode=0 master=16690 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.037765 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=6 ifname=eth4 operstate=6 linkmode=0 master=16690 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.037770 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167141.037774 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=6 ifname=eth4 master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.037779 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=6 ifname=eth4 master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.037784 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=6 ifname=eth4 master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.037789 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167141.037794 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167141.037798 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167141.037802 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=6 ifname=eth4 master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.037810 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=6 ifname=eth4 master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.037814 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=6 ifname=eth4 master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.160239 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1002 ()
    1652167141.160607 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16692 ifname=test1 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1002 ()
    1652167141.188795 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b operstate=0 linkmode=0 ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING])
    1652167141.218241 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16692 ifname=test1 operstate=0 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.218811 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.218828 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16692 ifname=test1 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.394793 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.399491 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16692 ifname=test1 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.420481 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b operstate=6 linkmode=0 master=16690 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.420489 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b operstate=6 linkmode=0 master=16690 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.420494 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167141.420499 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.420504 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.420510 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.420514 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167141.420519 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167141.420525 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.420530 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.420538 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.667316 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=6 ifname=eth4 operstate=6 linkmode=0 master=16690 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.667324 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=6 ifname=eth4 master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.667330 wpa_supplicant[1064063]: RTM_DELLINK: ifi_index=6 ifname=eth4 master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.671210 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=6 ifname=eth4 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.673236 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167141.673243 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167141.673248 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b operstate=6 linkmode=0 master=16690 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.673253 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.673258 wpa_supplicant[1064063]: RTM_DELLINK: ifi_index=16691 ifname=test1b master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.677270 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.677831 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167141.677838 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167141.687982 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167141.687990 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167141.687995 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167141.688000 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=6 ifname=eth4 operstate=6 linkmode=0 master=16690 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.688005 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=6 ifname=eth4 operstate=6 linkmode=0 master=16690 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.694724 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167141.694737 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=6 ifname=eth4 master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.694744 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=6 ifname=eth4 master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.694752 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=6 ifname=eth4 master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.694761 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167141.694772 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167141.694780 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167141.694788 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=6 ifname=eth4 master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.694795 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=6 ifname=eth4 master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.694802 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=6 ifname=eth4 master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.694816 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b operstate=6 linkmode=0 master=16690 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.694824 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b operstate=6 linkmode=0 master=16690 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.694830 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167141.697081 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.697088 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.697092 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.701667 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167141.701674 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
    1652167141.701679 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.701683 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167141.701688 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167157.150298 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167157.150305 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=6 ifname=eth4 master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167172.510361 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=6 ifname=eth4 master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167172.510369 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16691 ifname=test1b master=16690 operstate=6 ifi_family=7 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167172.510374 wpa_supplicant[1064063]: RTM_NEWLINK: ifi_index=16690 ifname=br0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
    1652167177.260309 wpa_supplicant[1064063]: dbus: fi.w1.wpa_supplicant1.CreateInterface (/fi/w1/wpa_supplicant1) [a{sv}]
    1652167177.260315 wpa_supplicant[1064063]: wpa_dbus_dict_open_read: start reading a dict entry
    1652167177.260320 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry key: Driver
    1652167177.260323 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry variant content type: s
    1652167177.260326 wpa_supplicant[1064063]: _wpa_dbus_dict_fill_value_from_variant: string value: wired
    1652167177.260332 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry key: Ifname
    1652167177.260335 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry variant content type: s
    1652167177.260338 wpa_supplicant[1064063]: _wpa_dbus_dict_fill_value_from_variant: string value: test1
    1652167177.260344 wpa_supplicant[1064063]: Initializing interface 'test1' conf 'N/A' driver 'wired' ctrl_interface 'N/A' bridge 'N/A'
    1652167177.260384 wpa_supplicant[1064063]: driver_wired_init_common: Added multicast membership with packet socket
    1652167177.260387 wpa_supplicant[1064063]: Add interface test1 to a new radio N/A
    1652167177.265241 wpa_supplicant[1064063]: test1: Own MAC address: ba:f4:5a:e0:9b:f0
    1652167177.265253 wpa_supplicant[1064063]: test1: RSN: flushing PMKID list in the driver
    1652167177.265257 wpa_supplicant[1064063]: test1: State: DISCONNECTED -> INACTIVE
    1652167177.265291 wpa_supplicant[1064063]: test1: WPS: UUID based on MAC address: 9843390e-3b4b-53ea-a4cc-2c7beb47db18
    1652167177.265551 wpa_supplicant[1064063]: ENGINE: Loading builtin engines
    1652167177.265792 wpa_supplicant[1064063]: ENGINE: Loading builtin engines
    1652167177.265872 wpa_supplicant[1064063]: EAPOL: SUPP_PAE entering state DISCONNECTED
    1652167177.265880 wpa_supplicant[1064063]: EAPOL: Supplicant port status: Unauthorized
    1652167177.265883 wpa_supplicant[1064063]: EAPOL: KEY_RX entering state NO_KEY_RECEIVE
    1652167177.265886 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state INITIALIZE
    1652167177.265889 wpa_supplicant[1064063]: EAP: EAP entering state DISABLED
    1652167177.265904 wpa_supplicant[1064063]: dbus: Register interface object '/fi/w1/wpa_supplicant1/Interfaces/14'
    1652167177.266167 wpa_supplicant[1064063]: test1: Added interface test1
    1652167177.266175 wpa_supplicant[1064063]: test1: State: INACTIVE -> DISCONNECTED
    1652167177.267566 wpa_supplicant[1064063]: dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/14) [ssv]
    1652167177.267580 wpa_supplicant[1064063]: properties_get_or_set: Set(BSSExpireAge)
    1652167177.267586 wpa_supplicant[1064063]: test1: Setting bss expiration age: 250 sec
    1652167177.267604 wpa_supplicant[1064063]: dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/14) [ssv]
    1652167177.267608 wpa_supplicant[1064063]: properties_get_or_set: Set(BSSExpireCount)
    1652167177.267613 wpa_supplicant[1064063]: test1: Setting bss expiration scan count: 2
    1652167177.267625 wpa_supplicant[1064063]: dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/14) [ssv]
    1652167177.267630 wpa_supplicant[1064063]: properties_get_or_set: Set(Pmf)
    1652167177.267637 wpa_supplicant[1064063]: pmf=1
    1652167177.267648 wpa_supplicant[1064063]: dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/14) [s]
    1652167177.267876 wpa_supplicant[1064063]: dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/14) [s]
    1652167177.267886 wpa_supplicant[1064063]: dbus: fill_dict_with_properties dbus_interface=fi.w1.wpa_supplicant1.Interface.P2PDevice dbus_property=P2PDeviceConfig getter failed
    1652167177.269258 wpa_supplicant[1064063]: dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/14) [ssv]
    1652167177.269264 wpa_supplicant[1064063]: properties_get_or_set: Set(ApScan)
    1652167177.269325 wpa_supplicant[1064063]: dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/14) [ssv]
    1652167177.269330 wpa_supplicant[1064063]: properties_get_or_set: Set(ApIsolate)
    1652167177.269337 wpa_supplicant[1064063]: ap_isolate=0
    1652167177.269967 wpa_supplicant[1064063]: dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/14) [a{sv}]
    1652167177.269981 wpa_supplicant[1064063]: dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/14/Networks/0'
    1652167177.270099 wpa_supplicant[1064063]: wpa_dbus_dict_open_read: start reading a dict entry
    1652167177.270106 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry key: eapol_flags
    1652167177.270109 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry variant content type: i
    1652167177.270113 wpa_supplicant[1064063]: _wpa_dbus_dict_fill_value_from_variant: int32 value: 0
    1652167177.270119 wpa_supplicant[1064063]: eapol_flags=0 (0x0)
    1652167177.270123 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry key: eap
    1652167177.270126 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry variant content type: s
    1652167177.270129 wpa_supplicant[1064063]: _wpa_dbus_dict_fill_value_from_variant: string value: TTLS
    1652167177.270137 wpa_supplicant[1064063]: eap methods - hexdump(len=16): 00 00 00 00 15 00 00 00 00 00 00 00 00 00 00 00
    1652167177.270141 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry key: identity
    1652167177.270144 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry variant content type: a
    1652167177.270147 wpa_supplicant[1064063]: _wpa_dbus_dict_entry_get_array: array_type y
    1652167177.270153 wpa_supplicant[1064063]: dbus: byte array contents - hexdump(len=12): 65 78 61 6d 70 6c 65 5f 75 73 65 72
    1652167177.270159 wpa_supplicant[1064063]: identity - hexdump(len=12): 65 78 61 6d 70 6c 65 5f 75 73 65 72
    1652167177.270163 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry key: fragment_size
    1652167177.270166 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry variant content type: i
    1652167177.270169 wpa_supplicant[1064063]: _wpa_dbus_dict_fill_value_from_variant: int32 value: 1266
    1652167177.270174 wpa_supplicant[1064063]: fragment_size=1266 (0x4f2)
    1652167177.270181 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry key: ca_cert
    1652167177.270184 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry variant content type: a
    1652167177.270187 wpa_supplicant[1064063]: _wpa_dbus_dict_entry_get_array: array_type y
    1652167177.270195 wpa_supplicant[1064063]: dbus: byte array contents - hexdump(len=31): 2f 65 74 63 2f 70 6b 69 2f 74 6c 73 2f 63 65 72 74 73 2f 38 30 32 31 78 2d 63 61 2e 70 65 6d
    1652167177.270204 wpa_supplicant[1064063]: ca_cert - hexdump(len=31): 2f 65 74 63 2f 70 6b 69 2f 74 6c 73 2f 63 65 72 74 73 2f 38 30 32 31 78 2d 63 61 2e 70 65 6d
    1652167177.270208 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry key: phase2
    1652167177.270210 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry variant content type: s
    1652167177.270213 wpa_supplicant[1064063]: _wpa_dbus_dict_fill_value_from_variant: string value: auth=PAP
    1652167177.270219 wpa_supplicant[1064063]: phase2 - hexdump(len=8): 61 75 74 68 3d 50 41 50
    1652167177.270222 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry key: key_mgmt
    1652167177.270225 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry variant content type: s
    1652167177.270232 wpa_supplicant[1064063]: _wpa_dbus_dict_fill_value_from_variant: string value: IEEE8021X
    1652167177.270236 wpa_supplicant[1064063]: key_mgmt: 0x8
    1652167177.270239 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry key: password
    1652167177.270242 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry variant content type: a
    1652167177.270245 wpa_supplicant[1064063]: _wpa_dbus_dict_entry_get_array: array_type y
    1652167177.270253 wpa_supplicant[1064063]: dbus: byte array contents - hexdump(len=13): 75 73 65 72 5f 70 61 73 73 77 6f 72 64
    1652167177.270259 wpa_supplicant[1064063]: password - hexdump(len=13): 75 73 65 72 5f 70 61 73 73 77 6f 72 64
    1652167177.270764 wpa_supplicant[1064063]: dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/14) [o]
    1652167177.270778 wpa_supplicant[1064063]: test1: Setting scan request: 0.000000 sec
    1652167177.270841 wpa_supplicant[1064063]: EAPOL: External notification - EAP success=0
    1652167177.270845 wpa_supplicant[1064063]: EAPOL: External notification - EAP fail=0
    1652167177.270849 wpa_supplicant[1064063]: EAPOL: External notification - portControl=Auto
    1652167177.270854 wpa_supplicant[1064063]: test1: Already associated with a configured network - generating associated event
    1652167177.270858 wpa_supplicant[1064063]: test1: Event ASSOC (0) received
    1652167177.270861 wpa_supplicant[1064063]: test1: Association info event
    1652167177.270870 wpa_supplicant[1064063]: test1: State: DISCONNECTED -> ASSOCIATED
    1652167177.270878 wpa_supplicant[1064063]: test1: Associated to a new BSS: BSSID=01:80:c2:00:00:03
    1652167177.270881 wpa_supplicant[1064063]: Add randomness: count=23 entropy=1
    1652167177.270895 wpa_supplicant[1064063]: random pool - hexdump(len=128): 14 d3 4a 56 4d 8d ed 89 5a f2 2a c0 7c 5c 03 50 b7 23 4d ab fd 60 75 e9 8a fa 0f 42 b0 39 d0 db 36 f7 28 b5 2f 90 13 9b 37 77 e2 a0 ac ef 66 b8 34 fc e9 e9 80 b6 1f 0f fb 9c 36 6a c7 b0 9d 35 4f 13 8f 2d 5e 09 fb a3 ac 47 89 ae 80 3f 5c 3c 25 1c 73 e2 16 cb e2 46 7c 7b 08 ad 5b e0 8c 5b 85 2f 69 a1 0c e6 a4 b4 a3 be 00 72 bb ab 04 90 70 03 a4 95 37 05 fb cf 62 44 da 80 f0 60 3a de
    1652167177.270900 wpa_supplicant[1064063]: random_mix_pool - hexdump(len=16): 09 12 7a 62 00 00 00 00 22 22 04 00 00 00 00 00
    1652167177.270904 wpa_supplicant[1064063]: random_mix_pool - hexdump(len=6): 01 80 c2 00 00 03
    1652167177.270917 wpa_supplicant[1064063]: random pool - hexdump(len=128): 39 68 4a 8f c2 8b 46 7e 08 65 a3 77 d4 3d 1c 32 ed 9e c7 9f 47 c8 b7 fc 9e 2a 80 e0 35 05 89 f5 d7 4f d4 a9 b2 01 f0 c6 18 ab c9 d9 e6 94 0e 93 14 4c 82 b8 d9 c3 7a 18 2b ab 83 ec ad 11 ab c5 f2 90 93 07 04 64 ea c1 1f f6 5d c0 b7 db 93 53 25 1c 73 e2 16 cb e2 46 7c 7b 08 ad 5b e0 8c 5b 85 2f 69 a1 0c e6 a4 b4 a3 be 00 72 bb ab 04 90 70 03 a4 95 37 05 fb cf dc e3 8d d9 6e 18 01 df
    1652167177.270922 wpa_supplicant[1064063]: test1: Select network based on association information
    1652167177.270928 wpa_supplicant[1064063]: test1: Network configuration found for the current AP
    1652167177.270932 wpa_supplicant[1064063]: test1: WPA: clearing AP WPA IE
    1652167177.270935 wpa_supplicant[1064063]: test1: WPA: clearing AP RSN IE
    1652167177.270938 wpa_supplicant[1064063]: test1: WPA: clearing AP RSNXE
    1652167177.270941 wpa_supplicant[1064063]: test1: WPA: clearing own WPA/RSN IE
    1652167177.270944 wpa_supplicant[1064063]: test1: RSN: clearing own RSNXE
    1652167177.270948 wpa_supplicant[1064063]: test1: Failed to get scan results
    1652167177.270952 wpa_supplicant[1064063]: EAPOL: External notification - EAP success=0
    1652167177.270955 wpa_supplicant[1064063]: EAPOL: External notification - EAP fail=0
    1652167177.270957 wpa_supplicant[1064063]: EAPOL: External notification - portControl=Auto
    1652167177.270962 wpa_supplicant[1064063]: test1: Associated with 01:80:c2:00:00:03
    1652167177.270965 wpa_supplicant[1064063]: test1: WPA: Association event - clear replay counter
    1652167177.270969 wpa_supplicant[1064063]: test1: WPA: Clear old PTK
    1652167177.270972 wpa_supplicant[1064063]: EAPOL: External notification - portEnabled=0
    1652167177.270975 wpa_supplicant[1064063]: EAPOL: External notification - portValid=0
    1652167177.270978 wpa_supplicant[1064063]: EAPOL: External notification - portEnabled=1
    1652167177.270982 wpa_supplicant[1064063]: EAPOL: SUPP_PAE entering state CONNECTING
    1652167177.270985 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state IDLE
    1652167177.270988 wpa_supplicant[1064063]: EAP: EAP entering state INITIALIZE
    1652167177.270992 wpa_supplicant[1064063]: EAP: EAP entering state IDLE
    1652167177.270996 wpa_supplicant[1064063]: test1: Cancelling scan request
    1652167177.271000 wpa_supplicant[1064063]: test1: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
    1652167177.275989 wpa_supplicant[1064063]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/14
    1652167179.267139 wpa_supplicant[1064063]: EAPOL: startWhen --> 0
    1652167179.267153 wpa_supplicant[1064063]: EAPOL: SUPP_PAE entering state CONNECTING
    1652167179.267156 wpa_supplicant[1064063]: EAPOL: txStart
    1652167179.267163 wpa_supplicant[1064063]: TX EAPOL: dst=01:80:c2:00:00:03
    1652167179.267167 wpa_supplicant[1064063]: TX EAPOL - hexdump(len=4): 01 01 00 00
    1652167179.267340 wpa_supplicant[1064063]: l2_packet_receive: src=52:54:00:6a:25:3b len=9
    1652167179.267347 wpa_supplicant[1064063]: test1: RX EAPOL from 52:54:00:6a:25:3b
    1652167179.267352 wpa_supplicant[1064063]: RX EAPOL - hexdump(len=9): 02 00 00 05 01 2b 00 05 01
    1652167179.267356 wpa_supplicant[1064063]: EAPOL: Received EAP-Packet frame
    1652167179.267359 wpa_supplicant[1064063]: EAPOL: SUPP_PAE entering state RESTART
    1652167179.267363 wpa_supplicant[1064063]: EAP: EAP entering state INITIALIZE
    1652167179.267366 wpa_supplicant[1064063]: EAP: EAP entering state IDLE
    1652167179.267369 wpa_supplicant[1064063]: EAPOL: SUPP_PAE entering state AUTHENTICATING
    1652167179.267372 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state REQUEST
    1652167179.267375 wpa_supplicant[1064063]: EAPOL: getSuppRsp
    1652167179.267377 wpa_supplicant[1064063]: EAP: EAP entering state RECEIVED
    1652167179.267390 wpa_supplicant[1064063]: EAP: Received EAP-Request id=43 method=1 vendor=0 vendorMethod=0
    1652167179.267397 wpa_supplicant[1064063]: EAP: EAP entering state IDENTITY
    1652167179.267402 wpa_supplicant[1064063]: test1: CTRL-EVENT-EAP-STARTED EAP authentication started
    1652167179.267405 wpa_supplicant[1064063]: EAP: Status notification: started (param=)
    1652167179.267451 wpa_supplicant[1064063]: EAP: EAP-Request Identity data - hexdump(len=0):
    1652167179.267456 wpa_supplicant[1064063]: EAP: using real identity - hexdump(len=12): 65 78 61 6d 70 6c 65 5f 75 73 65 72
    1652167179.267460 wpa_supplicant[1064063]: EAP: EAP entering state SEND_RESPONSE
    1652167179.267463 wpa_supplicant[1064063]: EAP: EAP entering state IDLE
    1652167179.267476 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state RESPONSE
    1652167179.267480 wpa_supplicant[1064063]: EAPOL: txSuppRsp
    1652167179.267484 wpa_supplicant[1064063]: TX EAPOL: dst=01:80:c2:00:00:03
    1652167179.267489 wpa_supplicant[1064063]: TX EAPOL - hexdump(len=21): 01 00 00 11 02 2b 00 11 01 65 78 61 6d 70 6c 65 5f 75 73 65 72
    1652167179.267509 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state RECEIVE
    1652167179.268093 wpa_supplicant[1064063]: l2_packet_receive: src=52:54:00:6a:25:3b len=10
    1652167179.268098 wpa_supplicant[1064063]: test1: RX EAPOL from 52:54:00:6a:25:3b
    1652167179.268103 wpa_supplicant[1064063]: RX EAPOL - hexdump(len=10): 02 00 00 06 01 2c 00 06 15 20
    1652167179.268106 wpa_supplicant[1064063]: EAPOL: Received EAP-Packet frame
    1652167179.268109 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state REQUEST
    1652167179.268112 wpa_supplicant[1064063]: EAPOL: getSuppRsp
    1652167179.268115 wpa_supplicant[1064063]: EAP: EAP entering state RECEIVED
    1652167179.268122 wpa_supplicant[1064063]: EAP: Received EAP-Request id=44 method=21 vendor=0 vendorMethod=0
    1652167179.268125 wpa_supplicant[1064063]: EAP: EAP entering state GET_METHOD
    1652167179.268132 wpa_supplicant[1064063]: test1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=21
    1652167179.268136 wpa_supplicant[1064063]: EAP: Status notification: accept proposed method (param=TTLS)
    1652167179.268168 wpa_supplicant[1064063]: EAP: Initialize selected EAP method: vendor 0 method 21 (TTLS)
    1652167179.268173 wpa_supplicant[1064063]: EAP-TTLS: Phase2 type: PAP
    1652167179.268176 wpa_supplicant[1064063]: TLS: using phase1 config options
    1652167179.268322 wpa_supplicant[1064063]: TLS: Trusted root certificate(s) loaded
    1652167179.268329 wpa_supplicant[1064063]: test1: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 21 (TTLS) selected
    1652167179.268332 wpa_supplicant[1064063]: EAP: EAP entering state METHOD
    1652167179.268336 wpa_supplicant[1064063]: SSL: Received packet(len=6) - Flags 0x20
    1652167179.268339 wpa_supplicant[1064063]: EAP-TTLS: Start (server ver=0, own ver=0)
    1652167179.268346 wpa_supplicant[1064063]: SSL: (where=0x10 ret=0x1)
    1652167179.268356 wpa_supplicant[1064063]: SSL: (where=0x1001 ret=0x1)
    1652167179.268359 wpa_supplicant[1064063]: SSL: SSL_connect:before SSL initialization
    1652167179.268402 wpa_supplicant[1064063]: OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
    1652167179.268407 wpa_supplicant[1064063]: OpenSSL: Message - hexdump(len=5): 16 03 01 00 dd
    1652167179.268412 wpa_supplicant[1064063]: OpenSSL: TX ver=0x303 content_type=22 (handshake/client hello)
    1652167179.268437 wpa_supplicant[1064063]: OpenSSL: Message - hexdump(len=221): 01 00 00 d9 03 03 45 96 b6 c9 e0 0e ea 92 7c 54 4c 42 66 e1 b0 c5 08 ed 85 67 e7 94 cb e5 bd 91 f9 42 44 b4 e9 80 00 00 5c c0 2c c0 30 cc a9 cc a8 c0 ad c0 2b c0 2f c0 ac c0 23 c0 27 c0 0a c0 14 c0 09 c0 13 c0 07 c0 11 c0 08 c0 12 00 9d c0 9d 00 9c c0 9c 00 3d 00 3c 00 35 00 2f 00 05 00 0a 00 a3 00 9f cc aa c0 9f 00 a2 00 9e c0 9e 00 6b 00 6a 00 67 00 40 00 39 00 38 00 33 00 32 00 16 00 13 00 ff 01 00 00 54 00 0b 00 04 03 00 01 02 00 0a 00 0c 00 0a 00 1d 00 17 00 1e 00 19 00 18 00 16 00 00 00 17 00 00 00 0d 00 30 00 2e 04 03 05 03 06 03 08 07 08 08 08 09 08 04 08 0a 08 05 08 0b 08 06 04 01 05 01 06 01 03 03 03 01 04 02 05 02 06 02 03 02 02 03 02 01 02 02
    1652167179.268442 wpa_supplicant[1064063]: SSL: (where=0x1001 ret=0x1)
    1652167179.268445 wpa_supplicant[1064063]: SSL: SSL_connect:SSLv3/TLS write client hello
    1652167179.268449 wpa_supplicant[1064063]: SSL: (where=0x1002 ret=0xffffffff)
    1652167179.268452 wpa_supplicant[1064063]: SSL: SSL_connect:error in SSLv3/TLS write client hello
    1652167179.268456 wpa_supplicant[1064063]: SSL: SSL_connect - want more data
    1652167179.268459 wpa_supplicant[1064063]: SSL: 226 bytes pending from ssl_out
    1652167179.268462 wpa_supplicant[1064063]: SSL: Using TLS version TLSv1.2
    1652167179.268484 wpa_supplicant[1064063]: SSL: 226 bytes left to be sent out (of total 226 bytes)
    1652167179.268490 wpa_supplicant[1064063]: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x556811b207c0
    1652167179.268493 wpa_supplicant[1064063]: EAP: EAP entering state SEND_RESPONSE
    1652167179.268497 wpa_supplicant[1064063]: EAP: EAP entering state IDLE
    1652167179.268500 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state RESPONSE
    1652167179.268503 wpa_supplicant[1064063]: EAPOL: txSuppRsp
    1652167179.268506 wpa_supplicant[1064063]: TX EAPOL: dst=01:80:c2:00:00:03
    1652167179.268529 wpa_supplicant[1064063]: TX EAPOL - hexdump(len=236): 01 00 00 e8 02 2c 00 e8 15 00 16 03 01 00 dd 01 00 00 d9 03 03 45 96 b6 c9 e0 0e ea 92 7c 54 4c 42 66 e1 b0 c5 08 ed 85 67 e7 94 cb e5 bd 91 f9 42 44 b4 e9 80 00 00 5c c0 2c c0 30 cc a9 cc a8 c0 ad c0 2b c0 2f c0 ac c0 23 c0 27 c0 0a c0 14 c0 09 c0 13 c0 07 c0 11 c0 08 c0 12 00 9d c0 9d 00 9c c0 9c 00 3d 00 3c 00 35 00 2f 00 05 00 0a 00 a3 00 9f cc aa c0 9f 00 a2 00 9e c0 9e 00 6b 00 6a 00 67 00 40 00 39 00 38 00 33 00 32 00 16 00 13 00 ff 01 00 00 54 00 0b 00 04 03 00 01 02 00 0a 00 0c 00 0a 00 1d 00 17 00 1e 00 19 00 18 00 16 00 00 00 17 00 00 00 0d 00 30 00 2e 04 03 05 03 06 03 08 07 08 08 08 09 08 04 08 0a 08 05 08 0b 08 06 04 01 05 01 06 01 03 03 03 01 04 02 05 02 06 02 03 02 02 03 02 01 02 02
    1652167179.268555 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state RECEIVE
    1652167179.270054 wpa_supplicant[1064063]: l2_packet_receive: src=52:54:00:6a:25:3b len=1008
    1652167179.270071 wpa_supplicant[1064063]: test1: RX EAPOL from 52:54:00:6a:25:3b
    1652167179.270158 wpa_supplicant[1064063]: RX EAPOL - hexdump(len=1008): 02 00 03 ec 01 2d 03 ec 15 c0 00 00 0a 8b 16 03 03 00 3d 02 00 00 39 03 03 0d 4e ca 0f 70 ce cb 6d 6c 98 cf 89 e3 05 0d a9 6c ca 17 b7 52 e5 95 e0 b9 09 7e 28 45 53 01 8d 00 c0 30 00 00 11 ff 01 00 01 00 00 0b 00 04 03 00 01 02 00 17 00 00 16 03 03 08 e9 0b 00 08 e5 00 08 e2 00 03 de 30 82 03 da 30 82 02 c2 a0 03 02 01 02 02 01 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 1e 17 0d 32 32 30 35 31 30 30 37 31 38 35 36 5a 17 0d 32 32 30 37 30 39 30 37 31 38 35 36 5a 30 7c 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 23 30 21 06 03 55 04 03 0c 1a 45 78 61 6d 70 6c 65 20 53 65 72 76 65 72 20 43 65 72 74 69 66 69 63 61 74 65 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 c2 6e 32 38 0f 22 cf 90 1f f1 5d 46 63 a9 43 b9 f1 0a 49 df b5 c6 80 05 a3 85 32 1c df 42 94 32 b1 b5 aa f7 42 85 44 d5 0b f3 90 f7 48 bc e3 9b 1a b9 97 68 13 ec b0 3d ad 85 5b 96 90 3f a1 4d b0 b0 bc ce 82 ec 1a 31 c4 fb 8e e1 20 a7 86 68 b8 25 bb 0a 95 52 50 69 25 84 8d fc be 72 ee 5a e8 7b e7 29 f0 16 6a 78 c8 52 55 aa 1e c5 90 eb b8 8d 63 4a 2b f6 56 4f 2e 45 c6 82 54 36 bb b1 53 99 e1 2d ff 5b 82 c0 da 2f 46 d6 5f 62 6e d5 21 79 c5 e9 74 78 d2 8c 19 de 18 b2 10 e1 8d 2d 0a 1c 48 2c 22 39 2a 17 80 1b bb f8 dd df cc 4b de 3a 3a bf 28 e3 eb 9a 64 5b df dc 76 d7 57 5c 00 81 40 c1 d1 46 3f da e5 b4 39 f7 d6 46 f5 ef 48 0d dd 5f c0 84 b9 ae c6 28 39 3b 9c 25 cf 57 ff 26 75 fa e1 62 03 28 2a 90 46 26 76 9c 40 fd 91 60 4e 78 a0 7f 4a 4d b0 08 69 b3 9e 10 15 c5 02 03 01 00 01 a3 4f 30 4d 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 36 06 03 55 1d 1f 04 2f 30 2d 30 2b a0 29 a0 27 86 25 68 74 74 70 3a 2f 2f 77 77 77 2e 65 78 61 6d 70 6c 65 2e 63 6f 6d 2f 65 78 61 6d 70 6c 65 5f 63 61 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 13 25 3f 8f 84 f7 ac c6 29 b1 db 3f 10 45 13 23 04 14 ba 25 ad 65 24 40 af 40 60 d7 20 6f fa 67 a9 fd 1a 8e 25 d9 84 86 df 3d 37 fa 16 2f ff 20 d0 a4 8f 77 ad a2 30 d8 5e 85 8e 4e 59 de 07 55 3b d2 7c d7 41 e4 23 cf da fb f7 0c 0f 2d 69 ad f9 e9 d9 77 0d 93 0c 3c 96 bc 72 aa b8 0a 61 28 3c e3 6c 4d 19 03 ad 72 eb 39 c2 2b ee 70 90 eb ec 7b 2e 0c f1 33 9f 6c 4b 43 35 f1 0c 62 22 4e 66 50 c1 11 ef ed 26 b0 ab bb 01 38 09 01 6c cf 3d a8 04 c0 ec 2b 7b 21 c1 b7 39 c9 d5 c1 a8 03 16 3c f4 70 ab 9c 4a 7a 83 63 2f e0 c3 f3 5a e8 4f 53 cb
    1652167179.270163 wpa_supplicant[1064063]: EAPOL: Received EAP-Packet frame
    1652167179.270166 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state REQUEST
    1652167179.270169 wpa_supplicant[1064063]: EAPOL: getSuppRsp
    1652167179.270172 wpa_supplicant[1064063]: EAP: EAP entering state RECEIVED
    1652167179.270180 wpa_supplicant[1064063]: EAP: Received EAP-Request id=45 method=21 vendor=0 vendorMethod=0
    1652167179.270184 wpa_supplicant[1064063]: EAP: EAP entering state METHOD
    1652167179.270188 wpa_supplicant[1064063]: SSL: Received packet(len=1004) - Flags 0xc0
    1652167179.270191 wpa_supplicant[1064063]: SSL: TLS Message Length: 2699
    1652167179.270195 wpa_supplicant[1064063]: SSL: Need 1705 bytes more input data
    1652167179.270199 wpa_supplicant[1064063]: SSL: Building ACK (type=21 id=45 ver=0)
    1652167179.270202 wpa_supplicant[1064063]: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x556811b18bc0
    1652167179.270205 wpa_supplicant[1064063]: EAP: EAP entering state SEND_RESPONSE
    1652167179.270211 wpa_supplicant[1064063]: EAP: EAP entering state IDLE
    1652167179.270214 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state RESPONSE
    1652167179.270218 wpa_supplicant[1064063]: EAPOL: txSuppRsp
    1652167179.270222 wpa_supplicant[1064063]: TX EAPOL: dst=01:80:c2:00:00:03
    1652167179.270226 wpa_supplicant[1064063]: TX EAPOL - hexdump(len=10): 01 00 00 06 02 2d 00 06 15 00
    1652167179.270248 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state RECEIVE
    1652167179.270662 wpa_supplicant[1064063]: l2_packet_receive: src=52:54:00:6a:25:3b len=1008
    1652167179.270668 wpa_supplicant[1064063]: test1: RX EAPOL from 52:54:00:6a:25:3b
    1652167179.270752 wpa_supplicant[1064063]: RX EAPOL - hexdump(len=1008): 02 00 03 ec 01 2e 03 ec 15 c0 00 00 0a 8b 99 88 9c 13 3a 7b e3 46 d6 67 ca f7 1a a7 47 1c b0 6c be e7 d7 ab a3 0b 4e 6c c9 b3 19 56 67 9d 70 cf 78 2f 8b 2b 85 60 52 7e 9b 59 de 0d 17 00 90 46 e2 3d 14 c6 e6 4f f8 30 d3 71 65 a1 e1 f0 a4 20 c0 6a e1 34 a2 97 ae 95 7f d2 5e 00 04 fe 30 82 04 fa 30 82 03 e2 a0 03 02 01 02 02 14 51 34 6b 9a e6 32 a8 81 20 ca b5 df be 3e f2 0b c1 96 3b 24 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 1e 17 0d 32 32 30 35 31 30 30 37 31 38 35 36 5a 17 0d 32 32 30 37 30 39 30 37 31 38 35 36 5a 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 ad 94 e3 70 73 8a a4 28 ec 51 53 54 a9 45 6e c0 59 df bc 9f 11 ea e7 1e 34 70 53 98 52 b0 af 49 84 10 e0 53 eb ed c0 0a 1f 46 81 f3 e0 a0 2e ba 99 8c c9 f3 78 58 4d c7 c3 9d 4f 31 dd f3 70 16 d5 52 ae 12 e6 c2 09 4a c0 54 fa b2 15 d9 c3 79 28 06 c3 03 17 ea e0 ce f0 d6 9a 0d 7e bb 59 95 7e 66 5d c2 f8 31 61 ff e0 4b 53 cb 77 6a a8 5c 54 e8 90 34 77 4f 94 9b d4 5c 0f ba ea ba c5 fe 17 57 27 e2 cd bc 8a 1e e6 27 be b2 68 61 e0 56 39 9c dc ae 3f 45 7b 55 37 af 7c e2 b4 b9 36 85 d2 17 e5 b2 0c 34 ec e0 6f 4a c9 78 31 6b 66 7e 3a a9 7e 81 fc a6 fe ae 7b 0c cf dd aa ea 8e 1c a9 44 c2 4c 6d cc 68 1e 76 b4 da 10 b0 b2 cb cd 4e 42 11 72 95 36 0f 2f d4 81 d7 a5 88 8c b8 94 a4 9b 7c 9b 40 93 b8 f2 cb 72 f9 ac dd 46 08 e1 ba 24 74 34 91 06 1e c9 06 bc 7f bc a5 a0 7f 57 02 03 01 00 01 a3 82 01 42 30 82 01 3e 30 1d 06 03 55 1d 0e 04 16 04 14 52 bf 2e d0 5f b2 1a e4 0e 9c 9d ed 89 3e 76 8b 0b d6 b9 db 30 81 d3 06 03 55 1d 23 04 81 cb 30 81 c8 80 14 52 bf 2e d0 5f b2 1a e4 0e 9c 9d ed 89 3e 76 8b 0b d6 b9 db a1 81 99 a4 81 96 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 82 14 51 34 6b 9a e6
    1652167179.270757 wpa_supplicant[1064063]: EAPOL: Received EAP-Packet frame
    1652167179.270760 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state REQUEST
    1652167179.270763 wpa_supplicant[1064063]: EAPOL: getSuppRsp
    1652167179.270766 wpa_supplicant[1064063]: EAP: EAP entering state RECEIVED
    1652167179.270773 wpa_supplicant[1064063]: EAP: Received EAP-Request id=46 method=21 vendor=0 vendorMethod=0
    1652167179.270777 wpa_supplicant[1064063]: EAP: EAP entering state METHOD
    1652167179.270781 wpa_supplicant[1064063]: SSL: Received packet(len=1004) - Flags 0xc0
    1652167179.270784 wpa_supplicant[1064063]: SSL: TLS Message Length: 2699
    1652167179.270788 wpa_supplicant[1064063]: SSL: Need 711 bytes more input data
    1652167179.270791 wpa_supplicant[1064063]: SSL: Building ACK (type=21 id=46 ver=0)
    1652167179.270795 wpa_supplicant[1064063]: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x556811b94fb0
    1652167179.270798 wpa_supplicant[1064063]: EAP: EAP entering state SEND_RESPONSE
    1652167179.270801 wpa_supplicant[1064063]: EAP: EAP entering state IDLE
    1652167179.270807 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state RESPONSE
    1652167179.270810 wpa_supplicant[1064063]: EAPOL: txSuppRsp
    1652167179.270814 wpa_supplicant[1064063]: TX EAPOL: dst=01:80:c2:00:00:03
    1652167179.270818 wpa_supplicant[1064063]: TX EAPOL - hexdump(len=10): 01 00 00 06 02 2e 00 06 15 00
    1652167179.270839 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state RECEIVE
    1652167179.271252 wpa_supplicant[1064063]: l2_packet_receive: src=52:54:00:6a:25:3b len=725
    1652167179.271258 wpa_supplicant[1064063]: test1: RX EAPOL from 52:54:00:6a:25:3b
    1652167179.271317 wpa_supplicant[1064063]: RX EAPOL - hexdump(len=725): 02 00 02 d1 01 2f 02 d1 15 80 00 00 0a 8b 32 a8 81 20 ca b5 df be 3e f2 0b c1 96 3b 24 30 0f 06 03 55 1d 13 01 01 ff 04 05 30 03 01 01 ff 30 36 06 03 55 1d 1f 04 2f 30 2d 30 2b a0 29 a0 27 86 25 68 74 74 70 3a 2f 2f 77 77 77 2e 65 78 61 6d 70 6c 65 2e 6f 72 67 2f 65 78 61 6d 70 6c 65 5f 63 61 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 73 3e c4 70 73 8b 18 82 3a 00 ae 69 30 29 21 00 c1 29 f6 43 4f 06 55 02 1c e1 0e 61 1e f4 e4 50 3a 86 c1 7d f7 2a 89 b3 71 dc 15 b0 6c 97 4f 1c 2c 59 2d c4 da 2e 3b ed 8e e8 55 ae ff 94 5e a1 f7 12 5d 10 fc 10 9e 26 b9 a5 dd 56 05 5f 1c 3a dc b8 c9 02 ef 89 69 71 ca b8 d4 c5 05 eb 5f cf b8 40 94 9b 17 d9 f2 6b fa a7 be d7 fe 52 2d e2 3a e4 8e cd f0 31 42 c3 64 c6 c8 0f df f0 d1 85 df 93 84 c4 50 15 b1 55 c0 22 1d 91 26 85 c9 9c ca 7d 19 d8 40 48 8b ec de e2 6b bf 05 49 14 80 3c 71 65 66 a4 6c cc ff ea ac 0d ee cb 6a f9 6f 41 0c 3f 5c 61 a7 57 87 65 71 64 86 b4 fa 27 e7 41 0b 49 57 cc 96 ab b7 65 a5 f9 8a 21 b6 af 5b ec 49 60 9c fa b7 92 17 d8 91 7e 61 c8 98 f2 1a f7 f0 17 c5 3e 76 9c 3c 07 b7 b9 a2 dc 1d 30 ec 39 b4 13 1e 03 ec e7 e8 cc 3e 8b c6 5b 97 0a 9c 16 03 03 01 4d 0c 00 01 49 03 00 17 41 04 c4 f6 9c 4f ba 98 68 95 d8 1e a0 b0 91 c8 5d 04 6e f5 da 47 c4 f3 97 fb ac ba 65 cc 4a e7 41 8d d2 ba e4 0e ef 2e ec 74 4a 10 c2 eb 98 b5 ea ea f9 9a f2 3b 0e 2e 7d 1d bc 9b ed 09 0f 6f 8e be 08 04 01 00 83 09 f6 50 8e a8 16 c5 3b d6 76 7a d9 6b e2 8a 2e cd 7a 71 63 d8 bf 5b 76 c4 ad 33 5d 44 57 d9 1b d5 5f 96 d4 72 c4 a9 fb eb ff 9b 4d 4e e1 99 3b 8a 16 ee 25 e2 f5 5d de ba 98 d5 77 39 d3 47 26 f9 83 bf 58 f1 28 39 63 13 05 52 f4 e2 82 a3 cd 08 03 d5 52 56 ac 71 a3 85 ed fe 6b 39 e3 ae b1 7c fc 52 07 da 58 96 de 59 ae 9f 2d 36 5d 0d 77 e2 6f 46 cc 66 c6 39 e1 77 dc 7b 30 be 95 e6 7b 19 0e c4 9a 25 3d 0e 67 ae e4 06 46 0a f9 1e 8a a4 30 4f 80 1f 51 bc 77 18 ff 78 6a cd 24 ae 1d 89 4a 6c 1a 1c e5 81 2c e5 51 6e 74 ab 43 6b 63 04 85 b5 a5 8c 1d c7 db a6 1a 53 32 c2 06 97 36 3c a1 9c 93 05 59 d4 71 8d ce a0 ae 33 1f 17 6f 35 6c b9 35 71 53 f9 08 f2 17 66 d8 89 22 d5 79 2f b1 de f7 44 51 01 e1 e8 2e cb f6 11 f9 f2 68 cb 99 b4 0c fa c0 88 64 80 5f ea 3a 62 62 ce 16 03 03 00 04 0e 00 00 00
    1652167179.271321 wpa_supplicant[1064063]: EAPOL: Received EAP-Packet frame
    1652167179.271324 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state REQUEST
    1652167179.271327 wpa_supplicant[1064063]: EAPOL: getSuppRsp
    1652167179.271330 wpa_supplicant[1064063]: EAP: EAP entering state RECEIVED
    1652167179.271337 wpa_supplicant[1064063]: EAP: Received EAP-Request id=47 method=21 vendor=0 vendorMethod=0
    1652167179.271340 wpa_supplicant[1064063]: EAP: EAP entering state METHOD
    1652167179.271345 wpa_supplicant[1064063]: SSL: Received packet(len=721) - Flags 0x80
    1652167179.271348 wpa_supplicant[1064063]: SSL: TLS Message Length: 2699
    1652167179.271365 wpa_supplicant[1064063]: OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
    1652167179.271369 wpa_supplicant[1064063]: OpenSSL: Message - hexdump(len=5): 16 03 03 00 3d
    1652167179.271374 wpa_supplicant[1064063]: SSL: (where=0x1001 ret=0x1)
    1652167179.271378 wpa_supplicant[1064063]: SSL: SSL_connect:SSLv3/TLS write client hello
    1652167179.271386 wpa_supplicant[1064063]: OpenSSL: RX ver=0x303 content_type=22 (handshake/server hello)
    1652167179.271395 wpa_supplicant[1064063]: OpenSSL: Message - hexdump(len=61): 02 00 00 39 03 03 0d 4e ca 0f 70 ce cb 6d 6c 98 cf 89 e3 05 0d a9 6c ca 17 b7 52 e5 95 e0 b9 09 7e 28 45 53 01 8d 00 c0 30 00 00 11 ff 01 00 01 00 00 0b 00 04 03 00 01 02 00 17 00 00
    1652167179.271404 wpa_supplicant[1064063]: OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
    1652167179.271408 wpa_supplicant[1064063]: OpenSSL: Message - hexdump(len=5): 16 03 03 08 e9
    1652167179.271412 wpa_supplicant[1064063]: SSL: (where=0x1001 ret=0x1)
    1652167179.271415 wpa_supplicant[1064063]: SSL: SSL_connect:SSLv3/TLS read server hello
    1652167179.271420 wpa_supplicant[1064063]: OpenSSL: RX ver=0x303 content_type=22 (handshake/certificate)
    1652167179.271604 wpa_supplicant[1064063]: OpenSSL: Message - hexdump(len=2281): 0b 00 08 e5 00 08 e2 00 03 de 30 82 03 da 30 82 02 c2 a0 03 02 01 02 02 01 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 1e 17 0d 32 32 30 35 31 30 30 37 31 38 35 36 5a 17 0d 32 32 30 37 30 39 30 37 31 38 35 36 5a 30 7c 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 23 30 21 06 03 55 04 03 0c 1a 45 78 61 6d 70 6c 65 20 53 65 72 76 65 72 20 43 65 72 74 69 66 69 63 61 74 65 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 c2 6e 32 38 0f 22 cf 90 1f f1 5d 46 63 a9 43 b9 f1 0a 49 df b5 c6 80 05 a3 85 32 1c df 42 94 32 b1 b5 aa f7 42 85 44 d5 0b f3 90 f7 48 bc e3 9b 1a b9 97 68 13 ec b0 3d ad 85 5b 96 90 3f a1 4d b0 b0 bc ce 82 ec 1a 31 c4 fb 8e e1 20 a7 86 68 b8 25 bb 0a 95 52 50 69 25 84 8d fc be 72 ee 5a e8 7b e7 29 f0 16 6a 78 c8 52 55 aa 1e c5 90 eb b8 8d 63 4a 2b f6 56 4f 2e 45 c6 82 54 36 bb b1 53 99 e1 2d ff 5b 82 c0 da 2f 46 d6 5f 62 6e d5 21 79 c5 e9 74 78 d2 8c 19 de 18 b2 10 e1 8d 2d 0a 1c 48 2c 22 39 2a 17 80 1b bb f8 dd df cc 4b de 3a 3a bf 28 e3 eb 9a 64 5b df dc 76 d7 57 5c 00 81 40 c1 d1 46 3f da e5 b4 39 f7 d6 46 f5 ef 48 0d dd 5f c0 84 b9 ae c6 28 39 3b 9c 25 cf 57 ff 26 75 fa e1 62 03 28 2a 90 46 26 76 9c 40 fd 91 60 4e 78 a0 7f 4a 4d b0 08 69 b3 9e 10 15 c5 02 03 01 00 01 a3 4f 30 4d 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 36 06 03 55 1d 1f 04 2f 30 2d 30 2b a0 29 a0 27 86 25 68 74 74 70 3a 2f 2f 77 77 77 2e 65 78 61 6d 70 6c 65 2e 63 6f 6d 2f 65 78 61 6d 70 6c 65 5f 63 61 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 13 25 3f 8f 84 f7 ac c6 29 b1 db 3f 10 45 13 23 04 14 ba 25 ad 65 24 40 af 40 60 d7 20 6f fa 67 a9 fd 1a 8e 25 d9 84 86 df 3d 37 fa 16 2f ff 20 d0 a4 8f 77 ad a2 30 d8 5e 85 8e 4e 59 de 07 55 3b d2 7c d7 41 e4 23 cf da fb f7 0c 0f 2d 69 ad f9 e9 d9 77 0d 93 0c 3c 96 bc 72 aa b8 0a 61 28 3c e3 6c 4d 19 03 ad 72 eb 39 c2 2b ee 70 90 eb ec 7b 2e 0c f1 33 9f 6c 4b 43 35 f1 0c 62 22 4e 66 50 c1 11 ef ed 26 b0 ab bb 01 38 09 01 6c cf 3d a8 04 c0 ec 2b 7b 21 c1 b7 39 c9 d5 c1 a8 03 16 3c f4 70 ab 9c 4a 7a 83 63 2f e0 c3 f3 5a e8 4f 53 cb 99 88 9c 13 3a 7b e3 46 d6 67 ca f7 1a a7 47 1c b0 6c be e7 d7 ab a3 0b 4e 6c c9 b3 19 56 67 9d 70 cf 78 2f 8b 2b 85 60 52 7e 9b 59 de 0d 17 00 90 46 e2 3d 14 c6 e6 4f f8 30 d3 71 65 a1 e1 f0 a4 20 c0 6a e1 34 a2 97 ae 95 7f d2 5e 00 04 fe 30 82 04 fa 30 82 03 e2 a0 03 02 01 02 02 14 51 34 6b 9a e6 32 a8 81 20 ca b5 df be 3e f2 0b c1 96 3b 24 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 1e 17 0d 32 32 30 35 31 30 30 37 31 38 35 36 5a 17 0d 32 32 30 37 30 39 30 37 31 38 35 36 5a 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 ad 94 e3 70 73 8a a4 28 ec 51 53 54 a9 45 6e c0 59 df bc 9f 11 ea e7 1e 34 70 53 98 52 b0 af 49 84 10 e0 53 eb ed c0 0a 1f 46 81 f3 e0 a0 2e ba 99 8c c9 f3 78 58 4d c7 c3 9d 4f 31 dd f3 70 16 d5 52 ae 12 e6 c2 09 4a c0 54 fa b2 15 d9 c3 79 28 06 c3 03 17 ea e0 ce f0 d6 9a 0d 7e bb 59 95 7e 66 5d c2 f8 31 61 ff e0 4b 53 cb 77 6a a8 5c 54 e8 90 34 77 4f 94 9b d4 5c 0f ba ea ba c5 fe 17 57 27 e2 cd bc 8a 1e e6 27 be b2 68 61 e0 56 39 9c dc ae 3f 45 7b 55 37 af 7c e2 b4 b9 36 85 d2 17 e5 b2 0c 34 ec e0 6f 4a c9 78 31 6b 66 7e 3a a9 7e 81 fc a6 fe ae 7b 0c cf dd aa ea 8e 1c a9 44 c2 4c 6d cc 68 1e 76 b4 da 10 b0 b2 cb cd 4e 42 11 72 95 36 0f 2f d4 81 d7 a5 88 8c b8 94 a4 9b 7c 9b 40 93 b8 f2 cb 72 f9 ac dd 46 08 e1 ba 24 74 34 91 06 1e c9 06 bc 7f bc a5 a0 7f 57 02 03 01 00 01 a3 82 01 42 30 82 01 3e 30 1d 06 03 55 1d 0e 04 16 04 14 52 bf 2e d0 5f b2 1a e4 0e 9c 9d ed 89 3e 76 8b 0b d6 b9 db 30 81 d3 06 03 55 1d 23 04 81 cb 30 81 c8 80 14 52 bf 2e d0 5f b2 1a e4 0e 9c 9d ed 89 3e 76 8b 0b d6 b9 db a1 81 99 a4 81 96 30 81 93 31 0b 30 09 06 03 55 04 06 13 02 46 52 31 0f 30 0d 06 03 55 04 08 0c 06 52 61 64 69 75 73 31 12 30 10 06 03 55 04 07 0c 09 53 6f 6d 65 77 68 65 72 65 31 15 30 13 06 03 55 04 0a 0c 0c 45 78 61 6d 70 6c 65 20 49 6e 63 2e 31 20 30 1e 06 09 2a 86 48 86 f7 0d 01 09 01 16 11 61 64 6d 69 6e 40 65 78 61 6d 70 6c 65 2e 6f 72 67 31 26 30 24 06 03 55 04 03 0c 1d 45 78 61 6d 70 6c 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 82 14 51 34 6b 9a e6 32 a8 81 20 ca b5 df be 3e f2 0b c1 96 3b 24 30 0f 06 03 55 1d 13 01 01 ff 04 05 30 03 01 01 ff 30 36 06 03 55 1d 1f 04 2f 30 2d 30 2b a0 29 a0 27 86 25 68 74 74 70 3a 2f 2f 77 77 77 2e 65 78 61 6d 70 6c 65 2e 6f 72 67 2f 65 78 61 6d 70 6c 65 5f 63 61 2e 63 72 6c 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 73 3e c4 70 73 8b 18 82 3a 00 ae 69 30 29 21 00 c1 29 f6 43 4f 06 55 02 1c e1 0e 61 1e f4 e4 50 3a 86 c1 7d f7 2a 89 b3 71 dc 15 b0 6c 97 4f 1c 2c 59 2d c4 da 2e 3b ed 8e e8 55 ae ff 94 5e a1 f7 12 5d 10 fc 10 9e 26 b9 a5 dd 56 05 5f 1c 3a dc b8 c9 02 ef 89 69 71 ca b8 d4 c5 05 eb 5f cf b8 40 94 9b 17 d9 f2 6b fa a7 be d7 fe 52 2d e2 3a e4 8e cd f0 31 42 c3 64 c6 c8 0f df f0 d1 85 df 93 84 c4 50 15 b1 55 c0 22 1d 91 26 85 c9 9c ca 7d 19 d8 40 48 8b ec de e2 6b bf 05 49 14 80 3c 71 65 66 a4 6c cc ff ea ac 0d ee cb 6a f9 6f 41 0c 3f 5c 61 a7 57 87 65 71 64 86 b4 fa 27 e7 41 0b 49 57 cc 96 ab b7 65 a5 f9 8a 21 b6 af 5b ec 49 60 9c fa b7 92 17 d8 91 7e 61 c8 98 f2 1a f7 f0 17 c5 3e 76 9c 3c 07 b7 b9 a2 dc 1d 30 ec 39 b4 13 1e 03 ec e7 e8 cc 3e 8b c6 5b 97 0a 9c
    1652167179.271900 wpa_supplicant[1064063]: OpenSSL: Peer certificate - depth 1
                                               Certificate:
                                                   Data:
                                                       Version: 3 (0x2)
                                                       Serial Number:
                                                           51:34:6b:9a:e6:32:a8:81:20:ca:b5:df:be:3e:f2:0b:c1:96:3b:24
                                                       Signature Algorithm: sha256WithRSAEncryption
                                                       Issuer: C=FR, ST=Radius, L=Somewhere, O=Example Inc./emailAddress=admin@example.org, CN=Example Certificate Authority
                                                       Validity
                                                           Not Before: May 10 07:18:56 2022 GMT
                                                           Not After : Jul  9 07:18:56 2022 GMT
                                                       Subject: C=FR, ST=Radius, L=Somewhere, O=Example Inc./emailAddress=admin@example.org, CN=Example Certificate Authority
                                                       Subject Public Key Info:
                                                           Public Key Algorithm: rsaEncryption
                                                               RSA Public-Key: (2048 bit)
                                                               Modulus:
                                                                   00:ad:94:e3:70:73:8a:a4:28:ec:51:53:54:a9:45:
                                                                   6e:c0:59:df:bc:9f:11:ea:e7:1e:34:70:53:98:52:
                                                                   b0:af:49:84:10:e0:53:eb:ed:c0:0a:1f:46:81:f3:
                                                                   e0:a0:2e:ba:99:8c:c9:f3:78:58:4d:c7:c3:9d:4f:
                                                                   31:dd:f3:70:16:d5:52:ae:12:e6:c2:09:4a:c0:54:
                                                                   fa:b2:15:d9:c3:79:28:06:c3:03:17:ea:e0:ce:f0:
                                                                   d6:9a:0d:7e:bb:59:95:7e:66:5d:c2:f8:31:61:ff:
                                                                   e0:4b:53:cb:77:6a:a8:5c:54:e8:90:34:77:4f:94:
                                                                   9b:d4:5c:0f:ba:ea:ba:c5:fe:17:57:27:e2:cd:bc:
                                                                   8a:1e:e6:27:be:b2:68:61:e0:56:39:9c:dc:ae:3f:
                                                                   45:7b:55:37:af:7c:e2:b4:b9:36:85:d2:17:e5:b2:
                                                                   0c:34:ec:e0:6f:4a:c9:78:31:6b:66:7e:3a:a9:7e:
                                                                   81:fc:a6:fe:ae:7b:0c:cf:dd:aa:ea:8e:1c:a9:44:
                                                                   c2:4c:6d:cc:68:1e:76:b4:da:10:b0:b2:cb:cd:4e:
                                                                   42:11:72:95:36:0f:2f:d4:81:d7:a5:88:8c:b8:94:
                                                                   a4:9b:7c:9b:40:93:b8:f2:cb:72:f9:ac:dd:46:08:
                                                                   e1:ba:24:74:34:91:06:1e:c9:06:bc:7f:bc:a5:a0:
                                                                   7f:57
                                                               Exponent: 65537 (0x10001)
                                                       X509v3 extensions:
                                                           X509v3 Subject Key Identifier: 
                                                               52:BF:2E:D0:5F:B2:1A:E4:0E:9C:9D:ED:89:3E:76:8B:0B:D6:B9:DB
                                                           X509v3 Authority Key Identifier: 
                                                               keyid:52:BF:2E:D0:5F:B2:1A:E4:0E:9C:9D:ED:89:3E:76:8B:0B:D6:B9:DB
                                                               DirName:/C=FR/ST=Radius/L=Somewhere/O=Example Inc./emailAddress=admin@example.org/CN=Example Certificate Authority
                                                               serial:51:34:6B:9A:E6:32:A8:81:20:CA:B5:DF:BE:3E:F2:0B:C1:96:3B:24
                                               
                                                           X509v3 Basic Constraints: critical
                                                               CA:TRUE
                                                           X509v3 CRL Distribution Points: 
                                               
                                                               Full Name:
                                                                 URI:http://www.example.org/example_ca.crl
                                               
                                                   Signature Algorithm: sha256WithRSAEncryption
                                                        73:3e:c4:70:73:8b:18:82:3a:00:ae:69:30:29:21:00:c1:29:
                                                        f6:43:4f:06:55:02:1c:e1:0e:61:1e:f4:e4:50:3a:86:c1:7d:
                                                        f7:2a:89:b3:71:dc:15:b0:6c:97:4f:1c:2c:59:2d:c4:da:2e:
                                                        3b:ed:8e:e8:55:ae:ff:94:5e:a1:f7:12:5d:10:fc:10:9e:26:
                                                        b9:a5:dd:56:05:5f:1c:3a:dc:b8:c9:02:ef:89:69:71:ca:b8:
                                                        d4:c5:05:eb:5f:cf:b8:40:94:9b:17:d9:f2:6b:fa:a7:be:d7:
                                                        fe:52:2d:e2:3a:e4:8e:cd:f0:31:42:c3:64:c6:c8:0f:df:f0:
                                                        d1:85:df:93:84:c4:50:15:b1:55:c0:22:1d:91:26:85:c9:9c:
                                                        ca:7d:19:d8:40:48:8b:ec:de:e2:6b:bf:05:49:14:80:3c:71:
                                                        65:66:a4:6c:cc:ff:ea:ac:0d:ee:cb:6a:f9:6f:41:0c:3f:5c:
                                                        61:a7:57:87:65:71:64:86:b4:fa:27:e7:41:0b:49:57:cc:96:
                                                        ab:b7:65:a5:f9:8a:21:b6:af:5b:ec:49:60:9c:fa:b7:92:17:
                                                        d8:91:7e:61:c8:98:f2:1a:f7:f0:17:c5:3e:76:9c:3c:07:b7:
                                                        b9:a2:dc:1d:30:ec:39:b4:13:1e:03:ec:e7:e8:cc:3e:8b:c6:
                                                        5b:97:0a:9c
    1652167179.271924 wpa_supplicant[1064063]: test1: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=FR/ST=Radius/L=Somewhere/O=Example Inc./emailAddress=admin@example.org/CN=Example Certificate Authority' hash=0240366e52400334e796f1b47040faa579e47fe251261556d6d87abd2d10c1f1
    1652167179.272109 wpa_supplicant[1064063]: TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=1 buf='/C=FR/ST=Radius/L=Somewhere/O=Example Inc./emailAddress=admin@example.org/CN=Example Certificate Authority'
    1652167179.272285 wpa_supplicant[1064063]: OpenSSL: Peer certificate - depth 0
                                               Certificate:
                                                   Data:
                                                       Version: 3 (0x2)
                                                       Serial Number: 1 (0x1)
                                                       Signature Algorithm: sha256WithRSAEncryption
                                                       Issuer: C=FR, ST=Radius, L=Somewhere, O=Example Inc./emailAddress=admin@example.org, CN=Example Certificate Authority
                                                       Validity
                                                           Not Before: May 10 07:18:56 2022 GMT
                                                           Not After : Jul  9 07:18:56 2022 GMT
                                                       Subject: C=FR, ST=Radius, O=Example Inc., CN=Example Server Certificate/emailAddress=admin@example.org
                                                       Subject Public Key Info:
                                                           Public Key Algorithm: rsaEncryption
                                                               RSA Public-Key: (2048 bit)
                                                               Modulus:
                                                                   00:c2:6e:32:38:0f:22:cf:90:1f:f1:5d:46:63:a9:
                                                                   43:b9:f1:0a:49:df:b5:c6:80:05:a3:85:32:1c:df:
                                                                   42:94:32:b1:b5:aa:f7:42:85:44:d5:0b:f3:90:f7:
                                                                   48:bc:e3:9b:1a:b9:97:68:13:ec:b0:3d:ad:85:5b:
                                                                   96:90:3f:a1:4d:b0:b0:bc:ce:82:ec:1a:31:c4:fb:
                                                                   8e:e1:20:a7:86:68:b8:25:bb:0a:95:52:50:69:25:
                                                                   84:8d:fc:be:72:ee:5a:e8:7b:e7:29:f0:16:6a:78:
                                                                   c8:52:55:aa:1e:c5:90:eb:b8:8d:63:4a:2b:f6:56:
                                                                   4f:2e:45:c6:82:54:36:bb:b1:53:99:e1:2d:ff:5b:
                                                                   82:c0:da:2f:46:d6:5f:62:6e:d5:21:79:c5:e9:74:
                                                                   78:d2:8c:19:de:18:b2:10:e1:8d:2d:0a:1c:48:2c:
                                                                   22:39:2a:17:80:1b:bb:f8:dd:df:cc:4b:de:3a:3a:
                                                                   bf:28:e3:eb:9a:64:5b:df:dc:76:d7:57:5c:00:81:
                                                                   40:c1:d1:46:3f:da:e5:b4:39:f7:d6:46:f5:ef:48:
                                                                   0d:dd:5f:c0:84:b9:ae:c6:28:39:3b:9c:25:cf:57:
                                                                   ff:26:75:fa:e1:62:03:28:2a:90:46:26:76:9c:40:
                                                                   fd:91:60:4e:78:a0:7f:4a:4d:b0:08:69:b3:9e:10:
                                                                   15:c5
                                                               Exponent: 65537 (0x10001)
                                                       X509v3 extensions:
                                                           X509v3 Extended Key Usage: 
                                                               TLS Web Server Authentication
                                                           X509v3 CRL Distribution Points: 
                                               
                                                               Full Name:
                                                                 URI:http://www.example.com/example_ca.crl
                                               
                                                   Signature Algorithm: sha256WithRSAEncryption
                                                        13:25:3f:8f:84:f7:ac:c6:29:b1:db:3f:10:45:13:23:04:14:
                                                        ba:25:ad:65:24:40:af:40:60:d7:20:6f:fa:67:a9:fd:1a:8e:
                                                        25:d9:84:86:df:3d:37:fa:16:2f:ff:20:d0:a4:8f:77:ad:a2:
                                                        30:d8:5e:85:8e:4e:59:de:07:55:3b:d2:7c:d7:41:e4:23:cf:
                                                        da:fb:f7:0c:0f:2d:69:ad:f9:e9:d9:77:0d:93:0c:3c:96:bc:
                                                        72:aa:b8:0a:61:28:3c:e3:6c:4d:19:03:ad:72:eb:39:c2:2b:
                                                        ee:70:90:eb:ec:7b:2e:0c:f1:33:9f:6c:4b:43:35:f1:0c:62:
                                                        22:4e:66:50:c1:11:ef:ed:26:b0:ab:bb:01:38:09:01:6c:cf:
                                                        3d:a8:04:c0:ec:2b:7b:21:c1:b7:39:c9:d5:c1:a8:03:16:3c:
                                                        f4:70:ab:9c:4a:7a:83:63:2f:e0:c3:f3:5a:e8:4f:53:cb:99:
                                                        88:9c:13:3a:7b:e3:46:d6:67:ca:f7:1a:a7:47:1c:b0:6c:be:
                                                        e7:d7:ab:a3:0b:4e:6c:c9:b3:19:56:67:9d:70:cf:78:2f:8b:
                                                        2b:85:60:52:7e:9b:59:de:0d:17:00:90:46:e2:3d:14:c6:e6:
                                                        4f:f8:30:d3:71:65:a1:e1:f0:a4:20:c0:6a:e1:34:a2:97:ae:
                                                        95:7f:d2:5e
    1652167179.272302 wpa_supplicant[1064063]: test1: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=FR/ST=Radius/O=Example Inc./CN=Example Server Certificate/emailAddress=admin@example.org' hash=1c22791317b29cf2b758cbc6d5f0847eccf4970decabf928e228d9ad27fd83bc
    1652167179.272438 wpa_supplicant[1064063]: TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=0 buf='/C=FR/ST=Radius/O=Example Inc./CN=Example Server Certificate/emailAddress=admin@example.org'
    1652167179.272442 wpa_supplicant[1064063]: EAP: Status notification: remote certificate verification (param=success)
    1652167179.272465 wpa_supplicant[1064063]: OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
    1652167179.272477 wpa_supplicant[1064063]: OpenSSL: Message - hexdump(len=5): 16 03 03 01 4d
    1652167179.272482 wpa_supplicant[1064063]: SSL: (where=0x1001 ret=0x1)
    1652167179.272485 wpa_supplicant[1064063]: SSL: SSL_connect:SSLv3/TLS read server certificate
    1652167179.272490 wpa_supplicant[1064063]: OpenSSL: RX ver=0x303 content_type=22 (handshake/server key exchange)
    1652167179.272518 wpa_supplicant[1064063]: OpenSSL: Message - hexdump(len=333): 0c 00 01 49 03 00 17 41 04 c4 f6 9c 4f ba 98 68 95 d8 1e a0 b0 91 c8 5d 04 6e f5 da 47 c4 f3 97 fb ac ba 65 cc 4a e7 41 8d d2 ba e4 0e ef 2e ec 74 4a 10 c2 eb 98 b5 ea ea f9 9a f2 3b 0e 2e 7d 1d bc 9b ed 09 0f 6f 8e be 08 04 01 00 83 09 f6 50 8e a8 16 c5 3b d6 76 7a d9 6b e2 8a 2e cd 7a 71 63 d8 bf 5b 76 c4 ad 33 5d 44 57 d9 1b d5 5f 96 d4 72 c4 a9 fb eb ff 9b 4d 4e e1 99 3b 8a 16 ee 25 e2 f5 5d de ba 98 d5 77 39 d3 47 26 f9 83 bf 58 f1 28 39 63 13 05 52 f4 e2 82 a3 cd 08 03 d5 52 56 ac 71 a3 85 ed fe 6b 39 e3 ae b1 7c fc 52 07 da 58 96 de 59 ae 9f 2d 36 5d 0d 77 e2 6f 46 cc 66 c6 39 e1 77 dc 7b 30 be 95 e6 7b 19 0e c4 9a 25 3d 0e 67 ae e4 06 46 0a f9 1e 8a a4 30 4f 80 1f 51 bc 77 18 ff 78 6a cd 24 ae 1d 89 4a 6c 1a 1c e5 81 2c e5 51 6e 74 ab 43 6b 63 04 85 b5 a5 8c 1d c7 db a6 1a 53 32 c2 06 97 36 3c a1 9c 93 05 59 d4 71 8d ce a0 ae 33 1f 17 6f 35 6c b9 35 71 53 f9 08 f2 17 66 d8 89 22 d5 79 2f b1 de f7 44 51 01 e1 e8 2e cb f6 11 f9 f2 68 cb 99 b4 0c fa c0 88 64 80 5f ea 3a 62 62 ce
    1652167179.272624 wpa_supplicant[1064063]: OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
    1652167179.272628 wpa_supplicant[1064063]: OpenSSL: Message - hexdump(len=5): 16 03 03 00 04
    1652167179.272632 wpa_supplicant[1064063]: SSL: (where=0x1001 ret=0x1)
    1652167179.272635 wpa_supplicant[1064063]: SSL: SSL_connect:SSLv3/TLS read server key exchange
    1652167179.272641 wpa_supplicant[1064063]: OpenSSL: RX ver=0x303 content_type=22 (handshake/server hello done)
    1652167179.272645 wpa_supplicant[1064063]: OpenSSL: Message - hexdump(len=4): 0e 00 00 00
    1652167179.272649 wpa_supplicant[1064063]: SSL: (where=0x1001 ret=0x1)
    1652167179.272651 wpa_supplicant[1064063]: SSL: SSL_connect:SSLv3/TLS read server done
    1652167179.272791 wpa_supplicant[1064063]: OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
    1652167179.272795 wpa_supplicant[1064063]: OpenSSL: Message - hexdump(len=5): 16 03 03 00 46
    1652167179.272799 wpa_supplicant[1064063]: OpenSSL: TX ver=0x303 content_type=22 (handshake/client key exchange)
    1652167179.272808 wpa_supplicant[1064063]: OpenSSL: Message - hexdump(len=70): 10 00 00 42 41 04 27 86 88 61 15 09 79 60 cf f7 c3 01 13 55 c4 69 b3 47 2b 59 52 01 85 88 93 ab 44 7c a1 cc a3 09 54 d9 53 be 92 44 f4 bd b4 c9 89 e5 57 04 06 66 09 77 08 1d a2 79 46 40 c2 90 20 53 10 26 0c 75
    1652167179.272834 wpa_supplicant[1064063]: SSL: (where=0x1001 ret=0x1)
    1652167179.272837 wpa_supplicant[1064063]: SSL: SSL_connect:SSLv3/TLS write client key exchange
    1652167179.272842 wpa_supplicant[1064063]: OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
    1652167179.272846 wpa_supplicant[1064063]: OpenSSL: Message - hexdump(len=5): 14 03 03 00 01
    1652167179.272851 wpa_supplicant[1064063]: OpenSSL: TX ver=0x303 content_type=20 (change cipher spec/)
    1652167179.272856 wpa_supplicant[1064063]: OpenSSL: Message - hexdump(len=1): 01
    1652167179.272898 wpa_supplicant[1064063]: SSL: (where=0x1001 ret=0x1)
    1652167179.272901 wpa_supplicant[1064063]: SSL: SSL_connect:SSLv3/TLS write change cipher spec
    1652167179.272922 wpa_supplicant[1064063]: OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
    1652167179.272928 wpa_supplicant[1064063]: OpenSSL: Message - hexdump(len=5): 16 03 03 00 28
    1652167179.272933 wpa_supplicant[1064063]: OpenSSL: TX ver=0x303 content_type=22 (handshake/finished)
    1652167179.272937 wpa_supplicant[1064063]: OpenSSL: Message - hexdump(len=16): 14 00 00 0c c3 db 28 49 d4 33 1f 34 0d db 56 43
    1652167179.272941 wpa_supplicant[1064063]: SSL: (where=0x1001 ret=0x1)
    1652167179.272944 wpa_supplicant[1064063]: SSL: SSL_connect:SSLv3/TLS write finished
    1652167179.272947 wpa_supplicant[1064063]: SSL: (where=0x1002 ret=0xffffffff)
    1652167179.272950 wpa_supplicant[1064063]: SSL: SSL_connect:error in SSLv3/TLS write finished
    1652167179.272954 wpa_supplicant[1064063]: SSL: SSL_connect - want more data
    1652167179.272957 wpa_supplicant[1064063]: SSL: 126 bytes pending from ssl_out
    1652167179.272961 wpa_supplicant[1064063]: SSL: Using TLS version TLSv1.2
    1652167179.272965 wpa_supplicant[1064063]: SSL: 126 bytes left to be sent out (of total 126 bytes)
    1652167179.272969 wpa_supplicant[1064063]: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x556811b8e480
    1652167179.272972 wpa_supplicant[1064063]: EAP: EAP entering state SEND_RESPONSE
    1652167179.272975 wpa_supplicant[1064063]: EAP: EAP entering state IDLE
    1652167179.272979 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state RESPONSE
    1652167179.272983 wpa_supplicant[1064063]: EAPOL: txSuppRsp
    1652167179.272988 wpa_supplicant[1064063]: TX EAPOL: dst=01:80:c2:00:00:03
    1652167179.273003 wpa_supplicant[1064063]: TX EAPOL - hexdump(len=136): 01 00 00 84 02 2f 00 84 15 00 16 03 03 00 46 10 00 00 42 41 04 27 86 88 61 15 09 79 60 cf f7 c3 01 13 55 c4 69 b3 47 2b 59 52 01 85 88 93 ab 44 7c a1 cc a3 09 54 d9 53 be 92 44 f4 bd b4 c9 89 e5 57 04 06 66 09 77 08 1d a2 79 46 40 c2 90 20 53 10 26 0c 75 14 03 03 00 01 01 16 03 03 00 28 0d c0 f4 a4 1d b7 6e 6f 2e f4 6d fe 17 e7 14 a4 6f cb cc ce 27 6b 2b 73 4f a7 4e a4 4a 2f c8 82 ad 45 70 b5 81 db 88 36
    1652167179.273033 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state RECEIVE
    1652167179.273633 wpa_supplicant[1064063]: l2_packet_receive: src=52:54:00:6a:25:3b len=65
    1652167179.273639 wpa_supplicant[1064063]: test1: RX EAPOL from 52:54:00:6a:25:3b
    1652167179.273648 wpa_supplicant[1064063]: RX EAPOL - hexdump(len=65): 02 00 00 3d 01 30 00 3d 15 80 00 00 00 33 14 03 03 00 01 01 16 03 03 00 28 21 ae e6 88 a9 50 35 44 4d 64 21 2f 0e 5b c2 ab 20 85 46 40 9a 41 ce 86 35 5d f4 51 3a c9 88 6c 75 a2 5d e4 71 4d 23 bf
    1652167179.273652 wpa_supplicant[1064063]: EAPOL: Received EAP-Packet frame
    1652167179.273656 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state REQUEST
    1652167179.273667 wpa_supplicant[1064063]: EAPOL: getSuppRsp
    1652167179.273672 wpa_supplicant[1064063]: EAP: EAP entering state RECEIVED
    1652167179.273678 wpa_supplicant[1064063]: EAP: Received EAP-Request id=48 method=21 vendor=0 vendorMethod=0
    1652167179.273681 wpa_supplicant[1064063]: EAP: EAP entering state METHOD
    1652167179.273685 wpa_supplicant[1064063]: SSL: Received packet(len=61) - Flags 0x80
    1652167179.273688 wpa_supplicant[1064063]: SSL: TLS Message Length: 51
    1652167179.273695 wpa_supplicant[1064063]: OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
    1652167179.273699 wpa_supplicant[1064063]: OpenSSL: Message - hexdump(len=5): 14 03 03 00 01
    1652167179.273703 wpa_supplicant[1064063]: SSL: (where=0x1001 ret=0x1)
    1652167179.273706 wpa_supplicant[1064063]: SSL: SSL_connect:SSLv3/TLS write finished
    1652167179.273713 wpa_supplicant[1064063]: OpenSSL: RX ver=0x0 content_type=256 (TLS header info/)
    1652167179.273716 wpa_supplicant[1064063]: OpenSSL: Message - hexdump(len=5): 16 03 03 00 28
    1652167179.273721 wpa_supplicant[1064063]: SSL: (where=0x1001 ret=0x1)
    1652167179.273724 wpa_supplicant[1064063]: SSL: SSL_connect:SSLv3/TLS read change cipher spec
    1652167179.273743 wpa_supplicant[1064063]: OpenSSL: RX ver=0x303 content_type=22 (handshake/finished)
    1652167179.273748 wpa_supplicant[1064063]: OpenSSL: Message - hexdump(len=16): 14 00 00 0c ed 36 6f bd f3 67 8e 24 44 78 cc 0e
    1652167179.273753 wpa_supplicant[1064063]: SSL: (where=0x1001 ret=0x1)
    1652167179.273758 wpa_supplicant[1064063]: SSL: SSL_connect:SSLv3/TLS read finished
    1652167179.273765 wpa_supplicant[1064063]: SSL: (where=0x20 ret=0x1)
    1652167179.273768 wpa_supplicant[1064063]: SSL: (where=0x1002 ret=0x1)
    1652167179.273771 wpa_supplicant[1064063]: SSL: 0 bytes pending from ssl_out
    1652167179.273774 wpa_supplicant[1064063]: OpenSSL: Handshake finished - resumed=0
    1652167179.273779 wpa_supplicant[1064063]: SSL: No Application Data included
    1652167179.273782 wpa_supplicant[1064063]: SSL: Using TLS version TLSv1.2
    1652167179.273785 wpa_supplicant[1064063]: SSL: No data to be sent out
    1652167179.273788 wpa_supplicant[1064063]: EAP-TTLS: TLS done, proceed to Phase 2
    1652167179.273815 wpa_supplicant[1064063]: EAP-TTLS: Derived key - hexdump(len=64): 0c ca bf 81 bf 06 f3 33 64 ef b8 e0 d4 ae 73 12 a0 04 c5 7e 2d 88 7d 8c 14 80 cd 88 aa 71 c3 e4 32 81 66 80 7f d3 38 c3 1f 42 ef ef cf 21 65 01 47 68 a3 8f b0 c5 2e f2 60 31 e5 5c b1 0d 03 b9
    1652167179.273823 wpa_supplicant[1064063]: EAP-TTLS: Derived EMSK - hexdump(len=64): b3 3d 2b 73 fe e2 34 48 04 54 6a 4c e6 de 77 a0 36 b6 ad e5 59 73 ec 16 45 8b 04 bc ec 1f de 6f a6 23 4c 17 dd 7d e0 5a 4b 3f af 01 66 02 76 54 78 36 7c fd 02 00 ac be 28 b4 71 c7 1c 69 9d ac
    1652167179.273832 wpa_supplicant[1064063]: EAP-TTLS: Derived Session-Id - hexdump(len=65): 15 45 96 b6 c9 e0 0e ea 92 7c 54 4c 42 66 e1 b0 c5 08 ed 85 67 e7 94 cb e5 bd 91 f9 42 44 b4 e9 80 0d 4e ca 0f 70 ce cb 6d 6c 98 cf 89 e3 05 0d a9 6c ca 17 b7 52 e5 95 e0 b9 09 7e 28 45 53 01 8d
    1652167179.273835 wpa_supplicant[1064063]: EAP-TTLS: received 0 bytes encrypted data for Phase 2
    1652167179.273838 wpa_supplicant[1064063]: EAP-TTLS: empty data in beginning of Phase 2 - use fake EAP-Request Identity
    1652167179.273842 wpa_supplicant[1064063]: EAP-TTLS: Phase 2 PAP Request
    1652167179.273850 wpa_supplicant[1064063]: EAP-TTLS: Encrypting Phase 2 data - hexdump(len=44): 00 00 00 01 40 00 00 14 65 78 61 6d 70 6c 65 5f 75 73 65 72 00 00 00 02 40 00 00 18 75 73 65 72 5f 70 61 73 73 77 6f 72 64 00 00 00
    1652167179.273858 wpa_supplicant[1064063]: OpenSSL: TX ver=0x0 content_type=256 (TLS header info/)
    1652167179.273861 wpa_supplicant[1064063]: OpenSSL: Message - hexdump(len=5): 17 03 03 00 44
    1652167179.273866 wpa_supplicant[1064063]: SSL: 73 bytes left to be sent out (of total 73 bytes)
    1652167179.273869 wpa_supplicant[1064063]: EAP-TTLS: Authentication completed successfully
    1652167179.273874 wpa_supplicant[1064063]: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=COND_SUCC eapRespData=0x556811bff810
    1652167179.273882 wpa_supplicant[1064063]: EAP: Session-Id - hexdump(len=65): 15 45 96 b6 c9 e0 0e ea 92 7c 54 4c 42 66 e1 b0 c5 08 ed 85 67 e7 94 cb e5 bd 91 f9 42 44 b4 e9 80 0d 4e ca 0f 70 ce cb 6d 6c 98 cf 89 e3 05 0d a9 6c ca 17 b7 52 e5 95 e0 b9 09 7e 28 45 53 01 8d
    1652167179.273885 wpa_supplicant[1064063]: EAP: EAP entering state SEND_RESPONSE
    1652167179.273888 wpa_supplicant[1064063]: EAP: EAP entering state IDLE
    1652167179.273891 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state RESPONSE
    1652167179.273893 wpa_supplicant[1064063]: EAPOL: txSuppRsp
    1652167179.273897 wpa_supplicant[1064063]: TX EAPOL: dst=01:80:c2:00:00:03
    1652167179.273906 wpa_supplicant[1064063]: TX EAPOL - hexdump(len=83): 01 00 00 4f 02 30 00 4f 15 00 17 03 03 00 44 0d c0 f4 a4 1d b7 6e 70 65 2b ba e1 51 f5 cd d4 7e 21 15 32 2b 71 85 e0 eb 5d e6 97 99 35 7b a7 36 a0 8f f3 92 94 07 d7 a2 42 54 3c 92 94 e5 8a 4e f3 d7 94 f8 5c 4a 12 1b 2e fb be 3f a1 83 af 26 43 80 2e
    1652167179.273931 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state RECEIVE
    1652167179.274512 wpa_supplicant[1064063]: l2_packet_receive: src=52:54:00:6a:25:3b len=8
    1652167179.274521 wpa_supplicant[1064063]: test1: RX EAPOL from 52:54:00:6a:25:3b
    1652167179.274526 wpa_supplicant[1064063]: RX EAPOL - hexdump(len=8): 02 00 00 04 03 30 00 04
    1652167179.274529 wpa_supplicant[1064063]: EAPOL: Received EAP-Packet frame
    1652167179.274533 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state REQUEST
    1652167179.274536 wpa_supplicant[1064063]: EAPOL: getSuppRsp
    1652167179.274539 wpa_supplicant[1064063]: EAP: EAP entering state RECEIVED
    1652167179.274545 wpa_supplicant[1064063]: EAP: Received EAP-Success
    1652167179.274548 wpa_supplicant[1064063]: EAP: Status notification: completion (param=success)
    1652167179.274582 wpa_supplicant[1064063]: EAP: EAP entering state SUCCESS
    1652167179.274586 wpa_supplicant[1064063]: test1: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
    1652167179.274589 wpa_supplicant[1064063]: EAPOL: IEEE 802.1X for plaintext connection; no EAPOL-Key frames required
    1652167179.274592 wpa_supplicant[1064063]: test1: WPA: EAPOL processing complete
    1652167179.274596 wpa_supplicant[1064063]: test1: Cancelling authentication timeout
    1652167179.274600 wpa_supplicant[1064063]: test1: State: ASSOCIATED -> COMPLETED
    1652167179.274606 wpa_supplicant[1064063]: test1: CTRL-EVENT-CONNECTED - Connection to 01:80:c2:00:00:03 completed [id=0 id_str=]
    1652167179.274618 wpa_supplicant[1064063]: EAPOL: SUPP_PAE entering state AUTHENTICATED
    1652167179.274621 wpa_supplicant[1064063]: EAPOL: Supplicant port status: Authorized
    1652167179.274624 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state RECEIVE
    1652167179.274627 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state SUCCESS
    1652167179.274630 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state IDLE
    1652167179.274633 wpa_supplicant[1064063]: EAPOL authentication completed - result=SUCCESS
    1652167179.279703 wpa_supplicant[1064063]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/14
    1652167182.370549 wpa_supplicant[1064063]: dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/14) []
    1652167182.370565 wpa_supplicant[1064063]: test1: Cancelling scan request
    1652167182.370580 wpa_supplicant[1064063]: test1: Request to deauthenticate - bssid=01:80:c2:00:00:03 pending_bssid=00:00:00:00:00:00 reason=3 (DEAUTH_LEAVING) state=COMPLETED
    1652167182.370586 wpa_supplicant[1064063]: test1: Event DEAUTH (11) received
    1652167182.370591 wpa_supplicant[1064063]: test1: Deauthentication notification
    1652167182.370599 wpa_supplicant[1064063]: test1:  * reason 3 (DEAUTH_LEAVING) locally_generated=1
    1652167182.370605 wpa_supplicant[1064063]: Deauthentication frame IE(s) - hexdump(len=0): [NULL]
    1652167182.370613 wpa_supplicant[1064063]: test1: CTRL-EVENT-DISCONNECTED bssid=01:80:c2:00:00:03 reason=3 locally_generated=1
    1652167182.370619 wpa_supplicant[1064063]: test1: Auto connect disabled: do not try to re-connect
    1652167182.370626 wpa_supplicant[1064063]: test1: Ignore connection failure indication since interface has been put into disconnected state
    1652167182.370633 wpa_supplicant[1064063]: test1: WPA: Clear old PMK and PTK
    1652167182.370708 wpa_supplicant[1064063]: test1: State: COMPLETED -> DISCONNECTED
    1652167182.370723 wpa_supplicant[1064063]: EAPOL: External notification - portEnabled=0
    1652167182.370729 wpa_supplicant[1064063]: EAPOL: SUPP_PAE entering state DISCONNECTED
    1652167182.370735 wpa_supplicant[1064063]: EAPOL: Supplicant port status: Unauthorized
    1652167182.370739 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state INITIALIZE
    1652167182.370746 wpa_supplicant[1064063]: EAP: EAP entering state DISABLED
    1652167182.370752 wpa_supplicant[1064063]: EAPOL: External notification - portValid=0
    1652167182.370760 wpa_supplicant[1064063]: test1: State: DISCONNECTED -> DISCONNECTED
    1652167182.370766 wpa_supplicant[1064063]: EAPOL: External notification - portEnabled=0
    1652167182.370770 wpa_supplicant[1064063]: EAPOL: External notification - portValid=0
    1652167182.370776 wpa_supplicant[1064063]: QM: Clear all active DSCP policies
    1652167182.370781 wpa_supplicant[1064063]: test1: CTRL-EVENT-DSCP-POLICY clear_all
    1652167182.370888 wpa_supplicant[1064063]: dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/14) [o]
    1652167182.370901 wpa_supplicant[1064063]: dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/14/Networks/0'
    1652167182.370926 wpa_supplicant[1064063]: EAP: deinitialize previously used EAP method (21, TTLS) at invalidate
    1652167182.371012 wpa_supplicant[1064063]: ENGINE: engine deinit
    1652167182.371057 wpa_supplicant[1064063]: dbus: fi.w1.wpa_supplicant1.RemoveInterface (/fi/w1/wpa_supplicant1) [o]
    1652167182.371090 wpa_supplicant[1064063]: test1: Removing interface test1
    1652167182.371102 wpa_supplicant[1064063]: test1: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 (DEAUTH_LEAVING) state=DISCONNECTED
    1652167182.371110 wpa_supplicant[1064063]: test1: State: DISCONNECTED -> DISCONNECTED
    1652167182.371116 wpa_supplicant[1064063]: EAPOL: External notification - portEnabled=0
    1652167182.371122 wpa_supplicant[1064063]: EAPOL: External notification - portValid=0
    1652167182.371127 wpa_supplicant[1064063]: QM: Clear all active DSCP policies
    1652167182.371132 wpa_supplicant[1064063]: test1: CTRL-EVENT-DSCP-POLICY clear_all
    1652167182.374188 wpa_supplicant[1064063]: test1: WPA: Clear old PMK and PTK
    1652167182.374205 wpa_supplicant[1064063]: test1: Cancelling scan request
    1652167182.374211 wpa_supplicant[1064063]: test1: Cancelling authentication timeout
    1652167182.374232 wpa_supplicant[1064063]: Off-channel: Clear pending Action frame TX (pending_action_tx=(nil)
    1652167182.374242 wpa_supplicant[1064063]: Off-channel: Action frame sequence done notification: pending_action_tx=(nil) drv_offchan_tx=0 action_tx_wait_time=0 off_channel_freq=0 roc_waiting_drv_freq=0
    1652167182.374249 wpa_supplicant[1064063]: QM: Clear all active DSCP policies
    1652167182.374254 wpa_supplicant[1064063]: test1: CTRL-EVENT-DSCP-POLICY clear_all
    1652167182.374259 wpa_supplicant[1064063]: Remove interface test1 from radio
    1652167182.374263 wpa_supplicant[1064063]: Remove radio
    1652167182.379160 wpa_supplicant[1064063]: dbus: Unregister interface object '/fi/w1/wpa_supplicant1/Interfaces/14'
    1652167185.184329 wpa_supplicant[1064063]: dbus: fi.w1.wpa_supplicant1.CreateInterface (/fi/w1/wpa_supplicant1) [a{sv}]
    1652167185.184344 wpa_supplicant[1064063]: wpa_dbus_dict_open_read: start reading a dict entry
    1652167185.184349 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry key: Driver
    1652167185.184352 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry variant content type: s
    1652167185.184355 wpa_supplicant[1064063]: _wpa_dbus_dict_fill_value_from_variant: string value: wired
    1652167185.184361 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry key: Ifname
    1652167185.184364 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry variant content type: s
    1652167185.184367 wpa_supplicant[1064063]: _wpa_dbus_dict_fill_value_from_variant: string value: test1
    1652167185.184373 wpa_supplicant[1064063]: Initializing interface 'test1' conf 'N/A' driver 'wired' ctrl_interface 'N/A' bridge 'N/A'
    1652167185.184413 wpa_supplicant[1064063]: driver_wired_init_common: Added multicast membership with packet socket
    1652167185.184416 wpa_supplicant[1064063]: Add interface test1 to a new radio N/A
    1652167185.188237 wpa_supplicant[1064063]: test1: Own MAC address: ba:f4:5a:e0:9b:f0
    1652167185.188246 wpa_supplicant[1064063]: test1: RSN: flushing PMKID list in the driver
    1652167185.188250 wpa_supplicant[1064063]: test1: State: DISCONNECTED -> INACTIVE
    1652167185.188268 wpa_supplicant[1064063]: test1: WPS: UUID based on MAC address: 9843390e-3b4b-53ea-a4cc-2c7beb47db18
    1652167185.188494 wpa_supplicant[1064063]: ENGINE: Loading builtin engines
    1652167185.188736 wpa_supplicant[1064063]: ENGINE: Loading builtin engines
    1652167185.188827 wpa_supplicant[1064063]: EAPOL: SUPP_PAE entering state DISCONNECTED
    1652167185.188831 wpa_supplicant[1064063]: EAPOL: Supplicant port status: Unauthorized
    1652167185.188834 wpa_supplicant[1064063]: EAPOL: KEY_RX entering state NO_KEY_RECEIVE
    1652167185.188837 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state INITIALIZE
    1652167185.188841 wpa_supplicant[1064063]: EAP: EAP entering state DISABLED
    1652167185.188850 wpa_supplicant[1064063]: dbus: Register interface object '/fi/w1/wpa_supplicant1/Interfaces/15'
    1652167185.189087 wpa_supplicant[1064063]: test1: Added interface test1
    1652167185.189097 wpa_supplicant[1064063]: test1: State: INACTIVE -> DISCONNECTED
    1652167185.190514 wpa_supplicant[1064063]: dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/15) [ssv]
    1652167185.190539 wpa_supplicant[1064063]: properties_get_or_set: Set(BSSExpireAge)
    1652167185.190545 wpa_supplicant[1064063]: test1: Setting bss expiration age: 250 sec
    1652167185.190563 wpa_supplicant[1064063]: dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/15) [ssv]
    1652167185.190567 wpa_supplicant[1064063]: properties_get_or_set: Set(BSSExpireCount)
    1652167185.190572 wpa_supplicant[1064063]: test1: Setting bss expiration scan count: 2
    1652167185.190583 wpa_supplicant[1064063]: dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/15) [ssv]
    1652167185.190588 wpa_supplicant[1064063]: properties_get_or_set: Set(Pmf)
    1652167185.190595 wpa_supplicant[1064063]: pmf=1
    1652167185.190606 wpa_supplicant[1064063]: dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/15) [s]
    1652167185.190822 wpa_supplicant[1064063]: dbus: org.freedesktop.DBus.Properties.GetAll (/fi/w1/wpa_supplicant1/Interfaces/15) [s]
    1652167185.190832 wpa_supplicant[1064063]: dbus: fill_dict_with_properties dbus_interface=fi.w1.wpa_supplicant1.Interface.P2PDevice dbus_property=P2PDeviceConfig getter failed
    1652167185.192298 wpa_supplicant[1064063]: dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/15) [ssv]
    1652167185.192304 wpa_supplicant[1064063]: properties_get_or_set: Set(ApScan)
    1652167185.192363 wpa_supplicant[1064063]: dbus: org.freedesktop.DBus.Properties.Set (/fi/w1/wpa_supplicant1/Interfaces/15) [ssv]
    1652167185.192369 wpa_supplicant[1064063]: properties_get_or_set: Set(ApIsolate)
    1652167185.192376 wpa_supplicant[1064063]: ap_isolate=0
    1652167185.192969 wpa_supplicant[1064063]: dbus: fi.w1.wpa_supplicant1.Interface.AddNetwork (/fi/w1/wpa_supplicant1/Interfaces/15) [a{sv}]
    1652167185.192983 wpa_supplicant[1064063]: dbus: Register network object '/fi/w1/wpa_supplicant1/Interfaces/15/Networks/0'
    1652167185.193091 wpa_supplicant[1064063]: wpa_dbus_dict_open_read: start reading a dict entry
    1652167185.193095 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry key: eap
    1652167185.193098 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry variant content type: s
    1652167185.193102 wpa_supplicant[1064063]: _wpa_dbus_dict_fill_value_from_variant: string value: TLS
    1652167185.193111 wpa_supplicant[1064063]: eap methods - hexdump(len=16): 00 00 00 00 0d 00 00 00 00 00 00 00 00 00 00 00
    1652167185.193115 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry key: eapol_flags
    1652167185.193118 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry variant content type: i
    1652167185.193122 wpa_supplicant[1064063]: _wpa_dbus_dict_fill_value_from_variant: int32 value: 0
    1652167185.193126 wpa_supplicant[1064063]: eapol_flags=0 (0x0)
    1652167185.193130 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry key: private_key_passwd
    1652167185.193133 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry variant content type: a
    1652167185.193136 wpa_supplicant[1064063]: _wpa_dbus_dict_entry_get_array: array_type y
    1652167185.193141 wpa_supplicant[1064063]: dbus: byte array contents - hexdump(len=8): 77 68 61 74 65 76 65 72
    1652167185.193147 wpa_supplicant[1064063]: private_key_passwd - hexdump(len=8): 77 68 61 74 65 76 65 72
    1652167185.193151 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry key: client_cert
    1652167185.193154 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry variant content type: a
    1652167185.193157 wpa_supplicant[1064063]: _wpa_dbus_dict_entry_get_array: array_type y
    1652167185.193165 wpa_supplicant[1064063]: dbus: byte array contents - hexdump(len=28): 2f 65 74 63 2f 70 6b 69 2f 74 6c 73 2f 63 65 72 74 73 2f 38 30 32 31 78 2e 70 65 6d
    1652167185.193178 wpa_supplicant[1064063]: client_cert - hexdump(len=28): 2f 65 74 63 2f 70 6b 69 2f 74 6c 73 2f 63 65 72 74 73 2f 38 30 32 31 78 2e 70 65 6d
    1652167185.193182 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry key: fragment_size
    1652167185.193185 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry variant content type: i
    1652167185.193188 wpa_supplicant[1064063]: _wpa_dbus_dict_fill_value_from_variant: int32 value: 1266
    1652167185.193192 wpa_supplicant[1064063]: fragment_size=1266 (0x4f2)
    1652167185.193196 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry key: ca_cert
    1652167185.193199 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry variant content type: a
    1652167185.193201 wpa_supplicant[1064063]: _wpa_dbus_dict_entry_get_array: array_type y
    1652167185.193210 wpa_supplicant[1064063]: dbus: byte array contents - hexdump(len=31): 2f 65 74 63 2f 70 6b 69 2f 74 6c 73 2f 63 65 72 74 73 2f 38 30 32 31 78 2d 63 61 2e 70 65 6d
    1652167185.193218 wpa_supplicant[1064063]: ca_cert - hexdump(len=31): 2f 65 74 63 2f 70 6b 69 2f 74 6c 73 2f 63 65 72 74 73 2f 38 30 32 31 78 2d 63 61 2e 70 65 6d
    1652167185.193221 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry key: identity
    1652167185.193224 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry variant content type: a
    1652167185.193227 wpa_supplicant[1064063]: _wpa_dbus_dict_entry_get_array: array_type y
    1652167185.193231 wpa_supplicant[1064063]: dbus: byte array contents - hexdump(len=4): 73 70 61 6d
    1652167185.193236 wpa_supplicant[1064063]: identity - hexdump(len=4): 73 70 61 6d
    1652167185.193241 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry key: private_key
    1652167185.193244 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry variant content type: a
    1652167185.193246 wpa_supplicant[1064063]: _wpa_dbus_dict_entry_get_array: array_type y
    1652167185.193254 wpa_supplicant[1064063]: dbus: byte array contents - hexdump(len=30): 2f 65 74 63 2f 70 6b 69 2f 74 6c 73 2f 70 72 69 76 61 74 65 2f 38 30 32 31 78 2e 6b 65 79
    1652167185.193262 wpa_supplicant[1064063]: private_key - hexdump(len=30): 2f 65 74 63 2f 70 6b 69 2f 74 6c 73 2f 70 72 69 76 61 74 65 2f 38 30 32 31 78 2e 6b 65 79
    1652167185.193266 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry key: key_mgmt
    1652167185.193269 wpa_supplicant[1064063]: wpa_dbus_dict_get_entry: dict entry variant content type: s
    1652167185.193272 wpa_supplicant[1064063]: _wpa_dbus_dict_fill_value_from_variant: string value: IEEE8021X
    1652167185.193276 wpa_supplicant[1064063]: key_mgmt: 0x8
    1652167185.193749 wpa_supplicant[1064063]: dbus: fi.w1.wpa_supplicant1.Interface.SelectNetwork (/fi/w1/wpa_supplicant1/Interfaces/15) [o]
    1652167185.193763 wpa_supplicant[1064063]: test1: Setting scan request: 0.000000 sec
    1652167185.193825 wpa_supplicant[1064063]: EAPOL: External notification - EAP success=0
    1652167185.193829 wpa_supplicant[1064063]: EAPOL: External notification - EAP fail=0
    1652167185.193833 wpa_supplicant[1064063]: EAPOL: External notification - portControl=Auto
    1652167185.193838 wpa_supplicant[1064063]: test1: Already associated with a configured network - generating associated event
    1652167185.193843 wpa_supplicant[1064063]: test1: Event ASSOC (0) received
    1652167185.193851 wpa_supplicant[1064063]: test1: Association info event
    1652167185.193855 wpa_supplicant[1064063]: test1: State: DISCONNECTED -> ASSOCIATED
    1652167185.193863 wpa_supplicant[1064063]: test1: Associated to a new BSS: BSSID=01:80:c2:00:00:03
    1652167185.193867 wpa_supplicant[1064063]: Add randomness: count=24 entropy=2
    1652167185.193881 wpa_supplicant[1064063]: random pool - hexdump(len=128): 39 68 4a 8f c2 8b 46 7e 08 65 a3 77 d4 3d 1c 32 ed 9e c7 9f 47 c8 b7 fc 9e 2a 80 e0 35 05 89 f5 d7 4f d4 a9 b2 01 f0 c6 18 ab c9 d9 e6 94 0e 93 14 4c 82 b8 d9 c3 7a 18 2b ab 83 ec ad 11 ab c5 f2 90 93 07 04 64 ea c1 1f f6 5d c0 b7 db 93 53 25 1c 73 e2 16 cb e2 46 7c 7b 08 ad 5b e0 8c 5b 85 2f 69 a1 0c e6 a4 b4 a3 be 00 72 bb ab 04 90 70 03 a4 95 37 05 fb cf dc e3 8d d9 6e 18 01 df
    1652167185.193886 wpa_supplicant[1064063]: random_mix_pool - hexdump(len=16): 11 12 7a 62 00 00 00 00 4b f5 02 00 00 00 00 00
    1652167185.193890 wpa_supplicant[1064063]: random_mix_pool - hexdump(len=6): 01 80 c2 00 00 03
    1652167185.193902 wpa_supplicant[1064063]: random pool - hexdump(len=128): 39 68 4a 8f c2 8b 46 7e 08 65 a3 77 d4 3d 1c 32 ed 9e c7 9f 47 c8 b7 fc 9e 2a 80 e0 35 05 89 f5 20 25 74 2f 46 73 f4 cd e9 46 1c df ed 2a 48 96 63 b1 11 a7 65 18 0a 1d 48 b3 36 a3 ab 65 ac 53 ce 25 02 cb b5 40 41 ff 1b a8 41 5e ee a5 07 a8 c9 85 db da 5b bc e1 a2 f1 c2 a4 ba 5b 37 f5 89 7c 94 dd b8 59 17 8c 20 e7 2f 9f 5a 87 b8 08 12 83 d1 5b da 6f ed 11 b0 dc e3 8d d9 6e 18 01 df
    1652167185.193907 wpa_supplicant[1064063]: test1: Select network based on association information
    1652167185.193910 wpa_supplicant[1064063]: test1: Network configuration found for the current AP
    1652167185.193914 wpa_supplicant[1064063]: test1: WPA: clearing AP WPA IE
    1652167185.193917 wpa_supplicant[1064063]: test1: WPA: clearing AP RSN IE
    1652167185.193920 wpa_supplicant[1064063]: test1: WPA: clearing AP RSNXE
    1652167185.193924 wpa_supplicant[1064063]: test1: WPA: clearing own WPA/RSN IE
    1652167185.193927 wpa_supplicant[1064063]: test1: RSN: clearing own RSNXE
    1652167185.193931 wpa_supplicant[1064063]: test1: Failed to get scan results
    1652167185.193934 wpa_supplicant[1064063]: EAPOL: External notification - EAP success=0
    1652167185.193938 wpa_supplicant[1064063]: EAPOL: External notification - EAP fail=0
    1652167185.193941 wpa_supplicant[1064063]: EAPOL: External notification - portControl=Auto
    1652167185.193946 wpa_supplicant[1064063]: test1: Associated with 01:80:c2:00:00:03
    1652167185.193949 wpa_supplicant[1064063]: test1: WPA: Association event - clear replay counter
    1652167185.193952 wpa_supplicant[1064063]: test1: WPA: Clear old PTK
    1652167185.193955 wpa_supplicant[1064063]: EAPOL: External notification - portEnabled=0
    1652167185.193958 wpa_supplicant[1064063]: EAPOL: External notification - portValid=0
    1652167185.193961 wpa_supplicant[1064063]: EAPOL: External notification - portEnabled=1
    1652167185.193964 wpa_supplicant[1064063]: EAPOL: SUPP_PAE entering state CONNECTING
    1652167185.193967 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state IDLE
    1652167185.193970 wpa_supplicant[1064063]: EAP: EAP entering state INITIALIZE
    1652167185.193974 wpa_supplicant[1064063]: EAP: EAP entering state IDLE
    1652167185.193978 wpa_supplicant[1064063]: test1: Cancelling scan request
    1652167185.193982 wpa_supplicant[1064063]: test1: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
    1652167185.198986 wpa_supplicant[1064063]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/15
    1652167185.351339 wpa_supplicant[1064063]: l2_packet_receive: src=52:54:00:6a:25:3b len=9
    1652167185.351357 wpa_supplicant[1064063]: test1: RX EAPOL from 52:54:00:6a:25:3b
    1652167185.351363 wpa_supplicant[1064063]: RX EAPOL - hexdump(len=9): 02 00 00 05 01 9b 00 05 01
    1652167185.351368 wpa_supplicant[1064063]: EAPOL: Received EAP-Packet frame
    1652167185.351372 wpa_supplicant[1064063]: EAPOL: SUPP_PAE entering state RESTART
    1652167185.351378 wpa_supplicant[1064063]: EAP: EAP entering state INITIALIZE
    1652167185.351382 wpa_supplicant[1064063]: EAP: EAP entering state IDLE
    1652167185.351385 wpa_supplicant[1064063]: EAPOL: SUPP_PAE entering state AUTHENTICATING
    1652167185.351388 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state REQUEST
    1652167185.351391 wpa_supplicant[1064063]: EAPOL: getSuppRsp
    1652167185.351394 wpa_supplicant[1064063]: EAP: EAP entering state RECEIVED
    1652167185.351406 wpa_supplicant[1064063]: EAP: Received EAP-Request id=155 method=1 vendor=0 vendorMethod=0
    1652167185.351409 wpa_supplicant[1064063]: EAP: EAP entering state IDENTITY
    1652167185.351413 wpa_supplicant[1064063]: test1: CTRL-EVENT-EAP-STARTED EAP authentication started
    1652167185.351416 wpa_supplicant[1064063]: EAP: Status notification: started (param=)
    1652167185.351463 wpa_supplicant[1064063]: EAP: EAP-Request Identity data - hexdump(len=0):
    1652167185.351469 wpa_supplicant[1064063]: EAP: using real identity - hexdump(len=4): 73 70 61 6d
    1652167185.351483 wpa_supplicant[1064063]: EAP: EAP entering state SEND_RESPONSE
    1652167185.351486 wpa_supplicant[1064063]: EAP: EAP entering state IDLE
    1652167185.351489 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state RESPONSE
    1652167185.351492 wpa_supplicant[1064063]: EAPOL: txSuppRsp
    1652167185.351496 wpa_supplicant[1064063]: TX EAPOL: dst=01:80:c2:00:00:03
    1652167185.351501 wpa_supplicant[1064063]: TX EAPOL - hexdump(len=13): 01 00 00 09 02 9b 00 09 01 73 70 61 6d
    1652167185.351528 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state RECEIVE
    1652167187.190180 wpa_supplicant[1064063]: EAPOL: startWhen --> 0
    1652167188.352883 wpa_supplicant[1064063]: l2_packet_receive: src=52:54:00:6a:25:3b len=9
    1652167188.352912 wpa_supplicant[1064063]: test1: RX EAPOL from 52:54:00:6a:25:3b
    1652167188.352918 wpa_supplicant[1064063]: RX EAPOL - hexdump(len=9): 02 00 00 05 01 9b 00 05 01
    1652167188.352923 wpa_supplicant[1064063]: EAPOL: Received EAP-Packet frame
    1652167188.352926 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state REQUEST
    1652167188.352930 wpa_supplicant[1064063]: EAPOL: getSuppRsp
    1652167188.352934 wpa_supplicant[1064063]: EAP: EAP entering state RECEIVED
    1652167188.352947 wpa_supplicant[1064063]: EAP: Received EAP-Request id=155 method=1 vendor=0 vendorMethod=0
    1652167188.352950 wpa_supplicant[1064063]: EAP: EAP entering state RETRANSMIT
    1652167188.352954 wpa_supplicant[1064063]: EAP: EAP entering state SEND_RESPONSE
    1652167188.352957 wpa_supplicant[1064063]: EAP: EAP entering state IDLE
    1652167188.352960 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state RESPONSE
    1652167188.352962 wpa_supplicant[1064063]: EAPOL: txSuppRsp
    1652167188.352967 wpa_supplicant[1064063]: TX EAPOL: dst=01:80:c2:00:00:03
    1652167188.352972 wpa_supplicant[1064063]: TX EAPOL - hexdump(len=13): 01 00 00 09 02 9b 00 09 01 73 70 61 6d
    1652167188.353004 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state RECEIVE
    1652167194.355828 wpa_supplicant[1064063]: l2_packet_receive: src=52:54:00:6a:25:3b len=9
    1652167194.355845 wpa_supplicant[1064063]: test1: RX EAPOL from 52:54:00:6a:25:3b
    1652167194.355850 wpa_supplicant[1064063]: RX EAPOL - hexdump(len=9): 02 00 00 05 01 9b 00 05 01
    1652167194.355855 wpa_supplicant[1064063]: EAPOL: Received EAP-Packet frame
    1652167194.355859 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state REQUEST
    1652167194.355863 wpa_supplicant[1064063]: EAPOL: getSuppRsp
    1652167194.355867 wpa_supplicant[1064063]: EAP: EAP entering state RECEIVED
    1652167194.355879 wpa_supplicant[1064063]: EAP: Received EAP-Request id=155 method=1 vendor=0 vendorMethod=0
    1652167194.355882 wpa_supplicant[1064063]: EAP: EAP entering state RETRANSMIT
    1652167194.355886 wpa_supplicant[1064063]: EAP: EAP entering state SEND_RESPONSE
    1652167194.355889 wpa_supplicant[1064063]: EAP: EAP entering state IDLE
    1652167194.355892 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state RESPONSE
    1652167194.355895 wpa_supplicant[1064063]: EAPOL: txSuppRsp
    1652167194.355900 wpa_supplicant[1064063]: TX EAPOL: dst=01:80:c2:00:00:03
    1652167194.355905 wpa_supplicant[1064063]: TX EAPOL - hexdump(len=13): 01 00 00 09 02 9b 00 09 01 73 70 61 6d
    1652167194.355936 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state RECEIVE
    1652167206.362125 wpa_supplicant[1064063]: l2_packet_receive: src=52:54:00:6a:25:3b len=9
    1652167206.362153 wpa_supplicant[1064063]: test1: RX EAPOL from 52:54:00:6a:25:3b
    1652167206.362159 wpa_supplicant[1064063]: RX EAPOL - hexdump(len=9): 02 00 00 05 01 9b 00 05 01
    1652167206.362174 wpa_supplicant[1064063]: EAPOL: Received EAP-Packet frame
    1652167206.362178 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state REQUEST
    1652167206.362182 wpa_supplicant[1064063]: EAPOL: getSuppRsp
    1652167206.362186 wpa_supplicant[1064063]: EAP: EAP entering state RECEIVED
    1652167206.362198 wpa_supplicant[1064063]: EAP: Received EAP-Request id=155 method=1 vendor=0 vendorMethod=0
    1652167206.362201 wpa_supplicant[1064063]: EAP: EAP entering state RETRANSMIT
    1652167206.362205 wpa_supplicant[1064063]: EAP: EAP entering state SEND_RESPONSE
    1652167206.362208 wpa_supplicant[1064063]: EAP: EAP entering state IDLE
    1652167206.362211 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state RESPONSE
    1652167206.362214 wpa_supplicant[1064063]: EAPOL: txSuppRsp
    1652167206.362218 wpa_supplicant[1064063]: TX EAPOL: dst=01:80:c2:00:00:03
    1652167206.362222 wpa_supplicant[1064063]: TX EAPOL - hexdump(len=13): 01 00 00 09 02 9b 00 09 01 73 70 61 6d
    1652167206.362264 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state RECEIVE
    1652167210.896022 wpa_supplicant[1064063]: dbus: fi.w1.wpa_supplicant1.Interface.Disconnect (/fi/w1/wpa_supplicant1/Interfaces/15) []
    1652167210.896033 wpa_supplicant[1064063]: test1: Cancelling scan request
    1652167210.896042 wpa_supplicant[1064063]: test1: Request to deauthenticate - bssid=01:80:c2:00:00:03 pending_bssid=00:00:00:00:00:00 reason=3 (DEAUTH_LEAVING) state=ASSOCIATED
    1652167210.896046 wpa_supplicant[1064063]: test1: Event DEAUTH (11) received
    1652167210.896050 wpa_supplicant[1064063]: test1: Deauthentication notification
    1652167210.896055 wpa_supplicant[1064063]: test1:  * reason 3 (DEAUTH_LEAVING) locally_generated=1
    1652167210.896059 wpa_supplicant[1064063]: Deauthentication frame IE(s) - hexdump(len=0): [NULL]
    1652167210.896082 wpa_supplicant[1064063]: test1: CTRL-EVENT-DISCONNECTED bssid=01:80:c2:00:00:03 reason=3 locally_generated=1
    1652167210.896087 wpa_supplicant[1064063]: test1: Auto connect disabled: do not try to re-connect
    1652167210.896091 wpa_supplicant[1064063]: test1: Ignore connection failure indication since interface has been put into disconnected state
    1652167210.896096 wpa_supplicant[1064063]: test1: WPA: Clear old PMK and PTK
    1652167210.896149 wpa_supplicant[1064063]: test1: State: ASSOCIATED -> DISCONNECTED
    1652167210.896158 wpa_supplicant[1064063]: EAPOL: External notification - portEnabled=0
    1652167210.896162 wpa_supplicant[1064063]: EAPOL: SUPP_PAE entering state DISCONNECTED
    1652167210.896166 wpa_supplicant[1064063]: EAPOL: Supplicant port status: Unauthorized
    1652167210.896169 wpa_supplicant[1064063]: EAPOL: SUPP_BE entering state INITIALIZE
    1652167210.896173 wpa_supplicant[1064063]: EAP: EAP entering state DISABLED
    1652167210.896176 wpa_supplicant[1064063]: EAPOL: External notification - portValid=0
    1652167210.896181 wpa_supplicant[1064063]: test1: State: DISCONNECTED -> DISCONNECTED
    1652167210.896185 wpa_supplicant[1064063]: EAPOL: External notification - portEnabled=0
    1652167210.896188 wpa_supplicant[1064063]: EAPOL: External notification - portValid=0
    1652167210.896191 wpa_supplicant[1064063]: QM: Clear all active DSCP policies
    1652167210.896195 wpa_supplicant[1064063]: test1: CTRL-EVENT-DSCP-POLICY clear_all
    1652167210.896244 wpa_supplicant[1064063]: dbus: fi.w1.wpa_supplicant1.Interface.RemoveNetwork (/fi/w1/wpa_supplicant1/Interfaces/15) [o]
    1652167210.896252 wpa_supplicant[1064063]: dbus: Unregister network object '/fi/w1/wpa_supplicant1/Interfaces/15/Networks/0'
    1652167210.896279 wpa_supplicant[1064063]: dbus: fi.w1.wpa_supplicant1.RemoveInterface (/fi/w1/wpa_supplicant1) [o]
    1652167210.896284 wpa_supplicant[1064063]: test1: Removing interface test1
    1652167210.896292 wpa_supplicant[1064063]: test1: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 (DEAUTH_LEAVING) state=DISCONNECTED
    1652167210.896295 wpa_supplicant[1064063]: test1: State: DISCONNECTED -> DISCONNECTED
    1652167210.896299 wpa_supplicant[1064063]: EAPOL: External notification - portEnabled=0
    1652167210.896304 wpa_supplicant[1064063]: EAPOL: External notification - portValid=0
    1652167210.896307 wpa_supplicant[1064063]: QM: Clear all active DSCP policies
    1652167210.896310 wpa_supplicant[1064063]: test1: CTRL-EVENT-DSCP-POLICY clear_all
    1652167210.903159 wpa_supplicant[1064063]: test1: WPA: Clear old PMK and PTK
    1652167210.903166 wpa_supplicant[1064063]: test1: Cancelling scan request
    1652167210.903170 wpa_supplicant[1064063]: test1: Cancelling authentication timeout
    1652167210.903177 wpa_supplicant[1064063]: Off-channel: Clear pending Action frame TX (pending_action_tx=(nil)
    1652167210.903184 wpa_supplicant[1064063]: Off-channel: Action frame sequence done notification: pending_action_tx=(nil) drv_offchan_tx=0 action_tx_wait_time=0 off_channel_freq=0 roc_waiting_drv_freq=0
    1652167210.903189 wpa_supplicant[1064063]: QM: Clear all active DSCP policies
    1652167210.903192 wpa_supplicant[1064063]: test1: CTRL-EVENT-DSCP-POLICY clear_all
    1652167210.903195 wpa_supplicant[1064063]: Remove interface test1 from radio
    1652167210.903198 wpa_supplicant[1064063]: Remove radio
    1652167210.907168 wpa_supplicant[1064063]: dbus: Unregister interface object '/fi/w1/wpa_supplicant1/Interfaces/15'
    

    HOSTAPD
    802.1X access control
    RADIUS
    Status After Scenario
    Commands
    NM
    Status After Clean
    Memory use After Clean