espressif / ESP8266_RTOS_SDK

Latest ESP8266 SDK based on FreeRTOS, esp-idf style.
http://bbs.espressif.com
Apache License 2.0
3.31k stars 1.57k forks source link

WPA2 Enterprise example (GIT8266O-479) #906

Open Vbansal1996 opened 4 years ago

Vbansal1996 commented 4 years ago

Environment

Problem Description

I am trying to connect to WPA2 enterprise network but getting failed and device is getting reset.

Issue coming with passphrase error. This issue was not there with previous commits, but latest release/v3.3 I am facing this issue.

Debug Logs

D (929) system_event: SYSTEM_EVENT_STA_START
D (931) event: running task for loop 0x40108410
D (934) event: running post WIFI_EVENT:2 with handler 0x4028dfd0 on loop 0x40108410
0x4028dfd0: handle_sta_start at /home/keshav/esp/ESP8266_RTOS_SDK/components/tcpip_adapter/event_handlers.c:70

D (939) event: running post SYSTEM_EVENT:2 with handler 0x40267fa0 on loop 0x40108410
0x40267fa0: esp_event_post_to_user at /home/keshav/esp/ESP8266_RTOS_SDK/components/esp_event/event_loop_legacy.c:44

assertion "phlen >= 6 && phlen < 64" failed: file "wpa.c", line 2100, function: wpa_set_passphrase
abort() was called at PC 0x40235f2c on core 0
0x40235f2c: __assert_func at /home/dongheng/workspace/espressif/newlib_xtensa-2.2.0-bin/newlib_xtensa-2.2.0/xtensa-lx106-elf/newlib/libc/stdlib/../../../.././newlib/libc/stdlib/assert.c:63 (discriminator 8)

Guru Meditation Error: Core  0 panic'ed (StoreProhibited). Exception was unhandled.
Core 0 register dump:
PC      : 0x4023bb3e  PS      : 0x00000030  A0      : 0x4023bb3c  A1      : 0x3fff4230  
0x4023bb3e: abort at /home/keshav/esp/ESP8266_RTOS_SDK/components/newlib/newlib/port/syscall.c:168 (discriminator 1)

0x4023bb3c: abort at /home/keshav/esp/ESP8266_RTOS_SDK/components/newlib/newlib/port/syscall.c:168 (discriminator 1)

A2      : 0x00000000  A3      : 0x00000001  A4      : 0xffffffdb  A5      : 0x00000001  
A6      : 0x00000000  A7      : 0x402a8db5  A8      : 0x3fff4179  A9      : 0x000000a0  
A10     : 0x0000000f  A11     : 0x00000002  A12     : 0x402ab518  A13     : 0x402ab4fc  
A14     : 0x402ab4f4  A15     : 0x00000834  SAR     : 0x0000001e  EXCCAUSE: 0x0000001d  

Backtrace: 0x4023bb3e:0x3fff4230 0x40235f2f:0x3fff4240 0x40257171:0x3fff4270 0x40257310:0x3fff4280 0x40247fb1:0x3fff4330 0x40247ffc:0x3fff4370 0x4021ee70:0x3fff4380 0x4021ea79:0x3fff43d0 0x4021eaec:0x3fff43e0 0x4021f0c4:0x3fff43f0 0x4021f2fb:0x3fff4420 0x4021bdd3:0x3fff4490 0x4021c1f1:0x3fff44f0 0x4021e899:0x3fff4510 0x4021e8b4:0x3fff4520 0x40213609:0x3fff4530 0x4029ee32:0x3fff4540 
0x4023bb3e: abort at /home/keshav/esp/ESP8266_RTOS_SDK/components/newlib/newlib/port/syscall.c:168 (discriminator 1)

0x40235f2f: __assert_func at ??:?

0x40257171: wpa_set_passphrase at /home/keshav/esp/ESP8266_RTOS_SDK/components/wpa_supplicant/src/rsn_supp/wpa.c:2103

0x40257310: wpa_set_bss at /home/keshav/esp/ESP8266_RTOS_SDK/components/wpa_supplicant/src/rsn_supp/wpa.c:2079

0x40247fb1: wpa_config_bss at /home/keshav/esp/ESP8266_RTOS_SDK/components/wpa_supplicant/port/esp_supplicant/esp_wpa_main.c:129

0x40247ffc: wpa_sta_connect at /home/keshav/esp/ESP8266_RTOS_SDK/components/wpa_supplicant/port/esp_supplicant/esp_wpa_main.c:151

0x4021ee70: dhcp_bind_check at ??:?

0x4021ea79: chm_init at ??:?

0x4021eaec: chm_start_op at ??:?

0x4021f0c4: dhcp_bind_check at ??:?

0x4021f2fb: cnx_start_handoff_cb at ??:?

0x4021bdd3: scan_build_chan_list at ??:?

0x4021c1f1: scan_start at ??:?

0x4021e899: chm_end_op at ??:?

0x4021e8b4: chm_end_op at ??:?

0x40213609: ets_timer_proc at ??:?

0x4029ee32: ppTask at ??:?
nsfilho commented 4 years ago

Hi @Vbansal1996 , I don't know if you solved the problem, but appears you are using a small phrase to WPA2. Please try change the phrase, or show the code as throwing this error for us and we will try to help you :)

Best regards, NS.

Vbansal1996 commented 3 years ago

Hi

After cloning the latest changes still I am not able to connect with the WPA network. Device is throwing error

11:46:02.368 -> D (173468) system_event: SYSTEM_EVENT_STA_DISCONNECTED, ssid:tcwifi, ssid_len:6, bssid:98:da:c4:69:2b:ab, reason:23 (802.1x auth failed) 11:46:02.368 -> D (173472) event: running post WIFI_EVENT:5 with handler 0x4026c1bc on loop 0x40106da0 11:46:02.368 -> D (173480) tcpip_adapter: if0 start ip lost tmr: enter 11:46:02.368 -> D (173485) tcpip_adapter: if0 start ip lost tmr: no need start because netif=0x401071c8 interval=120 ip=0 11:46:02.403 -> D (173494) event: running post WIFI_EVENT:5 with handler 0x40224340 on loop 0x40106da0 11:46:02.947 -> I (174049) example: ~~~ 11:46:02.947 -> I (174050) example: IP:0.0.0.0 11:46:02.947 -> I (174051) example: MASK:0.0.0.0 11:46:02.947 -> I (174052) example: GW:0.0.0.0 11:46:02.947 -> I (174054) example: ~~~ 11:46:02.947 -> I (174058) example: free heap:71652 11:46:02.947 ->  11:46:04.442 -> D (175559) system_event: SYSTEM_EVENT_STA_DISCONNECTED, ssid:tcwifi, ssid_len:6, bssid:00:00:00:00:00:00, reason:205 (other reason) 11:46:04.477 -> D (175563) event: running post WIFI_EVENT:5 with handler 0x4026c1bc on loop 0x40106da0 11:46:04.477 -> D (175570) tcpip_adapter: if0 start ip lost tmr: enter 11:46:04.477 -> D (175575) tcpip_adapter: if0 start ip lost tmr: no need start because netif=0x401071c8 interval=120 ip=0 11:46:04.477 -> D (175584) event: running post WIFI_EVENT:5 with handler 0x40224340 on loop 0x40106da0 11:46:04.957 -> I (176064) example: ~~~ 11:46:04.957 -> I (176065) example: IP:0.0.0.0 11:46:04.957 -> I (176066) example: MASK:0.0.0.0 11:46:04.957 -> I (176067) example: GW:0.0.0.0 11:46:04.957 -> I (176069) example: ~~~ 11:46:04.957 -> I (176073) example: free heap:71672 11:46:04.957 ->  11:46:05.092 -> I (176199) wifi:state: 0 -> 2 (b0) 11:46:05.092 -> I (176203) wifi:state: 2 -> 3 (0) 11:46:05.092 -> I (176212) wifi:state: 3 -> 5 (10) 11:46:05.092 -> I (176297) wifi:state: 5 -> 0 (17a0) 11:46:05.194 -> D (176297) system_event: SYSTEM_EVENT_STA_DISCONNECTED, ssid:tcwifi, ssid_len:6, bssid:98:da:c4:69:2b:ab, reason:23 (802.1x auth failed) 11:46:05.194 -> D (176302) event: running post WIFI_EVENT:5 with handler 0x4026c1bc on loop 0x40106da0 11:46:05.194 -> D (176309) tcpip_adapter: if0 start ip lost tmr: enter 11:46:05.194 -> D (176314) tcpip_adapter: if0 start ip lost tmr: no need start because netif=0x401071c8 interval=120 ip=0 11:46:05.228 -> D (176324) event: running post WIFI_EVENT:5 with handler 0x40224340 on loop 0x40106da0 11:46:06.967 -> I (178075) example: ~~~ 11:46:06.967 -> I (178076) example: IP:0.0.0.0 11:46:06.967 -> I (178077) example: MASK:0.0.0.0 11:46:06.967 -> I (178078) example: GW:0.0.0.0 11:46:06.967 -> I (178080) example: ~~~ 11:46:06.967 -> I (178084) example: free heap:71652

But using same credentials I am able to connect with network using PC and Mobile Phones.

Can you suggest what are the possible reasons. I am using wpa2_enterprise examples for testing.

Additionally with latest changes in release/v3.3 - using same example I am getting watchdog reset when device is trying to get the IP.

Vbansal1996 commented 3 years ago

Adding additional logs

1:59:24.501 -> D (553) nvs: nvs_get sta.phybw 1 11:59:24.501 -> D (556) nvs: nvs_get_str_or_blob sta.apsw 11:59:24.501 -> D (560) nvs: nvs_get_str_or_blob sta.apinfo 11:59:24.501 -> D (564) nvs: nvs_get sta.scan_method 1 11:59:24.501 -> D (567) nvs: nvs_get sta.sort_method 1 11:59:24.501 -> D (571) nvs: nvs_get sta.minrssi 1 11:59:24.501 -> D (574) nvs: nvs_get sta.minauth 1 11:59:24.501 -> D (577) nvs: nvs_get_str_or_blob ap.ssid 11:59:24.526 -> D (581) nvs: nvs_get_str_or_blob ap.mac 11:59:24.526 -> D (584) nvs: nvs_get_str_or_blob ap.passwd 11:59:24.526 -> D (588) nvs: nvs_get_str_or_blob ap.pmk 11:59:24.526 -> D (592) nvs: nvs_get ap.chan 1 11:59:24.526 -> D (594) nvs: nvs_get ap.authmode 1 11:59:24.526 -> D (597) nvs: nvs_get ap.hidden 1 11:59:24.526 -> D (600) nvs: nvs_get ap.max.conn 1 11:59:24.526 -> D (603) nvs: nvs_get bcn.interval 2 11:59:24.526 -> D (607) nvs: nvs_get ap.phym 1 11:59:24.561 -> D (609) nvs: nvs_get ap.phybw 1 11:59:24.561 -> D (612) nvs: nvs_get ap.sndchan 1 11:59:24.561 -> D (615) nvs: nvs_get lorate 1 11:59:24.561 -> D (618) nvs: nvs_get sta.pmf_e 1 11:59:24.561 -> D (621) nvs: nvs_get sta.pmf_r 1 11:59:24.561 -> D (624) nvs: nvs_get ap.pmf_e 1 11:59:24.561 -> D (627) nvs: nvs_get ap.pmf_r 1 11:59:24.561 -> D (630) nvs: nvs_get_str_or_blob country 11:59:24.561 -> D (633) nvs: nvs_get sta.rm_e 1 11:59:24.561 -> D (636) nvs: nvs_get sta.btm_e 1 11:59:24.561 -> I (640) example: Setting WiFi configuration SSID tcwifi... 11:59:24.596 -> I (646) wpa: WPA2 ENTERPRISE VERSION: [v2.0] enable 11:59:24.596 ->  11:59:24.596 -> D (651) wpa: WPA2 ENTERPRISE CRYPTO INIT.

11:59:24.596 -> 11:59:24.596 -> 15, 15, 11

11:59:24.596 -> D (656) system_event: SYSTEM_EVENT_STA_START 11:59:24.596 -> D (660) event: running post WIFI_EVENT:2 with handler 0x4026fa94 on loop 0x40106ddc 11:59:24.596 -> D (667) event: running post WIFI_EVENT:2 with handler 0x40225084 on loop 0x40106ddc 11:59:25.211 -> D (1284) wpa: RSN: PMKSA cache search - network_ctx=0 try_opportunistic=0 11:59:25.211 -> D (1287) wpa: RSN: Search for BSSID 98:da:c4:69:2b:ab 11:59:25.211 -> D (1289) wpa: RSN: No PMKSA cache entry found 11:59:26.158 -> I (2247) wifi:state: 0 -> 2 (b0) 11:59:26.158 -> I (2253) wifi:state: 2 -> 3 (0) 11:59:26.192 -> I (2259) wifi:state: 3 -> 5 (10) 11:59:26.192 -> I (2260) wpa: wpa2_task prio:2, stack:6656 11:59:26.192 ->  11:59:26.192 -> D (2263) wpa: WPA2: wifi->wpa2 api completed sig(0) 11:59:26.192 -> D (2264) wpa: WPA2: wpa2 api return, sm->state(1) 11:59:26.192 -> D (2267) wpa: IEEE 802.1X RX: version=2 type=0 length=5 11:59:26.192 -> 11:59:26.192 -> V (2271) wpa: WPA2: RX EAPOL-EAP PACKET - hexdump(len=9): 11:59:26.227 -> V (2276) wpa: 02 00 00 05 01 dd 00 05 01 11:59:26.227 -> D (2280) wpa: WPA2: wifi->wpa2 api completed sig(1) 11:59:26.227 -> D (2284) wpa: WPA2: wpa2 api return, sm->state(1) 11:59:26.227 -> D (2299) wpa: IEEE 802.1X RX: version=2 type=0 length=5 11:59:26.227 -> 11:59:26.227 -> V (2301) wpa: WPA2: RX EAPOL-EAP PACKET - hexdump(len=9): 11:59:26.227 -> V (2304) wpa: 02 00 00 05 01 49 00 05 01 11:59:26.227 -> D (2306) wpa: WPA2: wifi->wpa2 api completed sig(1) 11:59:26.261 -> D (2309) wpa: WPA2: wpa2 api return, sm->state(1) 11:59:26.261 -> D (2327) wpa: IEEE 802.1X RX: version=2 type=0 length=6 11:59:26.261 -> 11:59:26.261 -> V (2329) wpa: WPA2: RX EAPOL-EAP PACKET - hexdump(len=10): 11:59:26.261 -> V (2331) wpa: 02 00 00 06 01 4a 00 06 19 20 11:59:26.261 -> D (2333) wpa: TLS: Phase2 EAP types - hexdump(len=8): 11:59:26.261 -> D (2337) wpa: 00 00 00 00 1a 00 00 00 11:59:26.261 -> D (2340) wpa: TLS: using phase1 config options 11:59:26.295 -> D (2349) wpa: SSL: Received packet(len=6) - Flags 0x20 11:59:26.295 -> D (2351) wpa: EAP-PEAP: Start (server ver=0, own ver=1) 11:59:26.295 -> D (2354) wpa: EAP-PEAP: Using PEAP version 0 11:59:26.295 -> D (2361) wpa: SSL: 220 bytes left to be sent out (of total 220 bytes) 11:59:26.295 -> D (2365) wpa: WPA2: wifi->wpa2 api completed sig(1) 11:59:26.295 -> D (2369) wpa: WPA2: wpa2 api return, sm->state(1) 11:59:26.328 -> D (2395) wpa: IEEE 802.1X RX: version=2 type=0 length=1396 11:59:26.328 -> 11:59:26.328 -> V (2397) wpa: WPA2: RX EAPOL-EAP PACKET - hexdump(len=1400): 11:59:26.328 -> V (2400) wpa: 02 00 05 74 01 4b 05 74 19 c0 00 00 07 f9 16 03 11:59:26.328 -> V (2403) wpa: 03 07 f4 02 00 00 51 03 03 5f 68 44 dc d6 04 60 11:59:26.328 -> V (2409) wpa: 79 04 7e a6 d6 49 3f 7f bb a7 39 4b 44 56 b7 f6 11:59:26.361 -> V (2414) wpa: 1e 83 41 c7 72 d3 03 18 1a 20 67 4a 00 00 1e 9e 11:59:26.361 -> V (2420) wpa: 69 54 14 5c 6a 92 d1 42 3f 4e 57 5c e8 39 7d 42 11:59:26.361 -> V (2425) wpa: 3d 20 f3 6f f7 84 4f 17 c0 c7 c0 30 00 00 09 00 11:59:26.361 -> V (2431) wpa: 17 00 00 ff 01 00 01 00 0b 00 06 0e 00 06 0b 00 11:59:26.361 -> V (2436) wpa: 06 08 30 82 06 04 30 82 04 ec a0 03 02 01 02 02 11:59:26.361 -> V (2442) wpa: 13 1b 00 00 00 03 8a c6 1c 5a a8 b4 20 99 00 00 11:59:26.395 -> V (2448) wpa: 00 00 00 03 30 0d 06 09 2a 86 48 86 f7 0d 01 01 11:59:26.395 -> V (2453) wpa: 05 05 00 30 4a 31 15 30 13 06 0a 09 92 26 89 93 11:59:26.395 -> V (2459) wpa: f2 2c 64 01 19 16 05 4c 6f 63 61 6c 31 14 30 12 11:59:26.395 -> V (2464) wpa: 06 0a 09 92 26 89 93 f2 2c 64 01 19 16 04 54 65 11:59:26.395 -> V (2470) wpa: 73 74 31 1b 30 19 06 03 55 04 03 13 12 57 49 4e 11:59:26.395 -> V (2475) wpa: 2d 4b 48 45 48 4b 4e 4d 35 52 45 33 2d 43 41 30 11:59:26.429 -> V (2481) wpa: 1e 17 0d 31 39 31 32 31 32 31 34 31 34 30 39 5a 11:59:26.429 -> V (2486) wpa: 17 0d 32 30 31 32 31 31 31 34 31 34 30 39 5a 30 11:59:26.429 -> V (2492) wpa: 25 31 23 30 21 06 03 55 04 03 13 1a 57 49 4e 2d 11:59:26.429 -> V (2498) wpa: 4b 48 45 48 4b 4e 4d 35 52 45 33 2e 54 65 73 74 11:59:26.429 -> V (2503) wpa: 2e 4c 6f 63 61 6c 30 82 01 22 30 0d 06 09 2a 86 11:59:26.429 -> V (2509) wpa: 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 11:59:26.464 -> V (2514) wpa: 01 0a 02 82 01 01 00 ca b7 c9 3b 90 7d 8d d6 97 11:59:26.464 -> V (2520) wpa: f3 bd 05 c0 1b cf b8 ff 9c 76 62 74 9c af d9 4a 11:59:26.464 -> V (2525) wpa: e1 17 80 05 5f b4 6d a7 df 4b d2 8e 11 7e 96 20 11:59:26.464 -> V (2531) wpa: d0 e6 63 dc 58 8a b9 68 ab f2 8e 7e 4b 2e c8 f5 11:59:26.464 -> V (2536) wpa: a6 bc c7 36 e0 a0 21 c4 b9 65 a3 a1 41 9e 4a 30 11:59:26.464 -> V (2542) wpa: 32 89 aa 27 df d8 a8 65 b0 5e 22 9c 53 05 0f f5 11:59:26.497 -> V (2547) wpa: 34 e0 79 bd b3 b7 45 35 bf 9e de 8c 90 31 2f 70 11:59:26.497 -> V (2553) wpa: 44 3c bc 21 48 36 a7 80 62 13 bd d9 24 ef 54 6e 11:59:26.497 -> V (2559) wpa: bb a3 fd 7c 0f 24 99 9d 07 3e e4 ce 7e d9 bb cc 11:59:26.497 -> V (2564) wpa: 31 6f 94 95 46 37 54 14 b7 1a e1 2b 1e 33 aa 3e 11:59:26.497 -> V (2570) wpa: a4 b7 7b 13 c3 0d 81 c3 5c 35 0d a5 27 70 55 be 11:59:26.497 -> V (2575) wpa: e3 7a 43 90 16 11 31 8f 94 3b 24 b5 42 bc f7 a6 11:59:26.530 -> V (2581) wpa: 86 68 08 7d 21 56 71 24 2e 73 16 84 c6 43 04 d3 11:59:26.530 -> V (2586) wpa: ec 96 0f 2c fe b1 77 ce 14 40 7b c2 b5 66 d1 ed 11:59:26.530 -> V (2592) wpa: af ca f1 5f 21 80 9f e5 e8 f6 e0 34 0e b6 5c 26 11:59:26.530 -> V (2597) wpa: bf c7 14 61 90 73 e0 e5 89 bb cc 13 7a 88 28 63 11:59:26.530 -> V (2603) wpa: a6 ba 05 db 51 ba 0d 02 03 01 00 01 a3 82 03 06 11:59:26.530 -> V (2609) wpa: 30 82 03 02 30 2f 06 09 2b 06 01 04 01 82 37 14 11:59:26.563 -> V (2614) wpa: 02 04 22 1e 20 00 44 00 6f 00 6d 00 61 00 69 00 11:59:26.563 -> V (2620) wpa: 6e 00 43 00 6f 00 6e 00 74 00 72 00 6f 00 6c 00 11:59:26.563 -> V (2625) wpa: 6c 00 65 00 72 30 1d 06 03 55 1d 25 04 16 30 14 11:59:26.563 -> V (2631) wpa: 06 08 2b 06 01 05 05 07 03 02 06 08 2b 06 01 05 11:59:26.563 -> V (2636) wpa: 05 07 03 01 30 0e 06 03 55 1d 0f 01 01 ff 04 04 11:59:26.563 -> V (2642) wpa: 03 02 05 a0 30 78 06 09 2a 86 48 86 f7 0d 01 09 11:59:26.597 -> V (2647) wpa: 0f 04 6b 30 69 30 0e 06 08 2a 86 48 86 f7 0d 03 11:59:26.597 -> V (2653) wpa: 02 02 02 00 80 30 0e 06 08 2a 86 48 86 f7 0d 03 11:59:26.597 -> V (2658) wpa: 04 02 02 00 80 30 0b 06 09 60 86 48 01 65 03 04 11:59:26.597 -> V (2664) wpa: 01 2a 30 0b 06 09 60 86 48 01 65 03 04 01 2d 30 11:59:26.597 -> V (2670) wpa: 0b 06 09 60 86 48 01 65 03 04 01 02 30 0b 06 09 11:59:26.597 -> V (2675) wpa: 60 86 48 01 65 03 04 01 05 30 07 06 05 2b 0e 03 11:59:26.632 -> V (2681) wpa: 02 07 30 0a 06 08 2a 86 48 86 f7 0d 03 07 30 1d 11:59:26.632 -> V (2686) wpa: 06 03 55 1d 0e 04 16 04 14 99 d8 0d 55 da b0 d9 11:59:26.632 -> V (2692) wpa: 25 23 ec 06 b3 46 77 3c 28 53 1f 39 62 30 1f 06 11:59:26.632 -> V (2697) wpa: 03 55 1d 23 04 18 30 16 80 14 b0 4d e9 65 43 6b 11:59:26.632 -> V (2703) wpa: 90 60 4c b9 8f fd 6c 1e 52 a4 e4 a8 1f 78 30 81 11:59:26.632 -> V (2708) wpa: d7 06 03 55 1d 1f 04 81 cf 30 81 cc 30 81 c9 a0 11:59:26.632 -> V (2714) wpa: 81 c6 a0 81 c3 86 81 c0 6c 64 61 70 3a 2f 2f 2f 11:59:26.667 -> V (2720) wpa: 43 4e 3d 57 49 4e 2d 4b 48 45 48 4b 4e 4d 35 52 11:59:26.667 -> V (2725) wpa: 45 33 2d 43 41 2c 43 4e 3d 57 49 4e 2d 4b 48 45 11:59:26.667 -> V (2731) wpa: 48 4b 4e 4d 35 52 45 33 2c 43 4e 3d 43 44 50 2c 11:59:26.667 -> V (2736) wpa: 43 4e 3d 50 75 62 6c 69 63 25 32 30 4b 65 79 25 11:59:26.667 -> V (2742) wpa: 32 30 53 65 72 76 69 63 65 73 2c 43 4e 3d 53 65 11:59:26.667 -> V (2747) wpa: 72 76 69 63 65 73 2c 43 4e 3d 43 6f 6e 66 69 67 11:59:26.701 -> V (2753) wpa: 75 72 61 74 69 6f 6e 2c 44 43 3d 54 65 73 74 2c 11:59:26.701 -> V (2758) wpa: 44 43 3d 4c 6f 63 61 6c 3f 63 65 72 74 69 66 69 11:59:26.701 -> V (2764) wpa: 63 61 74 65 52 65 76 6f 63 61 74 69 6f 6e 4c 69 11:59:26.701 -> V (2770) wpa: 73 74 3f 62 61 73 65 3f 6f 62 6a 65 63 74 43 6c 11:59:26.701 -> V (2775) wpa: 61 73 73 3d 63 52 4c 44 69 73 74 72 69 62 75 74 11:59:26.701 -> V (2781) wpa: 69 6f 6e 50 6f 69 6e 74 30 81 c3 06 08 2b 06 01 11:59:26.735 -> V (2786) wpa: 05 05 07 01 01 04 81 b6 30 81 b3 30 81 b0 06 08 11:59:26.735 -> V (2792) wpa: 2b 06 01 05 05 07 30 02 86 81 a3 6c 64 61 70 3a 11:59:26.735 -> V (2797) wpa: 2f 2f 2f 43 4e 3d 57 49 4e 2d 4b 48 45 48 4b 4e 11:59:26.735 -> V (2803) wpa: 4d 35 52 45 33 2d 43 41 2c 43 4e 3d 41 49 41 2c 11:59:26.735 -> V (2808) wpa: 43 4e 3d 50 75 62 6c 69 63 25 32 30 4b 65 79 25 11:59:26.735 -> V (2814) wpa: 32 30 53 65 72 76 69 63 65 73 2c 43 4e 3d 53 65 11:59:26.768 -> V (2819) wpa: 72 76 69 63 65 73 2c 43 4e 3d 43 6f 6e 66 69 67 11:59:26.768 -> V (2825) wpa: 75 72 61 74 69 6f 6e 2c 44 43 3d 54 65 73 74 2c 11:59:26.768 -> V (2831) wpa: 44 43 3d 4c 6f 63 61 6c 3f 63 41 43 65 72 74 69 11:59:26.768 -> V (2836) wpa: 66 69 63 61 74 65 3f 62 61 73 65 3f 6f 62 6a 65 11:59:26.768 -> V (2842) wpa: 63 74 43 6c 61 73 73 3d 63 65 72 74 69 66 69 63 11:59:26.768 -> V (2847) wpa: 61 74 69 6f 6e 41 75 74 68 6f 72 69 74 79 30 46 11:59:26.802 -> V (2853) wpa: 06 03 55 1d 11 04 3f 30 3d a0 1f 06 09 2b 06 01 11:59:26.802 -> V (2858) wpa: 04 01 82 37 19 01 a0 12 04 10 a3 b7 98 a0 79 3b 11:59:26.802 -> V (2864) wpa: 6d 41 90 d7 9a 46 b8 cb 7a 81 82 1a 57 49 4e 2d 11:59:26.802 -> V (2869) wpa: 4b 48 45 48 4b 4e 4d 35 52 45 33 2e 54 65 73 74 11:59:26.802 -> V (2875) wpa: 2e 4c 6f 63 61 6c 30 0d 06 09 2a 86 48 86 f7 0d 11:59:26.802 -> V (2880) wpa: 01 01 05 05 00 03 82 01 11:59:26.802 -> D (2883) wpa: SSL: Received packet(len=1396) - Flags 0xc0 11:59:26.835 -> D (2888) wpa: SSL: TLS Message Length: 2041 11:59:26.835 -> I (2893) wpa: SSL: Need 655 bytes more input data 11:59:26.835 -> D (2898) wpa: SSL: Building ACK (type=25 id=75 ver=0) 11:59:26.835 -> 11:59:26.835 -> D (2903) wpa: WPA2: wifi->wpa2 api completed sig(1) 11:59:26.835 -> D (2907) wpa: WPA2: wpa2 api return, sm->state(1) 11:59:26.869 -> D (2926) wpa: IEEE 802.1X RX: version=2 type=0 length=661 11:59:26.869 -> 11:59:26.869 -> V (2928) wpa: WPA2: RX EAPOL-EAP PACKET - hexdump(len=665): 11:59:26.869 -> V (2931) wpa: 02 00 02 95 01 4c 02 95 19 00 01 00 50 d8 77 0e 11:59:26.869 -> V (2934) wpa: 0a fb 8f 32 4e 86 fd 52 df fc a0 1d a1 e8 60 e5 11:59:26.869 -> V (2939) wpa: 46 d4 59 3e 29 74 4d 35 b7 c2 68 54 2b 7d 77 4d 11:59:26.869 -> V (2945) wpa: bb 12 fa 67 12 d1 c2 69 74 47 7a de 40 d1 df 07 11:59:26.869 -> V (2950) wpa: 95 2d bc d1 e0 6e 68 d9 0c 8a 55 2f 6d 5b b5 57 11:59:26.903 -> V (2956) wpa: 71 89 91 bb 31 75 71 18 c1 58 cc 4a b6 b4 8b 61 11:59:26.903 -> V (2962) wpa: 54 af fe 9e e5 20 e6 23 b3 62 97 0e c3 20 62 3b 11:59:26.903 -> V (2967) wpa: 31 88 a4 89 97 b3 1e 4c d2 34 c3 30 2c b0 4e 1c 11:59:26.903 -> V (2973) wpa: a5 2a 1b 95 aa 69 4b 7b 08 38 54 c0 b4 68 bd 9a 11:59:26.903 -> V (2978) wpa: 07 1f f2 72 0c 07 8e 0e b8 57 00 3c 36 dd 3d f5 11:59:26.903 -> V (2984) wpa: d0 b2 73 67 eb af a0 55 42 c6 e2 66 0a 21 29 03 11:59:26.937 -> V (2989) wpa: fb 20 09 59 86 8e 42 f2 08 c8 96 96 c5 04 9c fe 11:59:26.937 -> V (2995) wpa: f9 59 3f cf ec a4 a5 78 5c 80 0d c7 ce 9a 15 d9 11:59:26.937 -> V (3000) wpa: da 8c a3 38 71 36 de 08 89 a9 53 02 4b a7 c1 61 11:59:26.937 -> V (3006) wpa: 2d 82 95 ea 74 bc d6 bd 7d e7 5d b0 04 ef cd 86 11:59:26.937 -> V (3012) wpa: d3 50 43 a5 97 0f e3 87 75 9e 37 d3 2e 63 bc cf 11:59:26.937 -> V (3017) wpa: bf 1d 63 17 59 7d fd 63 2a fb 45 fa 0c 00 01 69 11:59:26.971 -> V (3023) wpa: 03 00 18 61 04 03 e4 eb bd df 9e 38 cf 11 64 22 11:59:26.971 -> V (3028) wpa: 43 66 40 4c ff 19 dd 18 78 5e 8a 71 6a ff 02 7f 11:59:26.971 -> V (3034) wpa: 15 24 fe e3 65 d7 d8 1a 16 d3 36 f3 6d 78 1d 5f 11:59:26.971 -> V (3039) wpa: 2a b9 ae 36 66 2e f7 66 48 3e f0 58 30 df 9a 18 11:59:26.971 -> V (3045) wpa: c3 a1 46 f2 ef 59 03 ce c2 b9 ad 5a 07 5f 47 18 11:59:26.971 -> V (3050) wpa: 1d 66 92 71 1f c1 f4 e0 fe f9 68 f4 aa 2a 75 9c 11:59:27.004 -> V (3056) wpa: 87 95 f6 f6 d9 04 01 01 00 c2 97 1b 95 60 ea 6b 11:59:27.004 -> V (3061) wpa: 33 41 fd ab 4c b6 57 8a 84 19 fc 4a 8d c6 79 71 11:59:27.004 -> V (3067) wpa: 9c 7c bb 49 23 41 d2 71 a9 89 86 2a ec e6 e4 4b 11:59:27.004 -> V (3073) wpa: 4e 2c 62 c2 f0 22 93 0c 06 9c e4 99 cc 09 5a 8d 11:59:27.004 -> V (3078) wpa: 61 0b a3 b8 23 02 48 f4 6a f3 05 47 f2 6b 45 62 11:59:27.004 -> V (3084) wpa: 35 a7 23 d8 ba e1 eb 6f 60 fc 50 18 ae 48 4d 16 11:59:27.039 -> V (3089) wpa: 9b 8e 3f ba b0 7d bf 66 77 14 22 01 6c 98 0d 42 11:59:27.039 -> V (3095) wpa: 05 8c a8 21 71 95 e2 4b c6 65 ee 08 8a de f9 3c 11:59:27.039 -> V (3100) wpa: 19 57 7e 55 cd 1b f1 87 2e 4a 98 22 d5 85 b1 09 11:59:27.039 -> V (3106) wpa: 92 af ad 90 75 67 9e 98 2d ce 4c 2b 0b 30 6b 34 11:59:27.039 -> V (3111) wpa: 76 53 c7 35 5e b5 3e 0c ed 07 3d 34 b7 9c e0 8d 11:59:27.039 -> V (3117) wpa: 71 15 07 5f 44 66 56 7f bf fd 0e e2 f0 54 d2 b3 11:59:27.073 -> V (3123) wpa: 32 7d d6 e3 47 a2 ea 84 0a f0 3b d3 5b 31 ba 3a 11:59:27.073 -> V (3128) wpa: ac 4b d4 c3 16 07 33 d9 73 c1 60 76 1e 94 14 44 11:59:27.073 -> V (3134) wpa: 38 3a 97 93 ff 05 24 e9 62 d1 bf 1f 89 d6 8f e5 11:59:27.073 -> V (3139) wpa: c3 17 7c e5 7c ef a6 ba ac 80 f8 88 c3 c9 9b 7f 11:59:27.073 -> V (3145) wpa: ce 7d 58 20 9e 64 18 e2 a9 0d 00 00 18 03 01 02 11:59:27.073 -> V (3150) wpa: 40 00 10 04 01 05 01 02 01 04 03 05 03 02 03 06 11:59:27.107 -> V (3155) wpa: 01 06 03 00 00 0e 00 00 00 11:59:27.107 -> D (3159) wpa: SSL: Received packet(len=661) - Flags 0x00 11:59:27.107 -> I (3166) wpa: application data is null, adding one byte for ack 11:59:27.107 -> D (3170) wpa: SSL: No data to be sent out 11:59:27.107 -> D (3174) wpa: SSL: Building ACK (type=25 id=76 ver=0) 11:59:27.107 -> 11:59:27.107 -> D (3180) wpa: WPA2: wifi->wpa2 api completed sig(1) 11:59:27.107 -> D (3184) wpa: WPA2: wpa2 api return, sm->state(1) 11:59:27.142 -> D (3195) wpa: IEEE 802.1X RX: version=2 type=0 length=4 11:59:27.142 -> 11:59:27.142 -> V (3197) wpa: WPA2: RX EAPOL-EAP PACKET - hexdump(len=8): 11:59:27.142 -> V (3199) wpa: 02 00 00 04 04 4c 00 04 11:59:27.142 -> I (3202) wpa: >>>>>wpa2 FAILED 11:59:27.142 ->  11:59:27.142 -> D (3206) wpa: WPA2: wifi->wpa2 api completed sig(1) 11:59:27.142 -> D (3210) wpa: WPA2: wpa2 api return, sm->state(3) 11:59:27.142 -> D (3216) wpa: WPA2: queue deleted 11:59:27.142 -> D (3218) wpa: WPA2: task deleted 11:59:27.142 -> D (3221) wpa: WPA2: wifi->wpa2 api completed sig(2) 11:59:27.176 -> D (3225) wpa: WPA2: wpa2 api return, sm->state(3) 11:59:27.176 -> D (3230) wpa: wpa2 eap_peer_sm_deinit: free data lock 11:59:27.176 -> I (3235) wifi:state: 5 -> 0 (17a0) 11:59:27.176 -> D (3239) system_event: SYSTEM_EVENT_STA_DISCONNECTED, ssid:tcwifi, ssid_len:6, bssid:98:da:c4:69:2b:ab, reason:23 (802.1x auth failed) 11:59:27.176 -> D (3251) event: running post WIFI_EVENT:5 with handler 0x402727c8 on loop 0x40106ddc 11:59:27.211 -> D (3258) event: running post WIFI_EVENT:5 with handler 0x4026fadc on loop 0x40106ddc 11:59:27.211 -> D (3265) tcpip_adapter: if0 start ip lost tmr: enter 11:59:27.211 -> D (3270) tcpip_adapter: if0 start ip lost tmr: no need start because netif=0x40107254 interval=120 ip=0 11:59:27.211 -> D (3279) event: running post WIFI_EVENT:5 with handler 0x40225084 on loop 0x40106ddc 11:59:28.588 -> I (4673) example: ~~~ 11:59:28.588 -> I (4674) example: IP:0.0.0.0 11:59:28.622 -> I (4676) example: MASK:0.0.0.0 11:59:28.622 -> I (4677) example: GW:0.0.0.0 11:59:28.622 -> I (4679) example: ~~~ 11:59:28.622 -> I (4681) example: free heap:64072 11:59:28.622 -> 

Vbansal1996 commented 3 years ago

FYI, it working fine till this commit: 655f9340