espressif / esp-idf

Espressif IoT Development Framework. Official development framework for Espressif SoCs.
Apache License 2.0
12.89k stars 7.08k forks source link

esp32s3 join AP failure if the AP channel is 1 (IDFGH-13063) #14008

Open AxelLin opened 2 weeks ago

AxelLin commented 2 weeks ago

Answers checklist.

IDF version.

v5.2.2-163-gf81b598d10

Espressif SoC revision.

esp32s3

Operating System used.

Linux

How did you build your project?

Command line with idf.py

If you are using Windows, please specify command line type.

None

Development Kit.

ESP32S3-WROOM-1

Power Supply used.

USB

What is the expected behavior?

Join AP should work.

What is the actual behavior?

Test with tp-link AX1800 AP, security: WPS2-PSK[AES].

When the AP 2.4G setting is "20/40MHz" with channel "auto", it was working fine. However, after I switch channel "auto" to channel 1, the esp32s3 behavior abnormal. ps. I also test esp32 and esp32 does not has such issue.

Below show the log to join AP , it keep retry if got disconnect, but always failure.

Steps to reproduce.

Just make device join the AP.

Debug Logs.

I (1985) pp: pp rom version: e7ae62f
I (1987) net80211: net80211 rom version: e7ae62f
I (1993) wifi:wifi driver task: 3fcbc0bc, prio:23, stack:6656, core=0
I (2002) wifi:wifi firmware version: 803d274
I (2002) wifi:wifi certification version: v7.0
I (2006) wifi:config NVS flash: enabled
I (2010) wifi:config nano formating: disabled
I (2014) wifi:Init data frame dynamic rx buffer num: 32
I (2019) wifi:Init static rx mgmt buffer num: 5
I (2023) wifi:Init management short buffer num: 32
I (2028) wifi:Init static tx buffer num: 16
I (2032) wifi:Init tx cache buffer num: 32
I (2035) wifi:Init static tx FG buffer num: 2
I (2039) wifi:Init static rx buffer size: 1600
I (2044) wifi:Init static rx buffer num: 16
I (2047) wifi:Init dynamic rx buffer num: 32
I (2052) wifi_init: rx ba win: 16
I (2055) wifi_init: tcpip mbox: 32
I (2059) wifi_init: udp mbox: 6
I (2063) wifi_init: tcp mbox: 6
I (2067) wifi_init: tcp tx win: 5760
I (2071) wifi_init: tcp rx win: 5760
I (2076) wifi_init: tcp mss: 1440
I (2080) wifi_init: WiFi/LWIP prefer SPIRAM
I (2084) wifi_init: WiFi IRAM OP enabled
I (2089) wifi_init: WiFi RX IRAM OP enabled
I (2095) wifi:set country: cc=US schan=1 nchan=11 policy=0

I (2109) phy_init: phy_version 670,b7bc9b9,Apr 30 2024,10:54:13
I (2151) wifi:mode : sta (dc:da:0c:7c:d8:c0)
I (2152) wifi:enable tsf
I (4927) wifi:new:<1,1>, old:<1,0>, ap:<255,255>, sta:<1,1>, prof:1
I (4928) wifi:state: init -> auth (b0)
I (4952) wifi:state: auth -> assoc (0)
I (4962) wifi:state: assoc -> run (10)
I (4997) wifi:connected with IGS-MESH, aid = 1, channel 1, 40U, bssid = ac:15:a2:4e:6b:47
I (4998) wifi:security: WPA2-PSK, phy: bgn, rssi: -70
I (4999) wifi:pm start, type: 1

I (5002) wifi:dp: 1, bi: 102400, li: 3, scale listen interval from 307200 us to 307200 us
I (5010) wifi:set rx beacon pti, rx_bcn_pti: 0, bcn_timeout: 25000, mt_pti: 0, mt_time: 10000
I (5026) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
I (5031) wifi:AP's beacon interval = 102400 us, DTIM period = 1
I (6020) esp_netif_handlers: sta ip: 192.168.0.92, mask: 255.255.255.0, gw: 192.168.0.1
I (6061) wifi:Set ps type: 0, coexist: 0

I (6068) NETWORK: sta: mdns started
I (6070) telnet_server: Socket listening on 0.0.0.0:23
I (6076) NETWORK: Initializing SNTP: pool.ntp.org, sync_interval:86400 sec
I (6087) wifi:<ba-add>idx:1 (ifx:0, ac:15:a2:4e:6b:47), tid:0, ssn:0, winSize:64
I (11128) wifi:pm stop, total sleep time: 700041 us / 6125411 us

I (11128) wifi:<ba-del>idx:1, tid:0
I (11129) wifi:<ba-del>idx:0, tid:7
I (11132) wifi:new:<1,0>, old:<1,1>, ap:<255,255>, sta:<1,1>, prof:1
I (13568) wifi:new:<1,1>, old:<1,0>, ap:<255,255>, sta:<1,1>, prof:1
I (13569) wifi:state: init -> auth (b0)
I (13581) wifi:state: auth -> assoc (0)
I (13759) wifi:state: assoc -> run (10)
I (15353) wifi:connected with IGS-MESH, aid = 1, channel 1, 40U, bssid = ac:15:a2:4e:6b:47
I (15354) wifi:security: WPA2-PSK, phy: bgn, rssi: -71
I (15355) wifi:pm start, type: 0

I (15358) wifi:set rx beacon pti, rx_bcn_pti: 0, bcn_timeout: 25000, mt_pti: 0, mt_time: 10000
I (15373) wifi:AP's beacon interval = 102400 us, DTIM period = 1
I (15919) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
I (16013) wifi:<ba-del>idx:0, tid:7

I (16181) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
I (19099) wifi:state: run -> init (22c0)
I (19099) wifi:pm stop, total sleep time: 0 us / 3741213 us

I (19100) wifi:<ba-del>idx:0, tid:7
I (19101) wifi:new:<1,0>, old:<1,1>, ap:<255,255>, sta:<1,1>, prof:1
W (21123) wifi:Haven't to connect to a suitable AP now!
I (23948) wifi:new:<1,1>, old:<1,0>, ap:<255,255>, sta:<1,1>, prof:1
I (23949) wifi:state: init -> auth (b0)
I (23960) wifi:state: auth -> assoc (0)
I (24212) wifi:state: assoc -> run (10)
E (25695) wpa: Eapol message 4/4 tx failure, not installing keys
I (26086) wifi:connected with IGS-MESH, aid = 1, channel 1, 40U, bssid = ac:15:a2:4e:6b:47
I (26087) wifi:security: WPA2-PSK, phy: bgn, rssi: -73
I (26089) wifi:pm start, type: 0

I (26092) wifi:set rx beacon pti, rx_bcn_pti: 0, bcn_timeout: 25000, mt_pti: 0, mt_time: 10000
I (26126) wifi:AP's beacon interval = 102400 us, DTIM period = 1
I (26132) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:0, ssn:0, winSize:64
I (26317) wifi:<ba-add>idx:1 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
I (29198) wifi:state: run -> init (22c0)
I (29198) wifi:pm stop, total sleep time: 0 us / 3106688 us

I (29199) wifi:<ba-del>idx:0, tid:0
I (29199) wifi:<ba-del>idx:1, tid:7
I (29203) wifi:new:<1,0>, old:<1,1>, ap:<255,255>, sta:<1,1>, prof:1
I (31639) wifi:new:<1,1>, old:<1,0>, ap:<255,255>, sta:<1,1>, prof:1
I (31640) wifi:state: init -> auth (b0)
I (31660) wifi:state: auth -> assoc (0)
I (31770) wifi:state: assoc -> run (10)
E (33876) wpa: Eapol message 4/4 tx failure, not installing keys
E (34400) wpa: Eapol message 4/4 tx failure, not installing keys
I (34552) wifi:connected with IGS-MESH, aid = 1, channel 1, 40U, bssid = ac:15:a2:4e:6b:47
I (34553) wifi:security: WPA2-PSK, phy: bgn, rssi: -74
I (34554) wifi:pm start, type: 0

I (34557) wifi:set rx beacon pti, rx_bcn_pti: 0, bcn_timeout: 25000, mt_pti: 0, mt_time: 10000
I (34626) wifi:AP's beacon interval = 102400 us, DTIM period = 1
I (35304) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:0, ssn:0, winSize:64
I (35336) wifi:<ba-add>idx:1 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
I (35482) wifi:<ba-del>idx:1, tid:7
I (35632) wifi:<ba-add>idx:1 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
I (36416) wifi:<ba-del>idx:0, tid:0
I (36481) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:0, ssn:0, winSize:64
I (42491) wifi:state: run -> init (22c0)
I (42491) wifi:pm stop, total sleep time: 0 us / 7934083 us

I (42492) wifi:<ba-del>idx:0, tid:0
I (42492) wifi:<ba-del>idx:1, tid:7
I (42496) wifi:new:<1,0>, old:<1,1>, ap:<255,255>, sta:<1,1>, prof:1
I (44932) wifi:new:<1,1>, old:<1,0>, ap:<255,255>, sta:<1,1>, prof:1
I (44933) wifi:state: init -> auth (b0)
I (45232) wifi:state: auth -> assoc (0)
I (45280) wifi:state: assoc -> run (10)
E (47962) wpa: Eapol message 4/4 tx failure, not installing keys
E (48486) wpa: Eapol message 4/4 tx failure, not installing keys
I (48760) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:0, ssn:0, winSize:64
I (49228) wifi:connected with IGS-MESH, aid = 1, channel 1, 40U, bssid = ac:15:a2:4e:6b:47
I (49229) wifi:security: WPA2-PSK, phy: bgn, rssi: -70
I (49230) wifi:pm start, type: 0

I (49233) wifi:set rx beacon pti, rx_bcn_pti: 0, bcn_timeout: 25000, mt_pti: 0, mt_time: 10000
I (49271) wifi:AP's beacon interval = 102400 us, DTIM period = 1
I (49397) wifi:<ba-add>idx:1 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
I (52357) wifi:state: run -> init (22c0)
I (52358) wifi:pm stop, total sleep time: 0 us / 3124772 us

I (52358) wifi:<ba-del>idx:0, tid:0
I (52359) wifi:<ba-del>idx:1, tid:7
I (52362) wifi:new:<1,0>, old:<1,1>, ap:<255,255>, sta:<1,1>, prof:1
I (54798) wifi:new:<1,1>, old:<1,0>, ap:<255,255>, sta:<1,1>, prof:1
I (54800) wifi:state: init -> auth (b0)
I (54810) wifi:state: auth -> assoc (0)
I (55470) wifi:state: assoc -> run (10)
E (57029) wpa: Eapol message 4/4 tx failure, not installing keys
I (57535) wifi:connected with IGS-MESH, aid = 1, channel 1, 40U, bssid = ac:15:a2:4e:6b:47
I (57536) wifi:security: WPA2-PSK, phy: bgn, rssi: -71
I (57538) wifi:pm start, type: 0

I (57541) wifi:set rx beacon pti, rx_bcn_pti: 0, bcn_timeout: 25000, mt_pti: 0, mt_time: 10000
I (57564) wifi:AP's beacon interval = 102400 us, DTIM period = 1
I (57828) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
I (58057) wifi:<ba-del>idx:0, tid:7
I (58286) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
I (64952) wifi:<ba-del>idx:0, tid:7
I (65699) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
I (72416) wifi:<ba-add>idx:1 (ifx:0, ac:15:a2:4e:6b:47), tid:0, ssn:0, winSize:64
I (74974) wifi:state: run -> init (22c0)
I (74975) wifi:pm stop, total sleep time: 0 us / 17434279 us

I (74975) wifi:<ba-del>idx:1, tid:0
I (74976) wifi:<ba-del>idx:0, tid:7
I (74979) wifi:new:<1,0>, old:<1,1>, ap:<255,255>, sta:<1,1>, prof:1
I (77416) wifi:new:<1,1>, old:<1,0>, ap:<255,255>, sta:<1,1>, prof:1
I (77417) wifi:state: init -> auth (b0)
I (78418) wifi:state: auth -> init (200)
I (78419) wifi:new:<1,0>, old:<1,1>, ap:<255,255>, sta:<1,1>, prof:1
I (78421) wifi:new:<1,1>, old:<1,0>, ap:<255,255>, sta:<1,1>, prof:1
I (78423) wifi:state: init -> auth (b0)
I (78439) wifi:state: auth -> assoc (0)
I (78470) wifi:state: assoc -> run (10)
E (80578) wpa: Eapol message 4/4 tx failure, not installing keys
E (81103) wpa: Eapol message 4/4 tx failure, not installing keys
I (81728) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:0, ssn:0, winSize:64
E (82252) wpa: Eapol message 4/4 tx failure, not installing keys
I (85179) wifi:state: run -> init (22c0)
I (85180) wifi:<ba-del>idx:0, tid:0
I (85180) wifi:new:<1,0>, old:<1,1>, ap:<255,255>, sta:<1,1>, prof:1
I (85183) wifi:new:<1,1>, old:<1,0>, ap:<255,255>, sta:<1,1>, prof:1
I (85188) wifi:state: init -> auth (b0)
I (85532) wifi:state: auth -> assoc (0)
I (86035) wifi:state: assoc -> run (10)
E (88145) wpa: Eapol message 4/4 tx failure, not installing keys
E (88668) wpa: Eapol message 4/4 tx failure, not installing keys
E (89191) wpa: Eapol message 4/4 tx failure, not installing keys
I (96036) wifi:state: run -> init (cc00)
I (96037) wifi:new:<1,0>, old:<1,1>, ap:<255,255>, sta:<1,1>, prof:1
I (96039) wifi:new:<1,1>, old:<1,0>, ap:<255,255>, sta:<1,1>, prof:1
I (96042) wifi:state: init -> auth (b0)
I (97045) wifi:state: auth -> init (200)
I (97046) wifi:new:<1,0>, old:<1,1>, ap:<255,255>, sta:<1,1>, prof:1
I (101884) wifi:new:<1,1>, old:<1,0>, ap:<255,255>, sta:<1,1>, prof:1
I (101885) wifi:state: init -> auth (b0)
I (101896) wifi:state: auth -> assoc (0)
I (102452) wifi:state: assoc -> run (10)
I (104572) wpa: EAPOL1 received for 4 times, sending deauth
I (104573) wifi:state: run -> init (f00)
I (104573) wifi:new:<1,0>, old:<1,1>, ap:<255,255>, sta:<1,1>, prof:1
I (104579) wifi:new:<1,1>, old:<1,0>, ap:<255,255>, sta:<1,1>, prof:1
I (104584) wifi:state: init -> auth (b0)
I (105587) wifi:state: auth -> init (200)
I (105588) wifi:new:<1,0>, old:<1,1>, ap:<255,255>, sta:<1,1>, prof:1
I (105590) wifi:new:<1,1>, old:<1,0>, ap:<255,255>, sta:<1,1>, prof:1
I (105593) wifi:state: init -> auth (b0)
I (106585) wifi:state: auth -> assoc (0)
I (106620) wifi:state: assoc -> run (10)
E (108725) wpa: Eapol message 4/4 tx failure, not installing keys
E (109249) wpa: Eapol message 4/4 tx failure, not installing keys
E (109774) wpa: Eapol message 4/4 tx failure, not installing keys
E (110298) wpa: Eapol message 4/4 tx failure, not installing keys
I (116621) wifi:state: run -> init (cc00)
I (116622) wifi:new:<1,0>, old:<1,1>, ap:<255,255>, sta:<1,1>, prof:1
I (116624) wifi:new:<1,1>, old:<1,0>, ap:<255,255>, sta:<1,1>, prof:1
I (116627) wifi:state: init -> auth (b0)
I (117630) wifi:state: auth -> init (200)
I (117631) wifi:new:<1,0>, old:<1,1>, ap:<255,255>, sta:<1,1>, prof:1

More Information.

Seems keep receiving Disconnect reason: 34

AxelLin commented 2 weeks ago

I can also observe the esp32s3 abnormal if I change AP from "20/40MHz" to "20MHz" and then switch back to "20/40MHz". Sometimes it keep received "Disconnect reason: 34" after connected. Sometimes it can join AP but the wifi transfer becomes slow and easy to hit failure. This issue does not happen on esp32 when test at the same time.

below shows the "Disconnect reason: 34" log


D (73695) wifi:Start wifi connect
D (73698) wifi:connect status 4 -> 0
D (73701) wifi:connect chan=0
D (73704) wifi:first chan=3
D (73706) wifi:connect status 0 -> 1
D (73709) wifi:filter: set rx policy=3
D (73713) wifi:clear scan ap list
D (73716) wifi:start scan: type=0x50f, priority=2, cb=0x42094e18, arg=0x0, ss_state=0x1, time=73721706, index=0
0x42094e18: cnx_start_handoff_cb at ??:?

D (73726) wifi:perform scan: ss_state=0x9, chan<3,0>, dur<0,120>
D (73762) wifi:rsn valid: gcipher=3 ucipher=3 akm=5 mac=ac:15:a2:4e:6b:47
D (73763) wifi:profile match: ss_state=0x7
D (73852) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (73852) wifi:perform scan: ss_state=0xd, chan<1,0>, dur<0,120>
D (73973) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (73974) wifi:perform scan: ss_state=0xd, chan<2,0>, dur<0,120>
D (74095) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (74095) wifi:perform scan: ss_state=0xd, chan<4,0>, dur<0,120>
D (74216) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (74217) wifi:perform scan: ss_state=0xd, chan<5,0>, dur<0,120>
D (74337) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (74338) wifi:perform scan: ss_state=0xd, chan<6,0>, dur<0,120>
D (74459) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (74459) wifi:perform scan: ss_state=0xd, chan<7,0>, dur<0,120>
D (74580) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (74581) wifi:perform scan: ss_state=0xd, chan<8,0>, dur<0,120>
D (74702) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (74702) wifi:perform scan: ss_state=0xd, chan<9,0>, dur<0,120>
D (74823) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (74824) wifi:perform scan: ss_state=0xd, chan<10,0>, dur<0,120>
D (74945) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (74945) wifi:perform scan: ss_state=0xd, chan<11,0>, dur<0,120>
D (75066) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (75067) wifi:perform scan: ss_state=0xd, chan<12,0>, dur<360,360>
D (75427) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (75428) wifi:perform scan: ss_state=0xd, chan<13,0>, dur<360,360>
D (75788) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (75789) wifi:perform scan: ss_state=0xd, chan<14,0>, dur<360,360>
D (76149) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (76150) wifi:filter: set rx policy=4
D (76150) wifi:first chan=1
D (76151) wifi:handoff_cb: status=0
D (76153) wifi:ap found, mac=ac:15:a2:4e:6b:47
D (76157) wifi:going for connection with bssid=ac:15:a2:4e:6b:47
D (76163) wifi:new_bss=0x3fca34e0, cur_bss=0x0, new_chan=<3,1>, cur_chan=3
D (76169) wifi:filter: set rx policy=5
D (76173) wpa: WPA: set AP RSNXE - hexdump(len=0):
D (76178) wpa:  [NULL]
I (76180) wifi:new:<3,1>, old:<3,0>, ap:<255,255>, sta:<3,1>, prof:1
D (76187) wifi:connect_op: status=0, auth=5, cipher=3 
D (76191) wifi:auth mode is not none
D (76194) wifi:connect_bss: auth=1, reconnect=0
I (76199) wifi:state: init -> auth (b0)
D (76202) wifi:start 1s AUTH timer
D (76205) wifi:clear scan ap list
D (76208) event: running post WIFI_EVENT:41 with handler 0x420114c4 and context 0x3fcba3c4 on loop 0x3fcb38dc

I (76218) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=3/old_snd=0, new_chan=3/new_snd=1
D (76216) wifi:recv auth: seq=2, status=0
I (76231) wifi:state: auth -> assoc (0)
D (76235) wifi:restart connect 1s timer for assoc
D (76277) wifi:recv assoc: type=0x10
D (76277) wifi:filter: set rx policy=6
I (76278) wifi:state: assoc -> run (10)
D (76278) wifi:start 10s connect timer for 4 way handshake
D (76282) wpa: WPA: Association event - clear replay counter
D (76287) wpa: WPA: Clear old PTK
D (76291) wpa: IEEE 802.1X RX: version=2 type=3 length=95
D (76297) wpa:   EAPOL-Key type=2
D (76299) wpa:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
D (76306) wpa:   key_length=16 key_data_length=0
D (76310) wpa:   replay_counter - hexdump(len=8):
D (76315) wpa: 00 00 00 00 00 00 00 01 
D (76319) wpa:   key_nonce - hexdump(len=32):
D (76324) wpa: f4 fd cb 2b d9 f8 d0 b1 c8 90 41 f8 ab 09 69 5d 
D (76330) wpa: 05 c0 fb b5 b3 02 28 87 6d 2d bd c7 25 e9 39 5f 
D (76336) wpa:   key_iv - hexdump(len=16):
D (76340) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (76346) wpa:   key_rsc - hexdump(len=8):
D (76350) wpa: 00 00 00 00 00 00 00 00 
D (76354) wpa:   key_id (reserved) - hexdump(len=8):
D (76359) wpa: 00 00 00 00 00 00 00 00 
D (76363) wpa:   key_mic - hexdump(len=16):
D (76367) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (76373) wpa: WPA 1/4-Way Handshake
D (76377) wpa: RSN: msg 1/4 key data - hexdump(len=0):
D (76382) wpa: WPA: Renewed SNonce - hexdump(len=32):
D (76387) wpa: 29 a0 84 77 14 93 d4 4a 4c e0 b3 ae ed e8 e5 11 
D (76393) wpa: 1e 5e 08 43 8b d9 f8 a5 03 bc 35 48 d9 37 94 7f 
D (76400) wpa: WPA: PTK derivation - A1=dc:da:0c:7c:d8:c0 A2=ac:15:a2:4e:6b:47

D (76407) wpa: WPA: PTK - hexdump(len=48):
D (76411) wpa: a8 8d 97 4f dc a4 df d8 54 c5 b9 42 23 3a ec f1 
D (76417) wpa: 5a 29 60 8c e9 b1 2f 68 66 06 29 e2 4a e3 a7 80 
D (76423) wpa: c7 54 c6 5d 55 1e 97 ba 9f 2a 8e 65 26 25 4d df 
D (76429) wpa: WPA: KCK - hexdump(len=16):
D (76433) wpa: a8 8d 97 4f dc a4 df d8 54 c5 b9 42 23 3a ec f1 
D (76439) wpa: WPA: KEK - hexdump(len=16):
D (76443) wpa: 5a 29 60 8c e9 b1 2f 68 66 06 29 e2 4a e3 a7 80 
D (76449) wpa: WPA: TK - hexdump(len=16):
D (76453) wpa: c7 54 c6 5d 55 1e 97 ba 9f 2a 8e 65 26 25 4d df 
D (76459) wpa: WPA Send EAPOL-Key 2/4
D (76463) wpa: WPA: KCK - hexdump(len=16):
D (76467) wpa: a8 8d 97 4f dc a4 df d8 54 c5 b9 42 23 3a ec f1 
D (76473) wpa: WPA: Derived Key MIC - hexdump(len=16):
D (76478) wpa: d4 21 2f 89 5c d6 70 5d 53 e4 e5 48 b0 9f 03 f2 
D (76485) wpa: IEEE 802.1X RX: version=2 type=3 length=95
D (76490) wpa:   EAPOL-Key type=2
D (76493) wpa:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
D (76499) wpa:   key_length=16 key_data_length=0
D (76504) wpa:   replay_counter - hexdump(len=8):
D (76509) wpa: 00 00 00 00 00 00 00 02 
D (76513) wpa:   key_nonce - hexdump(len=32):
D (76517) wpa: f4 fd cb 2b d9 f8 d0 b1 c8 90 41 f8 ab 09 69 5d 
D (76523) wpa: 05 c0 fb b5 b3 02 28 87 6d 2d bd c7 25 e9 39 5f 
D (76529) wpa:   key_iv - hexdump(len=16):
D (76533) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (76539) wpa:   key_rsc - hexdump(len=8):
D (76543) wpa: 00 00 00 00 00 00 00 00 
D (76547) wpa:   key_id (reserved) - hexdump(len=8):
D (76552) wpa: 00 00 00 00 00 00 00 00 
D (76556) wpa:   key_mic - hexdump(len=16):
D (76560) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (76566) wpa: WPA 1/4-Way Handshake
D (76570) wpa: RSN: msg 1/4 key data - hexdump(len=0):
D (76576) wpa: WPA: PTK derivation - A1=dc:da:0c:7c:d8:c0 A2=ac:15:a2:4e:6b:47

D (76583) wpa: WPA: PTK - hexdump(len=48):
D (76587) wpa: a8 8d 97 4f dc a4 df d8 54 c5 b9 42 23 3a ec f1 
D (76593) wpa: 5a 29 60 8c e9 b1 2f 68 66 06 29 e2 4a e3 a7 80 
D (76599) wpa: c7 54 c6 5d 55 1e 97 ba 9f 2a 8e 65 26 25 4d df 
D (76605) wpa: WPA: KCK - hexdump(len=16):
D (76609) wpa: a8 8d 97 4f dc a4 df d8 54 c5 b9 42 23 3a ec f1 
D (76615) wpa: WPA: KEK - hexdump(len=16):
D (76619) wpa: 5a 29 60 8c e9 b1 2f 68 66 06 29 e2 4a e3 a7 80 
D (76625) wpa: WPA: TK - hexdump(len=16):
D (76629) wpa: c7 54 c6 5d 55 1e 97 ba 9f 2a 8e 65 26 25 4d df 
D (76635) wpa: WPA Send EAPOL-Key 2/4
D (76639) wpa: WPA: KCK - hexdump(len=16):
D (76643) wpa: a8 8d 97 4f dc a4 df d8 54 c5 b9 42 23 3a ec f1 
D (76649) wpa: WPA: Derived Key MIC - hexdump(len=16):
D (76654) wpa: 35 8f 80 fb 52 25 4a f8 d5 2b c6 de a2 37 38 75 
D (76691) wpa: 2/4 txcb, flags=0, txfail 0
D (76695) wpa: IEEE 802.1X RX: version=2 type=3 length=151
D (76697) wpa:   EAPOL-Key type=2
D (76697) wpa:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
D (76702) wpa:   key_length=16 key_data_length=56
D (76707) wpa:   replay_counter - hexdump(len=8):
D (76712) wpa: 00 00 00 00 00 00 00 03 
D (76715) wpa:   key_nonce - hexdump(len=32):
D (76720) wpa: f4 fd cb 2b d9 f8 d0 b1 c8 90 41 f8 ab 09 69 5d 
D (76726) wpa: 05 c0 fb b5 b3 02 28 87 6d 2d bd c7 25 e9 39 5f 
D (76732) wpa:   key_iv - hexdump(len=16):
D (76736) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (76742) wpa:   key_rsc - hexdump(len=8):
D (76746) wpa: 00 00 00 00 00 00 00 00 
D (76750) wpa:   key_id (reserved) - hexdump(len=8):
D (76755) wpa: 00 00 00 00 00 00 00 00 
D (76759) wpa:   key_mic - hexdump(len=16):
D (76763) wpa: b5 d5 8c e3 ab 68 fc 6f 94 c2 0d 7d 3b f3 67 29 
D (76769) wpa: RSN: encrypted key data - hexdump(len=56):
D (76775) wpa: 6f bc f1 3e 6e 32 70 5e e9 50 d1 ce 38 b0 1d f5 
D (76781) wpa: 01 64 e5 20 ec 29 45 e7 d3 69 76 23 90 65 9b 5d 
D (76787) wpa: 2b 11 2d 65 ce 84 a4 e6 f7 96 ff 74 5b 0d 2b be 
D (76793) wpa: 69 b7 1e 49 c9 a2 34 7e 
D (76797) wpa: WPA: decrypted EAPOL-Key key data - hexdump(len=48):
D (76803) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (76809) wpa: 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 21 f8 
D (76815) wpa: 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e dd 00 
D (76821) wpa: WPA 3/4-Way Handshake
D (76825) wpa: WPA: RSN IE in EAPOL-Key - hexdump(len=22):
D (76830) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (76836) wpa: 00 0f ac 02 0c 00 
D (76839) wpa: WPA: GTK in EAPOL-Key - hexdump(len=24):
D (76845) wpa: dd 16 00 0f ac 01 01 00 21 f8 03 98 86 7b 8a 79 
D (76851) wpa: d0 33 2a c5 cd a0 6f 3e 
D (76855) wpa: WPA: IE KeyData - hexdump(len=48):
D (76860) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (76866) wpa: 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 21 f8 
D (76871) wpa: 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e dd 00 
D (76877) wpa: WPA: RSC - hexdump(len=8):
D (76882) wpa: 00 00 00 00 00 00 00 00 
D (76885) wpa: RSN: received GTK in pairwise handshake - hexdump(len=18):
D (76892) wpa: 01 00 21 f8 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 
D (76898) wpa: 6f 3e 
D (76901) wpa: tx 4/4 txcb_flags=8192
D (76904) wpa: WPA Send EAPOL-Key 4/4
D (76909) wpa: WPA: KCK - hexdump(len=16):
D (76912) wpa: a8 8d 97 4f dc a4 df d8 54 c5 b9 42 23 3a ec f1 
D (76918) wpa: WPA: Derived Key MIC - hexdump(len=16):
D (76924) wpa: a9 22 ec d2 a0 6e 43 e6 e6 61 4d e5 1d 3d eb 6d 
D (76931) wpa: IEEE 802.1X RX: version=2 type=3 length=151
D (76936) wpa:   EAPOL-Key type=2
D (76938) wpa:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
D (76947) wpa:   key_length=16 key_data_length=56
D (76952) wpa:   replay_counter - hexdump(len=8):
D (76957) wpa: 00 00 00 00 00 00 00 04 
D (76960) wpa:   key_nonce - hexdump(len=32):
D (76965) wpa: f4 fd cb 2b d9 f8 d0 b1 c8 90 41 f8 ab 09 69 5d 
D (76971) wpa: 05 c0 fb b5 b3 02 28 87 6d 2d bd c7 25 e9 39 5f 
D (76977) wpa:   key_iv - hexdump(len=16):
D (76981) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (76987) wpa:   key_rsc - hexdump(len=8):
D (76991) wpa: 00 00 00 00 00 00 00 00 
D (76995) wpa:   key_id (reserved) - hexdump(len=8):
D (77000) wpa: 00 00 00 00 00 00 00 00 
D (77004) wpa:   key_mic - hexdump(len=16):
D (77008) wpa: 7e 3b 0a 58 5a c6 64 72 f5 e4 d2 f6 27 1a 84 11 
D (77014) wpa: RSN: encrypted key data - hexdump(len=56):
D (77020) wpa: 6f bc f1 3e 6e 32 70 5e e9 50 d1 ce 38 b0 1d f5 
D (77026) wpa: 01 64 e5 20 ec 29 45 e7 d3 69 76 23 90 65 9b 5d 
D (77032) wpa: 2b 11 2d 65 ce 84 a4 e6 f7 96 ff 74 5b 0d 2b be 
D (77038) wpa: 69 b7 1e 49 c9 a2 34 7e 
D (77042) wpa: WPA: decrypted EAPOL-Key key data - hexdump(len=48):
D (77048) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (77054) wpa: 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 21 f8 
D (77060) wpa: 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e dd 00 
D (77066) wpa: WPA 3/4-Way Handshake
D (77069) wpa: WPA: RSN IE in EAPOL-Key - hexdump(len=22):
D (77075) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (77081) wpa: 00 0f ac 02 0c 00 
D (77084) wpa: WPA: GTK in EAPOL-Key - hexdump(len=24):
D (77090) wpa: dd 16 00 0f ac 01 01 00 21 f8 03 98 86 7b 8a 79 
D (77096) wpa: d0 33 2a c5 cd a0 6f 3e 
D (77100) wpa: WPA: IE KeyData - hexdump(len=48):
D (77104) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (77110) wpa: 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 21 f8 
D (77116) wpa: 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e dd 00 
D (77122) wpa: WPA: RSC - hexdump(len=8):
D (77126) wpa: 00 00 00 00 00 00 00 00 
D (77130) wpa: RSN: received GTK in pairwise handshake - hexdump(len=18):
D (77137) wpa: 01 00 21 f8 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 
D (77143) wpa: 6f 3e 
D (77146) wpa: tx 4/4 txcb_flags=8192
D (77149) wpa: WPA Send EAPOL-Key 4/4
D (77153) wpa: WPA: KCK - hexdump(len=16):
D (77157) wpa: a8 8d 97 4f dc a4 df d8 54 c5 b9 42 23 3a ec f1 
D (77163) wpa: WPA: Derived Key MIC - hexdump(len=16):
D (77168) wpa: 9c c4 43 f1 e7 1d 66 40 fe 78 cb c6 3e 20 ac 52 
D (77196) wpa: 2/4 txcb, flags=8192, txfail 0
D (77335) wpa: WPA: Installing PTK to the driver.
D (77335) wpa: WPA: Group Key - hexdump(len=16):
D (77336) wpa: 21 f8 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e 
D (77340) wpa: WPA: Judge GTK: (keyidx=1 len=16).
D (77344) wpa: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16).
D (77351) wpa: WPA: RSC - hexdump(len=6):
D (77355) wpa: 00 00 00 00 00 00 
D (77359) wpa: WPA: Key negotiation completed with ac:15:a2:4e:6b:47 [PTK=CCMP GTK=CCMP]

I (77367) wifi:connected with IGS-MESH, aid = 2, channel 3, 40U, bssid = ac:15:a2:4e:6b:47
I (77375) wifi:security: WPA2-PSK, phy: bgn, rssi: -73
D (77380) wifi:remove all except ac:15:a2:4e:6b:47 from rc list
D (77385) wifi:clear blacklist
D (77388) wifi:filter: set rx policy=7
I (77392) wifi:pm start, type: 0

I (77395) wifi:set rx beacon pti, rx_bcn_pti: 0, bcn_timeout: 25000, mt_pti: 0, mt_time: 10000
D (77403) wifi:Send sta connected event
D (77407) wifi:connect status 1 -> 5
D (77410) wifi:obss scan is disabled
D (77413) wifi:start obss scan: obss scan is stopped
I (77418) wifi:AP's beacon interval = 102400 us, DTIM period = 1
D (77424) event: running post WIFI_EVENT:4 with handler 0x4205d79c and context 0x3fcba160 on loop 0x3fcb38dc
0x4205d79c: wifi_default_action_sta_connected at /home/axel/esp/esp-idf/components/esp_wifi/src/wifi_default.c:85

D (77434) esp_netif_handlers: esp_netif action connected with netif0x3fcba290 from event_id=4
D (77442) esp_netif_lwip: check: remote, if=0x3fcba290 fn=0x4203b55c
0x4203b55c: esp_netif_up_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:1648

D (77449) esp_netif_lwip: esp_netif_up_api esp_netif:0x3fcba290
D (77455) esp_netif_lwip: check: local, if=0x3fcba290 fn=0x4203be6c
0x4203be6c: esp_netif_update_default_netif_lwip at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:317

D (77461) esp_netif_lwip: esp_netif_update_default_netif_lwip 0x3fcba290
D (77468) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (77473) esp_netif_lwip: check: remote, if=0x3fcba290 fn=0x4203b97c
0x4203b97c: esp_netif_dhcpc_start_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:1440

D (77480) esp_netif_lwip: esp_netif_dhcpc_start_api esp_netif:0x3fcba290
D (77487) esp_netif_lwip: esp_netif_start_ip_lost_timer esp_netif:0x3fcba290
D (77494) esp_netif_lwip: if0x3fcba290 start ip lost tmr: already started
D (77501) esp_netif_lwip: starting dhcp client
D (77506) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (77506) wifi:eb is dhcp or dns sport = 68, dport = 67
D (77516) event: running post WIFI_EVENT:4 with handler 0x420114c4 and context 0x3fcba3c4 on loop 0x3fcb38dc

I (77526) net_utils: STA connected
I (77745) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
D (78006) wifi:eb is dhcp or dns sport = 68, dport = 67
I (78014) wifi:<ba-del>idx:0, tid:7
I (78114) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
D (79006) wifi:eb is dhcp or dns sport = 68, dport = 67
D (81006) wifi:eb is dhcp or dns sport = 68, dport = 67
D (81182) wifi:recv deauth, reason=0x22
I (81183) wifi:state: run -> init (22c0)
D (81183) wifi:stop beacon and connect timers
D (81183) wifi:recv deauth/disassoc
D (81186) wifi:connect status 5 -> 4
D (81189) wifi:sta leave
I (81192) wifi:pm stop, total sleep time: 0 us / 3797193 us

D (81197) wifi:stop CSA timer
I (81200) wifi:<ba-del>idx:0, tid:7
D (81203) wifi:remove ac:15:a2:4e:6b:47 from rc list
I (81208) wifi:new:<3,0>, old:<3,1>, ap:<255,255>, sta:<3,1>, prof:1
D (81215) wifi:filter: set rx policy=8
D (81217) wifi:Send disconnect event, reason=34, AP number=0
D (81223) event: running post WIFI_EVENT:41 with handler 0x420114c4 and context 0x3fcba3c4 on loop 0x3fcb38dc

I (81233) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=3/old_snd=1, new_chan=3/new_snd=0
D (81242) event: running post WIFI_EVENT:5 with handler 0x4205d784 and context 0x3fcba19c on loop 0x3fcb38dc
0x4205d784: wifi_default_action_sta_disconnected at /home/axel/esp/esp-idf/components/esp_wifi/src/wifi_default.c:104

D (81252) esp_netif_handlers: esp_netif action disconnected with netif0x3fcba290 from event_id=5
D (81261) esp_netif_lwip: check: remote, if=0x3fcba290 fn=0x4203b904
0x4203b904: esp_netif_down_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:1674

D (81267) esp_netif_lwip: esp_netif_down_api esp_netif:0x3fcba290
D (81274) esp_netif_lwip: esp_netif_start_ip_lost_timer esp_netif:0x3fcba290
D (81281) esp_netif_lwip: if0x3fcba290 start ip lost tmr: already started
D (81287) esp_netif_lwip: check: local, if=0x3fcba290 fn=0x4203be6c
0x4203be6c: esp_netif_update_default_netif_lwip at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:317

D (81294) esp_netif_lwip: esp_netif_update_default_netif_lwip 0x3fcba290
D (81301) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (81306) event: running post WIFI_EVENT:5 with handler 0x420114c4 and context 0x3fcba3c4 on loop 0x3fcb38dc

I (81316) net_utils: Disconnect reason: 34, rssi=-69
D (81322) esp_netif_lwip: check: remote, if=0x3fcb4f54 fn=0x4203a9f0
0x4203a9f0: get_handle_from_ifkey_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:795

D (81328) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (81334) esp_netif_lwip: check: remote, if=0x3fcb4f54 fn=0x4203a9f0
0x4203a9f0: get_handle_from_ifkey_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:795

D (81341) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (81346) esp_netif_lwip: check: remote, if=0x3fcb4f54 fn=0x4203a9f0
0x4203a9f0: get_handle_from_ifkey_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:795

D (81353) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (81359) esp_netif_lwip: check: remote, if=0x3fcb4f54 fn=0x4203a9f0
0x4203a9f0: get_handle_from_ifkey_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:795

D (81365) esp_netif_lwip: call api in lwip: ret=0x0, give sem
I (81371) net_utils: Retry connecting AP: IGS-MESH, delay=0 sec
D (81378) wifi:Start wifi connect
D (81380) wifi:connect status 4 -> 0
D (81384) wifi:connect chan=0
D (81386) wifi:first chan=3
D (81389) wifi:connect status 0 -> 1
D (81392) wifi:filter: set rx policy=3
D (81396) wifi:clear scan ap list
D (81399) wifi:start scan: type=0x50f, priority=2, cb=0x42094e18, arg=0x0, ss_state=0x1, time=81404622, index=0
0x42094e18: cnx_start_handoff_cb at ??:?

D (81409) wifi:perform scan: ss_state=0x9, chan<3,0>, dur<0,120>
D (81433) wifi:rsn valid: gcipher=3 ucipher=3 akm=5 mac=ac:15:a2:4e:6b:47
D (81434) wifi:profile match: ss_state=0x7
D (81449) wifi:rsn valid: gcipher=3 ucipher=3 akm=5 mac=ac:15:a2:4e:6b:47
D (81450) wifi:profile match: ss_state=0x7
D (81535) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (81535) wifi:perform scan: ss_state=0xd, chan<1,0>, dur<0,120>
D (81656) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (81657) wifi:perform scan: ss_state=0xd, chan<2,0>, dur<0,120>
D (81777) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (81778) wifi:perform scan: ss_state=0xd, chan<4,0>, dur<0,120>
D (81899) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (81899) wifi:perform scan: ss_state=0xd, chan<5,0>, dur<0,120>
D (82020) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (82021) wifi:perform scan: ss_state=0xd, chan<6,0>, dur<0,120>
D (82142) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (82142) wifi:perform scan: ss_state=0xd, chan<7,0>, dur<0,120>
D (82263) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (82264) wifi:perform scan: ss_state=0xd, chan<8,0>, dur<0,120>
D (82385) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (82385) wifi:perform scan: ss_state=0xd, chan<9,0>, dur<0,120>
D (82506) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (82507) wifi:perform scan: ss_state=0xd, chan<10,0>, dur<0,120>
D (82627) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (82628) wifi:perform scan: ss_state=0xd, chan<11,0>, dur<0,120>
D (82749) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (82749) wifi:perform scan: ss_state=0xd, chan<12,0>, dur<360,360>
D (83110) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (83110) wifi:perform scan: ss_state=0xd, chan<13,0>, dur<360,360>
D (83471) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (83472) wifi:perform scan: ss_state=0xd, chan<14,0>, dur<360,360>
D (83832) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (83833) wifi:filter: set rx policy=4
D (83833) wifi:first chan=1
D (83833) wifi:handoff_cb: status=0
D (83836) wifi:ap found, mac=ac:15:a2:4e:6b:47
D (83840) wifi:going for connection with bssid=ac:15:a2:4e:6b:47
D (83845) wifi:new_bss=0x3fca34e0, cur_bss=0x0, new_chan=<3,1>, cur_chan=3
D (83852) wifi:filter: set rx policy=5
D (83856) wpa: WPA: set AP RSNXE - hexdump(len=0):
D (83860) wpa:  [NULL]
I (83863) wifi:new:<3,1>, old:<3,0>, ap:<255,255>, sta:<3,1>, prof:1
D (83869) wifi:connect_op: status=0, auth=5, cipher=3 
D (83874) wifi:auth mode is not none
D (83877) wifi:connect_bss: auth=1, reconnect=0
I (83881) wifi:state: init -> auth (b0)
D (83885) wifi:start 1s AUTH timer
D (83888) wifi:clear scan ap list
D (83891) event: running post WIFI_EVENT:41 with handler 0x420114c4 and context 0x3fcba3c4 on loop 0x3fcb38dc

I (83901) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=3/old_snd=0, new_chan=3/new_snd=1
D (83895) wifi:recv auth: seq=2, status=0
I (83914) wifi:state: auth -> assoc (0)
D (83918) wifi:restart connect 1s timer for assoc
D (83946) wifi:recv assoc: type=0x10
D (83946) wifi:filter: set rx policy=6
I (83947) wifi:state: assoc -> run (10)
D (83947) wifi:start 10s connect timer for 4 way handshake
D (83951) wpa: WPA: Association event - clear replay counter
D (83956) wpa: WPA: Clear old PTK
D (83960) wpa: IEEE 802.1X RX: version=2 type=3 length=95
D (83966) wpa:   EAPOL-Key type=2
D (83968) wpa:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
D (83975) wpa:   key_length=16 key_data_length=0
D (83979) wpa:   replay_counter - hexdump(len=8):
D (83984) wpa: 00 00 00 00 00 00 00 01 
D (83988) wpa:   key_nonce - hexdump(len=32):
D (83993) wpa: 31 99 1c eb 0a 81 3f d3 24 0e 7b a1 8c 4b 63 be 
D (83999) wpa: d4 6a b2 ac 6e d2 13 73 47 a8 ab 81 bc 60 38 0e 
D (84004) wpa:   key_iv - hexdump(len=16):
D (84009) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (84015) wpa:   key_rsc - hexdump(len=8):
D (84019) wpa: 00 00 00 00 00 00 00 00 
D (84023) wpa:   key_id (reserved) - hexdump(len=8):
D (84028) wpa: 00 00 00 00 00 00 00 00 
D (84032) wpa:   key_mic - hexdump(len=16):
D (84036) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (84042) wpa: WPA 1/4-Way Handshake
D (84046) wpa: RSN: msg 1/4 key data - hexdump(len=0):
D (84051) wpa: WPA: Renewed SNonce - hexdump(len=32):
D (84056) wpa: 6b d2 90 f1 96 19 98 27 76 78 92 2b e0 3e a1 60 
D (84062) wpa: ac 34 dd 35 5d 68 8a 02 df 30 50 82 27 16 e2 93 
D (84069) wpa: WPA: PTK derivation - A1=dc:da:0c:7c:d8:c0 A2=ac:15:a2:4e:6b:47

D (84075) wpa: WPA: PTK - hexdump(len=48):
D (84080) wpa: 09 74 06 16 43 68 7e 23 1b 38 fa 87 85 6f 6b 5f 
D (84086) wpa: d9 f1 a5 b6 1d b5 48 22 a3 c5 a3 3c dc 75 18 c1 
D (84091) wpa: 78 6e 09 76 30 19 99 00 7c 92 32 c1 e8 40 67 7f 
D (84097) wpa: WPA: KCK - hexdump(len=16):
D (84102) wpa: 09 74 06 16 43 68 7e 23 1b 38 fa 87 85 6f 6b 5f 
D (84108) wpa: WPA: KEK - hexdump(len=16):
D (84112) wpa: d9 f1 a5 b6 1d b5 48 22 a3 c5 a3 3c dc 75 18 c1 
D (84118) wpa: WPA: TK - hexdump(len=16):
D (84122) wpa: 78 6e 09 76 30 19 99 00 7c 92 32 c1 e8 40 67 7f 
D (84128) wpa: WPA Send EAPOL-Key 2/4
D (84132) wpa: WPA: KCK - hexdump(len=16):
D (84136) wpa: 09 74 06 16 43 68 7e 23 1b 38 fa 87 85 6f 6b 5f 
D (84142) wpa: WPA: Derived Key MIC - hexdump(len=16):
D (84147) wpa: 3c 17 c3 07 4d 1b ab 53 44 0c 2a 0a 8a 19 74 f3 
D (84154) wpa: IEEE 802.1X RX: version=2 type=3 length=95
D (84159) wpa:   EAPOL-Key type=2
D (84162) wpa:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
D (84168) wpa:   key_length=16 key_data_length=0
D (84173) wpa:   replay_counter - hexdump(len=8):
D (84178) wpa: 00 00 00 00 00 00 00 02 
D (84181) wpa:   key_nonce - hexdump(len=32):
D (84186) wpa: 31 99 1c eb 0a 81 3f d3 24 0e 7b a1 8c 4b 63 be 
D (84192) wpa: d4 6a b2 ac 6e d2 13 73 47 a8 ab 81 bc 60 38 0e 
D (84198) wpa:   key_iv - hexdump(len=16):
D (84202) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (84208) wpa:   key_rsc - hexdump(len=8):
D (84212) wpa: 00 00 00 00 00 00 00 00 
D (84216) wpa:   key_id (reserved) - hexdump(len=8):
D (84221) wpa: 00 00 00 00 00 00 00 00 
D (84225) wpa:   key_mic - hexdump(len=16):
D (84229) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (84235) wpa: WPA 1/4-Way Handshake
D (84239) wpa: RSN: msg 1/4 key data - hexdump(len=0):
D (84245) wpa: WPA: PTK derivation - A1=dc:da:0c:7c:d8:c0 A2=ac:15:a2:4e:6b:47

D (84252) wpa: WPA: PTK - hexdump(len=48):
D (84256) wpa: 09 74 06 16 43 68 7e 23 1b 38 fa 87 85 6f 6b 5f 
D (84262) wpa: d9 f1 a5 b6 1d b5 48 22 a3 c5 a3 3c dc 75 18 c1 
D (84268) wpa: 78 6e 09 76 30 19 99 00 7c 92 32 c1 e8 40 67 7f 
D (84274) wpa: WPA: KCK - hexdump(len=16):
D (84278) wpa: 09 74 06 16 43 68 7e 23 1b 38 fa 87 85 6f 6b 5f 
D (84284) wpa: WPA: KEK - hexdump(len=16):
D (84288) wpa: d9 f1 a5 b6 1d b5 48 22 a3 c5 a3 3c dc 75 18 c1 
D (84294) wpa: WPA: TK - hexdump(len=16):
D (84298) wpa: 78 6e 09 76 30 19 99 00 7c 92 32 c1 e8 40 67 7f 
D (84304) wpa: WPA Send EAPOL-Key 2/4
D (84308) wpa: WPA: KCK - hexdump(len=16):
D (84312) wpa: 09 74 06 16 43 68 7e 23 1b 38 fa 87 85 6f 6b 5f 
D (84318) wpa: WPA: Derived Key MIC - hexdump(len=16):
D (84323) wpa: a6 bd ca 8a 63 1e 41 68 cf 5b 84 a8 fa ef bb a7 
D (84335) wpa: IEEE 802.1X RX: version=2 type=3 length=151
D (84336) wpa:   EAPOL-Key type=2
D (84338) wpa:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
D (84347) wpa:   key_length=16 key_data_length=56
D (84351) wpa:   replay_counter - hexdump(len=8):
D (84356) wpa: 00 00 00 00 00 00 00 03 
D (84360) wpa:   key_nonce - hexdump(len=32):
D (84365) wpa: 31 99 1c eb 0a 81 3f d3 24 0e 7b a1 8c 4b 63 be 
D (84371) wpa: d4 6a b2 ac 6e d2 13 73 47 a8 ab 81 bc 60 38 0e 
D (84377) wpa:   key_iv - hexdump(len=16):
D (84381) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (84387) wpa:   key_rsc - hexdump(len=8):
D (84391) wpa: 00 00 00 00 00 00 00 00 
D (84395) wpa:   key_id (reserved) - hexdump(len=8):
D (84400) wpa: 00 00 00 00 00 00 00 00 
D (84404) wpa:   key_mic - hexdump(len=16):
D (84408) wpa: 09 ac a1 5e da 82 26 8a 81 9f 4d 3f f6 85 31 18 
D (84414) wpa: RSN: encrypted key data - hexdump(len=56):
D (84419) wpa: eb 86 bf 49 c1 6a 2e e1 d0 12 86 a1 15 de 8d 7e 
D (84425) wpa: 53 66 58 00 2b 71 86 cd e1 e3 3f 21 30 32 61 3b 
D (84431) wpa: b8 54 50 b4 2d 73 4a f3 de 74 5b 0e a6 c0 77 6c 
D (84437) wpa: a0 61 ce 0a 54 98 e8 9f 
D (84442) wpa: WPA: decrypted EAPOL-Key key data - hexdump(len=48):
D (84448) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (84454) wpa: 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 21 f8 
D (84460) wpa: 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e dd 00 
D (84466) wpa: WPA 3/4-Way Handshake
D (84469) wpa: WPA: RSN IE in EAPOL-Key - hexdump(len=22):
D (84475) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (84481) wpa: 00 0f ac 02 0c 00 
D (84484) wpa: WPA: GTK in EAPOL-Key - hexdump(len=24):
D (84490) wpa: dd 16 00 0f ac 01 01 00 21 f8 03 98 86 7b 8a 79 
D (84496) wpa: d0 33 2a c5 cd a0 6f 3e 
D (84499) wpa: WPA: IE KeyData - hexdump(len=48):
D (84504) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (84510) wpa: 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 21 f8 
D (84516) wpa: 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e dd 00 
D (84522) wpa: WPA: RSC - hexdump(len=8):
D (84526) wpa: 00 00 00 00 00 00 00 00 
D (84530) wpa: RSN: received GTK in pairwise handshake - hexdump(len=18):
D (84537) wpa: 01 00 21 f8 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 
D (84543) wpa: 6f 3e 
D (84545) wpa: tx 4/4 txcb_flags=8192
D (84549) wpa: WPA Send EAPOL-Key 4/4
D (84553) wpa: WPA: KCK - hexdump(len=16):
D (84557) wpa: 09 74 06 16 43 68 7e 23 1b 38 fa 87 85 6f 6b 5f 
D (84563) wpa: WPA: Derived Key MIC - hexdump(len=16):
D (84568) wpa: d5 51 2d 1e 3d 3b ee 8e 00 0a 60 f3 f5 93 cf d9 
D (84575) wpa: 2/4 txcb, flags=8192, txfail 0
D (84579) wpa: IEEE 802.1X RX: version=2 type=3 length=151
D (84585) wpa:   EAPOL-Key type=2
D (84587) wpa:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
D (84596) wpa:   key_length=16 key_data_length=56
D (84601) wpa:   replay_counter - hexdump(len=8):
D (84606) wpa: 00 00 00 00 00 00 00 04 
D (84610) wpa:   key_nonce - hexdump(len=32):
D (84614) wpa: 31 99 1c eb 0a 81 3f d3 24 0e 7b a1 8c 4b 63 be 
D (84620) wpa: d4 6a b2 ac 6e d2 13 73 47 a8 ab 81 bc 60 38 0e 
D (84626) wpa:   key_iv - hexdump(len=16):
D (84630) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (84636) wpa:   key_rsc - hexdump(len=8):
D (84640) wpa: 00 00 00 00 00 00 00 00 
D (84644) wpa:   key_id (reserved) - hexdump(len=8):
D (84649) wpa: 00 00 00 00 00 00 00 00 
D (84653) wpa:   key_mic - hexdump(len=16):
D (84657) wpa: ac 2e ef 98 b1 23 40 f0 e5 15 3c f0 21 40 0f a4 
D (84663) wpa: RSN: encrypted key data - hexdump(len=56):
D (84669) wpa: eb 86 bf 49 c1 6a 2e e1 d0 12 86 a1 15 de 8d 7e 
D (84675) wpa: 53 66 58 00 2b 71 86 cd e1 e3 3f 21 30 32 61 3b 
D (84681) wpa: b8 54 50 b4 2d 73 4a f3 de 74 5b 0e a6 c0 77 6c 
D (84687) wpa: a0 61 ce 0a 54 98 e8 9f 
D (84691) wpa: WPA: decrypted EAPOL-Key key data - hexdump(len=48):
D (84697) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (84703) wpa: 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 21 f8 
D (84709) wpa: 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e dd 00 
D (84715) wpa: WPA 3/4-Way Handshake
D (84719) wpa: WPA: RSN IE in EAPOL-Key - hexdump(len=22):
D (84724) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (84730) wpa: 00 0f ac 02 0c 00 
D (84734) wpa: WPA: GTK in EAPOL-Key - hexdump(len=24):
D (84739) wpa: dd 16 00 0f ac 01 01 00 21 f8 03 98 86 7b 8a 79 
D (84745) wpa: d0 33 2a c5 cd a0 6f 3e 
D (84749) wpa: WPA: IE KeyData - hexdump(len=48):
D (84754) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (84760) wpa: 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 21 f8 
D (84766) wpa: 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e dd 00 
D (84772) wpa: WPA: RSC - hexdump(len=8):
D (84776) wpa: 00 00 00 00 00 00 00 00 
D (84779) wpa: RSN: received GTK in pairwise handshake - hexdump(len=18):
D (84786) wpa: 01 00 21 f8 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 
D (84792) wpa: 6f 3e 
D (84795) wpa: tx 4/4 txcb_flags=8192
D (84798) wpa: WPA Send EAPOL-Key 4/4
D (84803) wpa: WPA: KCK - hexdump(len=16):
D (84806) wpa: 09 74 06 16 43 68 7e 23 1b 38 fa 87 85 6f 6b 5f 
D (84812) wpa: WPA: Derived Key MIC - hexdump(len=16):
D (84818) wpa: 0a 46 3d 6e d2 c7 0a 5f 8b 8c 8a 8e fc 7a 36 db 
D (84941) wpa: 2/4 txcb, flags=8192, txfail 0
D (85064) wpa: WPA: Installing PTK to the driver.
D (85065) wpa: WPA: Group Key - hexdump(len=16):
D (85065) wpa: 21 f8 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e 
D (85069) wpa: WPA: Judge GTK: (keyidx=1 len=16).
D (85074) wpa: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16).
D (85081) wpa: WPA: RSC - hexdump(len=6):
D (85085) wpa: 00 00 00 00 00 00 
D (85088) wpa: WPA: Key negotiation completed with ac:15:a2:4e:6b:47 [PTK=CCMP GTK=CCMP]

I (85096) wifi:connected with IGS-MESH, aid = 2, channel 3, 40U, bssid = ac:15:a2:4e:6b:47
I (85104) wifi:security: WPA2-PSK, phy: bgn, rssi: -73
D (85109) wifi:remove all except ac:15:a2:4e:6b:47 from rc list
D (85115) wifi:clear blacklist
D (85118) wifi:filter: set rx policy=7
I (85121) wifi:pm start, type: 0

I (85124) wifi:set rx beacon pti, rx_bcn_pti: 0, bcn_timeout: 25000, mt_pti: 0, mt_time: 10000
D (85133) wifi:Send sta connected event
D (85136) wifi:connect status 1 -> 5
D (85139) wifi:obss scan is disabled
D (85143) wifi:start obss scan: obss scan is stopped
I (85148) wifi:AP's beacon interval = 102400 us, DTIM period = 1
D (85154) event: running post WIFI_EVENT:4 with handler 0x4205d79c and context 0x3fcba160 on loop 0x3fcb38dc
0x4205d79c: wifi_default_action_sta_connected at /home/axel/esp/esp-idf/components/esp_wifi/src/wifi_default.c:85

D (85163) esp_netif_handlers: esp_netif action connected with netif0x3fcba290 from event_id=4
D (85172) esp_netif_lwip: check: remote, if=0x3fcba290 fn=0x4203b55c
0x4203b55c: esp_netif_up_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:1648

D (85178) esp_netif_lwip: esp_netif_up_api esp_netif:0x3fcba290
D (85184) esp_netif_lwip: check: local, if=0x3fcba290 fn=0x4203be6c
0x4203be6c: esp_netif_update_default_netif_lwip at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:317

D (85190) esp_netif_lwip: esp_netif_update_default_netif_lwip 0x3fcba290
D (85197) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (85203) esp_netif_lwip: check: remote, if=0x3fcba290 fn=0x4203b97c
0x4203b97c: esp_netif_dhcpc_start_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:1440

D (85209) esp_netif_lwip: esp_netif_dhcpc_start_api esp_netif:0x3fcba290
D (85216) esp_netif_lwip: esp_netif_start_ip_lost_timer esp_netif:0x3fcba290
D (85223) esp_netif_lwip: if0x3fcba290 start ip lost tmr: already started
D (85230) esp_netif_lwip: starting dhcp client
D (85235) wifi:D (85235) esp_netif_lwip: call api in lwip: ret=0x0, give sem
eb is dhcp or dns sport = 68, dport = 67
D (85246) event: running post WIFI_EVENT:4 with handler 0x420114c4 and context 0x3fcba3c4 on loop 0x3fcb38dc

I (85255) net_utils: STA connected
I (85517) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
D (85735) wifi:eb is dhcp or dns sport = 68, dport = 67
I (85741) wifi:<ba-del>idx:0, tid:7
I (86003) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
D (86735) wifi:eb is dhcp or dns sport = 68, dport = 67
I (86739) wifi:<ba-del>idx:0, tid:7
I (86837) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
D (88735) wifi:eb is dhcp or dns sport = 68, dport = 67
D (92559) wifi:recv deauth, reason=0x22
I (92560) wifi:state: run -> init (22c0)
D (92560) wifi:stop beacon and connect timers
D (92560) wifi:recv deauth/disassoc
D (92563) wifi:connect status 5 -> 4
D (92566) wifi:sta leave
I (92569) wifi:pm stop, total sleep time: 0 us / 7444692 us

D (92574) wifi:stop CSA timer
I (92577) wifi:<ba-del>idx:0, tid:7
D (92580) wifi:remove ac:15:a2:4e:6b:47 from rc list
I (92585) wifi:new:<3,0>, old:<3,1>, ap:<255,255>, sta:<3,1>, prof:1
D (92592) wifi:filter: set rx policy=8
D (92594) wifi:Send disconnect event, reason=34, AP number=0
D (92600) event: running post WIFI_EVENT:41 with handler 0x420114c4 and context 0x3fcba3c4 on loop 0x3fcb38dc

I (92610) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=3/old_snd=1, new_chan=3/new_snd=0
D (92619) event: running post WIFI_EVENT:5 with handler 0x4205d784 and context 0x3fcba19c on loop 0x3fcb38dc
0x4205d784: wifi_default_action_sta_disconnected at /home/axel/esp/esp-idf/components/esp_wifi/src/wifi_default.c:104

D (92629) esp_netif_handlers: esp_netif action disconnected with netif0x3fcba290 from event_id=5
D (92638) esp_netif_lwip: check: remote, if=0x3fcba290 fn=0x4203b904
0x4203b904: esp_netif_down_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:1674

D (92644) esp_netif_lwip: esp_netif_down_api esp_netif:0x3fcba290
D (92651) esp_netif_lwip: esp_netif_start_ip_lost_timer esp_netif:0x3fcba290
D (92658) esp_netif_lwip: if0x3fcba290 start ip lost tmr: already started
D (92664) esp_netif_lwip: check: local, if=0x3fcba290 fn=0x4203be6c
0x4203be6c: esp_netif_update_default_netif_lwip at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:317

D (92671) esp_netif_lwip: esp_netif_update_default_netif_lwip 0x3fcba290
D (92678) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (92683) event: running post WIFI_EVENT:5 with handler 0x420114c4 and context 0x3fcba3c4 on loop 0x3fcb38dc

I (92693) net_utils: Disconnect reason: 34, rssi=-70
D (92699) esp_netif_lwip: check: remote, if=0x3fcb4f54 fn=0x4203a9f0
0x4203a9f0: get_handle_from_ifkey_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:795

D (92705) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (92711) esp_netif_lwip: check: remote, if=0x3fcb4f54 fn=0x4203a9f0
0x4203a9f0: get_handle_from_ifkey_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:795

D (92718) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (92723) esp_netif_lwip: check: remote, if=0x3fcb4f54 fn=0x4203a9f0
0x4203a9f0: get_handle_from_ifkey_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:795

D (92730) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (92736) esp_netif_lwip: check: remote, if=0x3fcb4f54 fn=0x4203a9f0
0x4203a9f0: get_handle_from_ifkey_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:795

D (92742) esp_netif_lwip: call api in lwip: ret=0x0, give sem
I (92748) net_utils: Retry connecting AP: IGS-MESH, delay=0 sec
D (92755) wifi:Start wifi connect
D (92757) wifi:connect status 4 -> 0
D (92761) wifi:connect chan=0
D (92763) wifi:first chan=3
D (92766) wifi:connect status 0 -> 1
D (92769) wifi:filter: set rx policy=3
D (92773) wifi:clear scan ap list
D (92776) wifi:start scan: type=0x50f, priority=2, cb=0x42094e18, arg=0x0, ss_state=0x1, time=92781621, index=0
0x42094e18: cnx_start_handoff_cb at ??:?

D (92786) wifi:perform scan: ss_state=0x9, chan<3,0>, dur<0,120>
D (92800) wifi:rsn valid: gcipher=3 ucipher=3 akm=5 mac=ac:15:a2:4e:6b:47
D (92801) wifi:profile match: ss_state=0x7
D (92912) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (92912) wifi:perform scan: ss_state=0xd, chan<1,0>, dur<0,120>
D (93033) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (93034) wifi:perform scan: ss_state=0xd, chan<2,0>, dur<0,120>
D (93155) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (93155) wifi:perform scan: ss_state=0xd, chan<4,0>, dur<0,120>
D (93276) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (93277) wifi:perform scan: ss_state=0xd, chan<5,0>, dur<0,120>
D (93397) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (93398) wifi:perform scan: ss_state=0xd, chan<6,0>, dur<0,120>
D (93519) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (93520) wifi:perform scan: ss_state=0xd, chan<7,0>, dur<0,120>
D (93640) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (93641) wifi:perform scan: ss_state=0xd, chan<8,0>, dur<0,120>
D (93762) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (93762) wifi:perform scan: ss_state=0xd, chan<9,0>, dur<0,120>
D (93883) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (93884) wifi:perform scan: ss_state=0xd, chan<10,0>, dur<0,120>
D (94005) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (94005) wifi:perform scan: ss_state=0xd, chan<11,0>, dur<0,120>
D (94126) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (94127) wifi:perform scan: ss_state=0xd, chan<12,0>, dur<360,360>
D (94487) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (94488) wifi:perform scan: ss_state=0xd, chan<13,0>, dur<360,360>
D (94848) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (94849) wifi:perform scan: ss_state=0xd, chan<14,0>, dur<360,360>
D (95209) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (95210) wifi:filter: set rx policy=4
D (95210) wifi:first chan=1
D (95211) wifi:handoff_cb: status=0
D (95213) wifi:ap found, mac=ac:15:a2:4e:6b:47
D (95217) wifi:going for connection with bssid=ac:15:a2:4e:6b:47
D (95223) wifi:new_bss=0x3fca34e0, cur_bss=0x0, new_chan=<3,1>, cur_chan=3
D (95229) wifi:filter: set rx policy=5
D (95233) wpa: WPA: set AP RSNXE - hexdump(len=0):
D (95238) wpa:  [NULL]
I (95240) wifi:new:<3,1>, old:<3,0>, ap:<255,255>, sta:<3,1>, prof:1
D (95247) wifi:connect_op: status=0, auth=5, cipher=3 
D (95251) wifi:auth mode is not none
D (95254) wifi:connect_bss: auth=1, reconnect=0
I (95259) wifi:state: init -> auth (b0)
D (95262) wifi:start 1s AUTH timer
D (95265) wifi:clear scan ap list
D (95269) event: running post WIFI_EVENT:41 with handler 0x420114c4 and context 0x3fcba3c4 on loop 0x3fcb38dc

I (95278) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=3/old_snd=0, new_chan=3/new_snd=1
D (95282) wifi:recv auth: seq=2, status=0
I (95291) wifi:state: auth -> assoc (0)
D (95295) wifi:restart connect 1s timer for assoc
D (95311) wifi:recv assoc: type=0x10
D (95312) wifi:filter: set rx policy=6
I (95313) wifi:state: assoc -> run (10)
D (95313) wifi:start 10s connect timer for 4 way handshake
D (95316) wpa: WPA: Association event - clear replay counter
D (95322) wpa: WPA: Clear old PTK
D (95326) wpa: IEEE 802.1X RX: version=2 type=3 length=95
D (95331) wpa:   EAPOL-Key type=2
D (95334) wpa:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
D (95341) wpa:   key_length=16 key_data_length=0
D (95345) wpa:   replay_counter - hexdump(len=8):
D (95350) wpa: 00 00 00 00 00 00 00 01 
D (95354) wpa:   key_nonce - hexdump(len=32):
D (95358) wpa: 99 30 10 72 34 15 6c e2 cd 2b c6 d4 3d 57 c3 00 
D (95364) wpa: 55 57 b6 8b e0 51 8c 94 29 00 a6 7d c7 dd d9 45 
D (95370) wpa:   key_iv - hexdump(len=16):
D (95375) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (95380) wpa:   key_rsc - hexdump(len=8):
D (95385) wpa: 00 00 00 00 00 00 00 00 
D (95389) wpa:   key_id (reserved) - hexdump(len=8):
D (95394) wpa: 00 00 00 00 00 00 00 00 
D (95397) wpa:   key_mic - hexdump(len=16):
D (95402) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (95408) wpa: WPA 1/4-Way Handshake
D (95411) wpa: RSN: msg 1/4 key data - hexdump(len=0):
D (95417) wpa: WPA: Renewed SNonce - hexdump(len=32):
D (95422) wpa: 63 5b c3 a7 b7 76 57 ee e2 03 e9 f6 a8 1c f8 97 
D (95428) wpa: ce 61 82 02 51 b0 64 fa a8 87 19 90 ec 05 22 cb 
D (95435) wpa: WPA: PTK derivation - A1=dc:da:0c:7c:d8:c0 A2=ac:15:a2:4e:6b:47

D (95441) wpa: WPA: PTK - hexdump(len=48):
D (95445) wpa: e5 de 1d 2d e4 14 5f ec 9d d5 c8 3b c5 61 56 cf 
D (95451) wpa: d0 5a 22 ad a3 a0 62 24 a7 5c 08 90 71 04 24 37 
D (95457) wpa: a7 4f 42 34 db f7 8a ab 51 b6 76 68 32 d9 92 81 
D (95463) wpa: WPA: KCK - hexdump(len=16):
D (95467) wpa: e5 de 1d 2d e4 14 5f ec 9d d5 c8 3b c5 61 56 cf 
D (95473) wpa: WPA: KEK - hexdump(len=16):
D (95478) wpa: d0 5a 22 ad a3 a0 62 24 a7 5c 08 90 71 04 24 37 
D (95484) wpa: WPA: TK - hexdump(len=16):
D (95488) wpa: a7 4f 42 34 db f7 8a ab 51 b6 76 68 32 d9 92 81 
D (95494) wpa: WPA Send EAPOL-Key 2/4
D (95498) wpa: WPA: KCK - hexdump(len=16):
D (95502) wpa: e5 de 1d 2d e4 14 5f ec 9d d5 c8 3b c5 61 56 cf 
D (95508) wpa: WPA: Derived Key MIC - hexdump(len=16):
D (95513) wpa: 6e 2c b0 f0 56 1d 3c b5 4f 03 05 45 b5 37 55 5d 
D (95520) wpa: IEEE 802.1X RX: version=2 type=3 length=95
D (95525) wpa:   EAPOL-Key type=2
D (95528) wpa:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
D (95534) wpa:   key_length=16 key_data_length=0
D (95539) wpa:   replay_counter - hexdump(len=8):
D (95543) wpa: 00 00 00 00 00 00 00 02 
D (95547) wpa:   key_nonce - hexdump(len=32):
D (95552) wpa: 99 30 10 72 34 15 6c e2 cd 2b c6 d4 3d 57 c3 00 
D (95558) wpa: 55 57 b6 8b e0 51 8c 94 29 00 a6 7d c7 dd d9 45 
D (95564) wpa:   key_iv - hexdump(len=16):
D (95568) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (95574) wpa:   key_rsc - hexdump(len=8):
D (95578) wpa: 00 00 00 00 00 00 00 00 
D (95582) wpa:   key_id (reserved) - hexdump(len=8):
D (95587) wpa: 00 00 00 00 00 00 00 00 
D (95591) wpa:   key_mic - hexdump(len=16):
D (95595) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (95601) wpa: WPA 1/4-Way Handshake
D (95605) wpa: RSN: msg 1/4 key data - hexdump(len=0):
D (95611) wpa: WPA: PTK derivation - A1=dc:da:0c:7c:d8:c0 A2=ac:15:a2:4e:6b:47

D (95618) wpa: WPA: PTK - hexdump(len=48):
D (95622) wpa: e5 de 1d 2d e4 14 5f ec 9d d5 c8 3b c5 61 56 cf 
D (95628) wpa: d0 5a 22 ad a3 a0 62 24 a7 5c 08 90 71 04 24 37 
D (95634) wpa: a7 4f 42 34 db f7 8a ab 51 b6 76 68 32 d9 92 81 
D (95640) wpa: WPA: KCK - hexdump(len=16):
D (95644) wpa: e5 de 1d 2d e4 14 5f ec 9d d5 c8 3b c5 61 56 cf 
D (95650) wpa: WPA: KEK - hexdump(len=16):
D (95654) wpa: d0 5a 22 ad a3 a0 62 24 a7 5c 08 90 71 04 24 37 
D (95660) wpa: WPA: TK - hexdump(len=16):
D (95664) wpa: a7 4f 42 34 db f7 8a ab 51 b6 76 68 32 d9 92 81 
D (95670) wpa: WPA Send EAPOL-Key 2/4
D (95674) wpa: WPA: KCK - hexdump(len=16):
D (95678) wpa: e5 de 1d 2d e4 14 5f ec 9d d5 c8 3b c5 61 56 cf 
D (95684) wpa: WPA: Derived Key MIC - hexdump(len=16):
D (95689) wpa: 1e 30 5e 49 0f da a0 8c a0 41 14 ad cf 19 40 fe 
D (95714) wpa: IEEE 802.1X RX: version=2 type=3 length=151
D (95716) wpa:   EAPOL-Key type=2
D (95716) wpa:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
D (95721) wpa:   key_length=16 key_data_length=56
D (95725) wpa:   replay_counter - hexdump(len=8):
D (95730) wpa: 00 00 00 00 00 00 00 03 
D (95734) wpa:   key_nonce - hexdump(len=32):
D (95739) wpa: 99 30 10 72 34 15 6c e2 cd 2b c6 d4 3d 57 c3 00 
D (95745) wpa: 55 57 b6 8b e0 51 8c 94 29 00 a6 7d c7 dd d9 45 
D (95750) wpa:   key_iv - hexdump(len=16):
D (95755) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (95761) wpa:   key_rsc - hexdump(len=8):
D (95765) wpa: 00 00 00 00 00 00 00 00 
D (95769) wpa:   key_id (reserved) - hexdump(len=8):
D (95774) wpa: 00 00 00 00 00 00 00 00 
D (95778) wpa:   key_mic - hexdump(len=16):
D (95782) wpa: 97 61 c9 b8 f3 ac a4 50 12 e7 b6 cd 53 74 65 8b 
D (95788) wpa: RSN: encrypted key data - hexdump(len=56):
D (95793) wpa: 13 ef 57 65 0a 41 ab 85 85 38 56 35 aa d9 2b 21 
D (95799) wpa: 15 eb 78 ad a9 cb 0e 19 6f 94 f9 21 0c 99 06 63 
D (95805) wpa: a3 a1 b0 9c 44 d1 82 8c 31 fc 3d 28 b8 8a be 3b 
D (95811) wpa: f3 d1 77 e4 ad 8d 4e 9e 
D (95816) wpa: WPA: decrypted EAPOL-Key key data - hexdump(len=48):
D (95822) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (95828) wpa: 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 21 f8 
D (95834) wpa: 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e dd 00 
D (95840) wpa: WPA 3/4-Way Handshake
D (95843) wpa: WPA: RSN IE in EAPOL-Key - hexdump(len=22):
D (95849) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (95855) wpa: 00 0f ac 02 0c 00 
D (95858) wpa: WPA: GTK in EAPOL-Key - hexdump(len=24):
D (95863) wpa: dd 16 00 0f ac 01 01 00 21 f8 03 98 86 7b 8a 79 
D (95869) wpa: d0 33 2a c5 cd a0 6f 3e 
D (95873) wpa: WPA: IE KeyData - hexdump(len=48):
D (95878) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (95884) wpa: 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 21 f8 
D (95890) wpa: 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e dd 00 
D (95896) wpa: WPA: RSC - hexdump(len=8):
D (95900) wpa: 00 00 00 00 00 00 00 00 
D (95904) wpa: RSN: received GTK in pairwise handshake - hexdump(len=18):
D (95911) wpa: 01 00 21 f8 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 
D (95917) wpa: 6f 3e 
D (95919) wpa: tx 4/4 txcb_flags=8192
D (95923) wpa: WPA Send EAPOL-Key 4/4
D (95927) wpa: WPA: KCK - hexdump(len=16):
D (95931) wpa: e5 de 1d 2d e4 14 5f ec 9d d5 c8 3b c5 61 56 cf 
D (95937) wpa: WPA: Derived Key MIC - hexdump(len=16):
D (95942) wpa: 66 88 03 30 c2 7c 71 ef b6 3e c1 68 f1 ed 12 7b 
D (95949) wpa: IEEE 802.1X RX: version=2 type=3 length=151
D (95955) wpa:   EAPOL-Key type=2
D (95957) wpa:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
D (95966) wpa:   key_length=16 key_data_length=56
D (95970) wpa:   replay_counter - hexdump(len=8):
D (95975) wpa: 00 00 00 00 00 00 00 04 
D (95979) wpa:   key_nonce - hexdump(len=32):
D (95984) wpa: 99 30 10 72 34 15 6c e2 cd 2b c6 d4 3d 57 c3 00 
D (95990) wpa: 55 57 b6 8b e0 51 8c 94 29 00 a6 7d c7 dd d9 45 
D (95995) wpa:   key_iv - hexdump(len=16):
D (96000) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (96006) wpa:   key_rsc - hexdump(len=8):
D (96010) wpa: 00 00 00 00 00 00 00 00 
D (96014) wpa:   key_id (reserved) - hexdump(len=8):
D (96019) wpa: 00 00 00 00 00 00 00 00 
D (96023) wpa:   key_mic - hexdump(len=16):
D (96027) wpa: c8 fb 7c 27 e9 7d 15 69 ff 83 29 8a 5d d0 09 5b 
D (96033) wpa: RSN: encrypted key data - hexdump(len=56):
D (96038) wpa: 13 ef 57 65 0a 41 ab 85 85 38 56 35 aa d9 2b 21 
D (96044) wpa: 15 eb 78 ad a9 cb 0e 19 6f 94 f9 21 0c 99 06 63 
D (96050) wpa: a3 a1 b0 9c 44 d1 82 8c 31 fc 3d 28 b8 8a be 3b 
D (96056) wpa: f3 d1 77 e4 ad 8d 4e 9e 
D (96061) wpa: WPA: decrypted EAPOL-Key key data - hexdump(len=48):
D (96067) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (96073) wpa: 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 21 f8 
D (96079) wpa: 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e dd 00 
D (96084) wpa: WPA 3/4-Way Handshake
D (96088) wpa: WPA: RSN IE in EAPOL-Key - hexdump(len=22):
D (96094) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (96100) wpa: 00 0f ac 02 0c 00 
D (96103) wpa: WPA: GTK in EAPOL-Key - hexdump(len=24):
D (96108) wpa: dd 16 00 0f ac 01 01 00 21 f8 03 98 86 7b 8a 79 
D (96114) wpa: d0 33 2a c5 cd a0 6f 3e 
D (96118) wpa: WPA: IE KeyData - hexdump(len=48):
D (96123) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (96129) wpa: 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 21 f8 
D (96135) wpa: 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e dd 00 
D (96141) wpa: WPA: RSC - hexdump(len=8):
D (96145) wpa: 00 00 00 00 00 00 00 00 
D (96149) wpa: RSN: received GTK in pairwise handshake - hexdump(len=18):
D (96156) wpa: 01 00 21 f8 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 
D (96162) wpa: 6f 3e 
D (96164) wpa: tx 4/4 txcb_flags=8192
D (96168) wpa: WPA Send EAPOL-Key 4/4
D (96172) wpa: WPA: KCK - hexdump(len=16):
D (96176) wpa: e5 de 1d 2d e4 14 5f ec 9d d5 c8 3b c5 61 56 cf 
D (96182) wpa: WPA: Derived Key MIC - hexdump(len=16):
D (96187) wpa: 95 70 1c 9c 99 70 ef d1 03 fa b9 7b e8 e2 31 97 
D (96321) wpa: 2/4 txcb, flags=8192, txfail 0
D (96462) wpa: 2/4 txcb, flags=8192, txfail 0
D (96626) wpa: WPA: Installing PTK to the driver.
D (96627) wpa: WPA: Group Key - hexdump(len=16):
D (96627) wpa: 21 f8 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e 
D (96631) wpa: WPA: Judge GTK: (keyidx=1 len=16).
D (96636) wpa: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16).
D (96643) wpa: WPA: RSC - hexdump(len=6):
D (96647) wpa: 00 00 00 00 00 00 
D (96650) wpa: WPA: Key negotiation completed with ac:15:a2:4e:6b:47 [PTK=CCMP GTK=CCMP]

I (96658) wifi:connected with IGS-MESH, aid = 2, channel 3, 40U, bssid = ac:15:a2:4e:6b:47
I (96666) wifi:security: WPA2-PSK, phy: bgn, rssi: -76
D (96671) wifi:remove all except ac:15:a2:4e:6b:47 from rc list
D (96677) wifi:clear blacklist
D (96680) wifi:filter: set rx policy=7
I (96683) wifi:pm start, type: 0

I (96686) wifi:set rx beacon pti, rx_bcn_pti: 0, bcn_timeout: 25000, mt_pti: 0, mt_time: 10000
D (96695) wifi:Send sta connected event
D (96698) wifi:connect status 1 -> 5
D (96701) wifi:obss scan is disabled
D (96705) wifi:start obss scan: obss scan is stopped
I (96710) wifi:AP's beacon interval = 102400 us, DTIM period = 1
D (96716) event: running post WIFI_EVENT:4 with handler 0x4205d79c and context 0x3fcba160 on loop 0x3fcb38dc
0x4205d79c: wifi_default_action_sta_connected at /home/axel/esp/esp-idf/components/esp_wifi/src/wifi_default.c:85

D (96725) esp_netif_handlers: esp_netif action connected with netif0x3fcba290 from event_id=4
D (96734) esp_netif_lwip: check: remote, if=0x3fcba290 fn=0x4203b55c
0x4203b55c: esp_netif_up_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:1648

D (96740) esp_netif_lwip: esp_netif_up_api esp_netif:0x3fcba290
D (96746) esp_netif_lwip: check: local, if=0x3fcba290 fn=0x4203be6c
0x4203be6c: esp_netif_update_default_netif_lwip at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:317

D (96752) esp_netif_lwip: esp_netif_update_default_netif_lwip 0x3fcba290
D (96759) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (96765) esp_netif_lwip: check: remote, if=0x3fcba290 fn=0x4203b97c
0x4203b97c: esp_netif_dhcpc_start_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:1440

D (96771) esp_netif_lwip: esp_netif_dhcpc_start_api esp_netif:0x3fcba290
D (96778) esp_netif_lwip: esp_netif_start_ip_lost_timer esp_netif:0x3fcba290
D (96785) esp_netif_lwip: if0x3fcba290 start ip lost tmr: already started
D (96792) esp_netif_lwip: starting dhcp client
D (96797) wifi:D (96797) esp_netif_lwip: call api in lwip: ret=0x0, give sem
eb is dhcp or dns sport = 68, dport = 67
D (96808) event: running post WIFI_EVENT:4 with handler 0x420114c4 and context 0x3fcba3c4 on loop 0x3fcb38dc

I (96817) net_utils: STA connected
I (97060) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
D (97297) wifi:eb is dhcp or dns sport = 68, dport = 67
D (98297) wifi:eb is dhcp or dns sport = 68, dport = 67
D (100025) wifi:recv deauth, reason=0x22
I (100026) wifi:state: run -> init (22c0)
D (100026) wifi:stop beacon and connect timers
D (100026) wifi:recv deauth/disassoc
D (100029) wifi:connect status 5 -> 4
D (100033) wifi:sta leave
I (100035) wifi:pm stop, total sleep time: 0 us / 3348872 us

D (100041) wifi:stop CSA timer
I (100043) wifi:<ba-del>idx:0, tid:7
D (100047) wifi:remove ac:15:a2:4e:6b:47 from rc list
I (100051) wifi:new:<3,0>, old:<3,1>, ap:<255,255>, sta:<3,1>, prof:1
D (100058) wifi:filter: set rx policy=8
D (100061) wifi:Send disconnect event, reason=34, AP number=0
D (100067) event: running post WIFI_EVENT:41 with handler 0x420114c4 and context 0x3fcba3c4 on loop 0x3fcb38dc

I (100077) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=3/old_snd=1, new_chan=3/new_snd=0
D (100086) event: running post WIFI_EVENT:5 with handler 0x4205d784 and context 0x3fcba19c on loop 0x3fcb38dc
0x4205d784: wifi_default_action_sta_disconnected at /home/axel/esp/esp-idf/components/esp_wifi/src/wifi_default.c:104

D (100096) esp_netif_handlers: esp_netif action disconnected with netif0x3fcba290 from event_id=5
D (100105) esp_netif_lwip: check: remote, if=0x3fcba290 fn=0x4203b904
0x4203b904: esp_netif_down_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:1674

D (100112) esp_netif_lwip: esp_netif_down_api esp_netif:0x3fcba290
D (100118) esp_netif_lwip: esp_netif_start_ip_lost_timer esp_netif:0x3fcba290
D (100125) esp_netif_lwip: if0x3fcba290 start ip lost tmr: already started
D (100132) esp_netif_lwip: check: local, if=0x3fcba290 fn=0x4203be6c
0x4203be6c: esp_netif_update_default_netif_lwip at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:317

D (100138) esp_netif_lwip: esp_netif_update_default_netif_lwip 0x3fcba290
D (100145) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (100151) event: running post WIFI_EVENT:5 with handler 0x420114c4 and context 0x3fcba3c4 on loop 0x3fcb38dc

I (100161) net_utils: Disconnect reason: 34, rssi=-72
D (100167) esp_netif_lwip: check: remote, if=0x3fcb4f54 fn=0x4203a9f0
0x4203a9f0: get_handle_from_ifkey_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:795

D (100173) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (100179) esp_netif_lwip: check: remote, if=0x3fcb4f54 fn=0x4203a9f0
0x4203a9f0: get_handle_from_ifkey_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:795

D (100186) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (100192) esp_netif_lwip: check: remote, if=0x3fcb4f54 fn=0x4203a9f0
0x4203a9f0: get_handle_from_ifkey_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:795

D (100198) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (100204) esp_netif_lwip: check: remote, if=0x3fcb4f54 fn=0x4203a9f0
0x4203a9f0: get_handle_from_ifkey_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:795

D (100211) esp_netif_lwip: call api in lwip: ret=0x0, give sem
I (100216) net_utils: Retry connecting AP: IGS-MESH, delay=0 sec
D (100224) wifi:Start wifi connect
D (100226) wifi:connect status 4 -> 0
D (100230) wifi:connect chan=0
D (100232) wifi:first chan=3
D (100235) wifi:connect status 0 -> 1
D (100238) wifi:filter: set rx policy=3
D (100242) wifi:clear scan ap list
D (100245) wifi:start scan: type=0x50f, priority=2, cb=0x42094e18, arg=0x0, ss_state=0x1, time=100250963, index=0
0x42094e18: cnx_start_handoff_cb at ??:?

D (100255) wifi:perform scan: ss_state=0x9, chan<3,0>, dur<0,120>
D (100272) wifi:rsn valid: gcipher=3 ucipher=3 akm=5 mac=ac:15:a2:4e:6b:47
D (100274) wifi:profile match: ss_state=0x7
D (100291) wifi:rsn valid: gcipher=3 ucipher=3 akm=5 mac=ac:15:a2:4e:6b:47
D (100291) wifi:profile match: ss_state=0x7
D (100381) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (100382) wifi:perform scan: ss_state=0xd, chan<1,0>, dur<0,120>
D (100503) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (100503) wifi:perform scan: ss_state=0xd, chan<2,0>, dur<0,120>
D (100624) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (100625) wifi:perform scan: ss_state=0xd, chan<4,0>, dur<0,120>
D (100746) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (100746) wifi:perform scan: ss_state=0xd, chan<5,0>, dur<0,120>
D (100867) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (100868) wifi:perform scan: ss_state=0xd, chan<6,0>, dur<0,120>
D (100988) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (100989) wifi:perform scan: ss_state=0xd, chan<7,0>, dur<0,120>
D (101110) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (101110) wifi:perform scan: ss_state=0xd, chan<8,0>, dur<0,120>
D (101231) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (101232) wifi:perform scan: ss_state=0xd, chan<9,0>, dur<0,120>
D (101353) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (101353) wifi:perform scan: ss_state=0xd, chan<10,0>, dur<0,120>
D (101474) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (101475) wifi:perform scan: ss_state=0xd, chan<11,0>, dur<0,120>
D (101596) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (101596) wifi:perform scan: ss_state=0xd, chan<12,0>, dur<360,360>
D (101957) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (101957) wifi:perform scan: ss_state=0xd, chan<13,0>, dur<360,360>
D (102318) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (102318) wifi:perform scan: ss_state=0xd, chan<14,0>, dur<360,360>
D (102679) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (102680) wifi:filter: set rx policy=4
D (102680) wifi:first chan=1
D (102680) wifi:handoff_cb: status=0
D (102683) wifi:ap found, mac=ac:15:a2:4e:6b:47
D (102687) wifi:going for connection with bssid=ac:15:a2:4e:6b:47
D (102693) wifi:new_bss=0x3fca34e0, cur_bss=0x0, new_chan=<3,1>, cur_chan=3
D (102700) wifi:filter: set rx policy=5
D (102703) wpa: WPA: set AP RSNXE - hexdump(len=0):
D (102708) wpa:  [NULL]
I (102711) wifi:new:<3,1>, old:<3,0>, ap:<255,255>, sta:<3,1>, prof:1
D (102717) wifi:connect_op: status=0, auth=5, cipher=3 
D (102722) wifi:auth mode is not none
D (102725) wifi:connect_bss: auth=1, reconnect=0
I (102729) wifi:state: init -> auth (b0)
D (102733) wifi:start 1s AUTH timer
D (102736) wifi:clear scan ap list
D (102740) event: running post WIFI_EVENT:41 with handler 0x420114c4 and context 0x3fcba3c4 on loop 0x3fcb38dc

I (102750) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=3/old_snd=0, new_chan=3/new_snd=1
D (102762) wifi:recv auth: seq=2, status=0
I (102763) wifi:state: auth -> assoc (0)
D (102767) wifi:restart connect 1s timer for assoc
D (102798) wifi:recv assoc: type=0x10
D (102799) wifi:filter: set rx policy=6
I (102799) wifi:state: assoc -> run (10)
D (102799) wifi:start 10s connect timer for 4 way handshake
D (102803) wpa: WPA: Association event - clear replay counter
D (102809) wpa: WPA: Clear old PTK
D (102812) wpa: IEEE 802.1X RX: version=2 type=3 length=95
D (102818) wpa:   EAPOL-Key type=2
D (102821) wpa:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
D (102828) wpa:   key_length=16 key_data_length=0
D (102833) wpa:   replay_counter - hexdump(len=8):
D (102837) wpa: 00 00 00 00 00 00 00 01 
D (102841) wpa:   key_nonce - hexdump(len=32):
D (102846) wpa: 1c 9f e0 f2 67 cc 58 37 d9 36 98 e9 16 c2 f0 21 
D (102852) wpa: c4 16 9f d4 d5 42 ef 83 2d 3a 95 d1 0a e0 1f 44 
D (102858) wpa:   key_iv - hexdump(len=16):
D (102862) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (102868) wpa:   key_rsc - hexdump(len=8):
D (102873) wpa: 00 00 00 00 00 00 00 00 
D (102877) wpa:   key_id (reserved) - hexdump(len=8):
D (102882) wpa: 00 00 00 00 00 00 00 00 
D (102886) wpa:   key_mic - hexdump(len=16):
D (102890) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (102896) wpa: WPA 1/4-Way Handshake
D (102900) wpa: RSN: msg 1/4 key data - hexdump(len=0):
D (102905) wpa: WPA: Renewed SNonce - hexdump(len=32):
D (102910) wpa: 67 49 a4 61 93 f7 24 e1 a7 cc f4 ef 16 3e 00 a3 
D (102917) wpa: 83 8c b2 2a 2a a6 c5 bb fa 2c f7 eb 7b fa cd 8b 
D (102923) wpa: WPA: PTK derivation - A1=dc:da:0c:7c:d8:c0 A2=ac:15:a2:4e:6b:47

D (102930) wpa: WPA: PTK - hexdump(len=48):
D (102934) wpa: 2f 57 0f 61 56 f5 37 74 45 11 d2 80 35 fa 2f 3f 
D (102940) wpa: d5 5b e7 cb 28 69 d1 fa 3a 3d 5c e7 8d f2 c0 77 
D (102947) wpa: 47 08 2f 65 5e 7d 0f 1f f5 6f 0f 37 1b 18 78 57 
D (102953) wpa: WPA: KCK - hexdump(len=16):
D (102957) wpa: 2f 57 0f 61 56 f5 37 74 45 11 d2 80 35 fa 2f 3f 
D (102963) wpa: WPA: KEK - hexdump(len=16):
D (102967) wpa: d5 5b e7 cb 28 69 d1 fa 3a 3d 5c e7 8d f2 c0 77 
D (102973) wpa: WPA: TK - hexdump(len=16):
D (102977) wpa: 47 08 2f 65 5e 7d 0f 1f f5 6f 0f 37 1b 18 78 57 
D (102984) wpa: WPA Send EAPOL-Key 2/4
D (102988) wpa: WPA: KCK - hexdump(len=16):
D (102992) wpa: 2f 57 0f 61 56 f5 37 74 45 11 d2 80 35 fa 2f 3f 
D (102998) wpa: WPA: Derived Key MIC - hexdump(len=16):
D (103003) wpa: 68 1f b2 12 b6 e7 07 83 4e 2e 1e 48 ed 19 1f 71 
D (103010) wpa: IEEE 802.1X RX: version=2 type=3 length=95
D (103015) wpa:   EAPOL-Key type=2
D (103018) wpa:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
D (103024) wpa:   key_length=16 key_data_length=0
D (103029) wpa:   replay_counter - hexdump(len=8):
D (103034) wpa: 00 00 00 00 00 00 00 02 
D (103038) wpa:   key_nonce - hexdump(len=32):
D (103043) wpa: 1c 9f e0 f2 67 cc 58 37 d9 36 98 e9 16 c2 f0 21 
D (103049) wpa: c4 16 9f d4 d5 42 ef 83 2d 3a 95 d1 0a e0 1f 44 
D (103055) wpa:   key_iv - hexdump(len=16):
D (103059) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (103065) wpa:   key_rsc - hexdump(len=8):
D (103069) wpa: 00 00 00 00 00 00 00 00 
D (103073) wpa:   key_id (reserved) - hexdump(len=8):
D (103078) wpa: 00 00 00 00 00 00 00 00 
D (103082) wpa:   key_mic - hexdump(len=16):
D (103087) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (103093) wpa: WPA 1/4-Way Handshake
D (103097) wpa: RSN: msg 1/4 key data - hexdump(len=0):
D (103103) wpa: WPA: PTK derivation - A1=dc:da:0c:7c:d8:c0 A2=ac:15:a2:4e:6b:47

D (103110) wpa: WPA: PTK - hexdump(len=48):
D (103114) wpa: 2f 57 0f 61 56 f5 37 74 45 11 d2 80 35 fa 2f 3f 
D (103120) wpa: d5 5b e7 cb 28 69 d1 fa 3a 3d 5c e7 8d f2 c0 77 
D (103126) wpa: 47 08 2f 65 5e 7d 0f 1f f5 6f 0f 37 1b 18 78 57 
D (103132) wpa: WPA: KCK - hexdump(len=16):
D (103136) wpa: 2f 57 0f 61 56 f5 37 74 45 11 d2 80 35 fa 2f 3f 
D (103142) wpa: WPA: KEK - hexdump(len=16):
D (103147) wpa: d5 5b e7 cb 28 69 d1 fa 3a 3d 5c e7 8d f2 c0 77 
D (103153) wpa: WPA: TK - hexdump(len=16):
D (103157) wpa: 47 08 2f 65 5e 7d 0f 1f f5 6f 0f 37 1b 18 78 57 
D (103163) wpa: WPA Send EAPOL-Key 2/4
D (103167) wpa: WPA: KCK - hexdump(len=16):
D (103171) wpa: 2f 57 0f 61 56 f5 37 74 45 11 d2 80 35 fa 2f 3f 
D (103177) wpa: WPA: Derived Key MIC - hexdump(len=16):
D (103182) wpa: 81 94 38 15 4b 3a 5c 5c bf 33 e9 26 e8 62 95 a1 
D (103216) wpa: IEEE 802.1X RX: version=2 type=3 length=151
D (103217) wpa:   EAPOL-Key type=2
D (103218) wpa:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
D (103223) wpa:   key_length=16 key_data_length=56
D (103227) wpa:   replay_counter - hexdump(len=8):
D (103232) wpa: 00 00 00 00 00 00 00 03 
D (103236) wpa:   key_nonce - hexdump(len=32):
D (103241) wpa: 1c 9f e0 f2 67 cc 58 37 d9 36 98 e9 16 c2 f0 21 
D (103247) wpa: c4 16 9f d4 d5 42 ef 83 2d 3a 95 d1 0a e0 1f 44 
D (103253) wpa:   key_iv - hexdump(len=16):
D (103257) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (103263) wpa:   key_rsc - hexdump(len=8):
D (103268) wpa: 00 00 00 00 00 00 00 00 
D (103272) wpa:   key_id (reserved) - hexdump(len=8):
D (103277) wpa: 00 00 00 00 00 00 00 00 
D (103281) wpa:   key_mic - hexdump(len=16):
D (103285) wpa: 96 b2 15 c2 da 6d bf f7 4c 19 aa 63 e6 16 2b 2f 
D (103291) wpa: RSN: encrypted key data - hexdump(len=56):
D (103297) wpa: 1d 04 9d 12 8c e5 c8 a0 22 68 56 8b 6a 78 a3 c0 
D (103303) wpa: d0 18 36 45 6e bb 91 f7 d8 f0 52 aa 21 83 ee a0 
D (103309) wpa: 31 f7 4c f1 4e 0c 71 c6 3f 6c 0f 3d d3 10 99 e8 
D (103315) wpa: b1 a3 bd 5a 2b b7 d9 c8 
D (103319) wpa: WPA: decrypted EAPOL-Key key data - hexdump(len=48):
D (103325) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (103331) wpa: 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 21 f8 
D (103337) wpa: 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e dd 00 
D (103344) wpa: WPA 3/4-Way Handshake
D (103347) wpa: WPA: RSN IE in EAPOL-Key - hexdump(len=22):
D (103353) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (103359) wpa: 00 0f ac 02 0c 00 
D (103362) wpa: WPA: GTK in EAPOL-Key - hexdump(len=24):
D (103368) wpa: dd 16 00 0f ac 01 01 00 21 f8 03 98 86 7b 8a 79 
D (103374) wpa: d0 33 2a c5 cd a0 6f 3e 
D (103378) wpa: WPA: IE KeyData - hexdump(len=48):
D (103383) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (103389) wpa: 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 21 f8 
D (103395) wpa: 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e dd 00 
D (103401) wpa: WPA: RSC - hexdump(len=8):
D (103405) wpa: 00 00 00 00 00 00 00 00 
D (103409) wpa: RSN: received GTK in pairwise handshake - hexdump(len=18):
D (103416) wpa: 01 00 21 f8 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 
D (103422) wpa: 6f 3e 
D (103425) wpa: tx 4/4 txcb_flags=8192
D (103428) wpa: WPA Send EAPOL-Key 4/4
D (103433) wpa: WPA: KCK - hexdump(len=16):
D (103437) wpa: 2f 57 0f 61 56 f5 37 74 45 11 d2 80 35 fa 2f 3f 
D (103443) wpa: WPA: Derived Key MIC - hexdump(len=16):
D (103448) wpa: cd 96 25 e1 6b 27 ab 23 1b 95 12 4c 05 92 5a e3 
D (103455) wpa: IEEE 802.1X RX: version=2 type=3 length=151
D (103461) wpa:   EAPOL-Key type=2
D (103463) wpa:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
D (103472) wpa:   key_length=16 key_data_length=56
D (103477) wpa:   replay_counter - hexdump(len=8):
D (103482) wpa: 00 00 00 00 00 00 00 04 
D (103485) wpa:   key_nonce - hexdump(len=32):
D (103490) wpa: 1c 9f e0 f2 67 cc 58 37 d9 36 98 e9 16 c2 f0 21 
D (103496) wpa: c4 16 9f d4 d5 42 ef 83 2d 3a 95 d1 0a e0 1f 44 
D (103502) wpa:   key_iv - hexdump(len=16):
D (103506) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (103512) wpa:   key_rsc - hexdump(len=8):
D (103517) wpa: 00 00 00 00 00 00 00 00 
D (103521) wpa:   key_id (reserved) - hexdump(len=8):
D (103526) wpa: 00 00 00 00 00 00 00 00 
D (103530) wpa:   key_mic - hexdump(len=16):
D (103534) wpa: 58 32 49 ef 2d e4 eb 3a c8 0f b6 69 a7 db a8 fd 
D (103540) wpa: RSN: encrypted key data - hexdump(len=56):
D (103546) wpa: 1d 04 9d 12 8c e5 c8 a0 22 68 56 8b 6a 78 a3 c0 
D (103552) wpa: d0 18 36 45 6e bb 91 f7 d8 f0 52 aa 21 83 ee a0 
D (103558) wpa: 31 f7 4c f1 4e 0c 71 c6 3f 6c 0f 3d d3 10 99 e8 
D (103564) wpa: b1 a3 bd 5a 2b b7 d9 c8 
D (103568) wpa: WPA: decrypted EAPOL-Key key data - hexdump(len=48):
D (103574) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (103581) wpa: 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 21 f8 
D (103587) wpa: 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e dd 00 
D (103593) wpa: WPA 3/4-Way Handshake
D (103596) wpa: WPA: RSN IE in EAPOL-Key - hexdump(len=22):
D (103602) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (103608) wpa: 00 0f ac 02 0c 00 
D (103612) wpa: WPA: GTK in EAPOL-Key - hexdump(len=24):
D (103617) wpa: dd 16 00 0f ac 01 01 00 21 f8 03 98 86 7b 8a 79 
D (103623) wpa: d0 33 2a c5 cd a0 6f 3e 
D (103627) wpa: WPA: IE KeyData - hexdump(len=48):
D (103632) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (103638) wpa: 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 21 f8 
D (103644) wpa: 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e dd 00 
D (103650) wpa: WPA: RSC - hexdump(len=8):
D (103654) wpa: 00 00 00 00 00 00 00 00 
D (103658) wpa: RSN: received GTK in pairwise handshake - hexdump(len=18):
D (103665) wpa: 01 00 21 f8 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 
D (103671) wpa: 6f 3e 
D (103674) wpa: tx 4/4 txcb_flags=8192
D (103677) wpa: WPA Send EAPOL-Key 4/4
D (103682) wpa: WPA: KCK - hexdump(len=16):
D (103686) wpa: 2f 57 0f 61 56 f5 37 74 45 11 d2 80 35 fa 2f 3f 
D (103692) wpa: WPA: Derived Key MIC - hexdump(len=16):
D (103697) wpa: 0b 6e f4 53 10 f1 15 9f 33 7e b9 c5 a0 29 b9 5d 
D (103763) wpa: 2/4 txcb, flags=8192, txfail 0
D (103907) wpa: 2/4 txcb, flags=8192, txfail 0
D (104024) wpa: WPA: Installing PTK to the driver.
D (104025) wpa: WPA: Group Key - hexdump(len=16):
D (104025) wpa: 21 f8 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e 
D (104029) wpa: WPA: Judge GTK: (keyidx=1 len=16).
D (104034) wpa: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16).
D (104041) wpa: WPA: RSC - hexdump(len=6):
D (104045) wpa: 00 00 00 00 00 00 
D (104048) wpa: WPA: Key negotiation completed with ac:15:a2:4e:6b:47 [PTK=CCMP GTK=CCMP]

I (104057) wifi:connected with IGS-MESH, aid = 2, channel 3, 40U, bssid = ac:15:a2:4e:6b:47
I (104065) wifi:security: WPA2-PSK, phy: bgn, rssi: -75
D (104070) wifi:remove all except ac:15:a2:4e:6b:47 from rc list
D (104075) wifi:clear blacklist
D (104078) wifi:filter: set rx policy=7
I (104082) wifi:pm start, type: 0

I (104085) wifi:set rx beacon pti, rx_bcn_pti: 0, bcn_timeout: 25000, mt_pti: 0, mt_time: 10000
D (104094) wifi:Send sta connected event
D (104097) wifi:connect status 1 -> 5
D (104100) wifi:obss scan is disabled
D (104104) wifi:start obss scan: obss scan is stopped
I (104109) wifi:AP's beacon interval = 102400 us, DTIM period = 1
D (104115) event: running post WIFI_EVENT:4 with handler 0x4205d79c and context 0x3fcba160 on loop 0x3fcb38dc
0x4205d79c: wifi_default_action_sta_connected at /home/axel/esp/esp-idf/components/esp_wifi/src/wifi_default.c:85

D (104125) esp_netif_handlers: esp_netif action connected with netif0x3fcba290 from event_id=4
D (104133) esp_netif_lwip: check: remote, if=0x3fcba290 fn=0x4203b55c
0x4203b55c: esp_netif_up_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:1648

D (104140) esp_netif_lwip: esp_netif_up_api esp_netif:0x3fcba290
D (104146) esp_netif_lwip: check: local, if=0x3fcba290 fn=0x4203be6c
0x4203be6c: esp_netif_update_default_netif_lwip at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:317

D (104152) esp_netif_lwip: esp_netif_update_default_netif_lwip 0x3fcba290
D (104159) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (104165) esp_netif_lwip: check: remote, if=0x3fcba290 fn=0x4203b97c
0x4203b97c: esp_netif_dhcpc_start_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:1440

D (104171) esp_netif_lwip: esp_netif_dhcpc_start_api esp_netif:0x3fcba290
D (104178) esp_netif_lwip: esp_netif_start_ip_lost_timer esp_netif:0x3fcba290
D (104185) esp_netif_lwip: if0x3fcba290 start ip lost tmr: already started
D (104192) esp_netif_lwip: starting dhcp client
D (104197) wifi:D (104197) esp_netif_lwip: call api in lwip: ret=0x0, give sem
eb is dhcp or dns sport = 68, dport = 67
D (104208) event: running post WIFI_EVENT:4 with handler 0x420114c4 and context 0x3fcba3c4 on loop 0x3fcb38dc

I (104218) net_utils: STA connected
I (104330) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
D (104697) wifi:eb is dhcp or dns sport = 68, dport = 67
D (105697) wifi:eb is dhcp or dns sport = 68, dport = 67
D (107302) wifi:recv deauth, reason=0x22
I (107303) wifi:state: run -> init (22c0)
D (107303) wifi:stop beacon and connect timers
D (107303) wifi:recv deauth/disassoc
D (107306) wifi:connect status 5 -> 4
D (107310) wifi:sta leave
I (107312) wifi:pm stop, total sleep time: 0 us / 3227346 us

D (107318) wifi:stop CSA timer
I (107321) wifi:<ba-del>idx:0, tid:7
D (107324) wifi:remove ac:15:a2:4e:6b:47 from rc list
I (107329) wifi:new:<3,0>, old:<3,1>, ap:<255,255>, sta:<3,1>, prof:1
D (107336) wifi:filter: set rx policy=8
D (107338) wifi:Send disconnect event, reason=34, AP number=0
D (107344) event: running post WIFI_EVENT:41 with handler 0x420114c4 and context 0x3fcba3c4 on loop 0x3fcb38dc

I (107354) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=3/old_snd=1, new_chan=3/new_snd=0
D (107363) event: running post WIFI_EVENT:5 with handler 0x4205d784 and context 0x3fcba19c on loop 0x3fcb38dc
0x4205d784: wifi_default_action_sta_disconnected at /home/axel/esp/esp-idf/components/esp_wifi/src/wifi_default.c:104

D (107373) esp_netif_handlers: esp_netif action disconnected with netif0x3fcba290 from event_id=5
D (107382) esp_netif_lwip: check: remote, if=0x3fcba290 fn=0x4203b904
0x4203b904: esp_netif_down_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:1674

D (107389) esp_netif_lwip: esp_netif_down_api esp_netif:0x3fcba290
D (107395) esp_netif_lwip: esp_netif_start_ip_lost_timer esp_netif:0x3fcba290
D (107402) esp_netif_lwip: if0x3fcba290 start ip lost tmr: already started
D (107409) esp_netif_lwip: check: local, if=0x3fcba290 fn=0x4203be6c
0x4203be6c: esp_netif_update_default_netif_lwip at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:317

D (107416) esp_netif_lwip: esp_netif_update_default_netif_lwip 0x3fcba290
D (107422) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (107428) event: running post WIFI_EVENT:5 with handler 0x420114c4 and context 0x3fcba3c4 on loop 0x3fcb38dc

I (107438) net_utils: Disconnect reason: 34, rssi=-71
D (107444) esp_netif_lwip: check: remote, if=0x3fcb4f54 fn=0x4203a9f0
0x4203a9f0: get_handle_from_ifkey_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:795

D (107451) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (107457) esp_netif_lwip: check: remote, if=0x3fcb4f54 fn=0x4203a9f0
0x4203a9f0: get_handle_from_ifkey_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:795

D (107463) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (107469) esp_netif_lwip: check: remote, if=0x3fcb4f54 fn=0x4203a9f0
0x4203a9f0: get_handle_from_ifkey_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:795

D (107475) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (107481) esp_netif_lwip: check: remote, if=0x3fcb4f54 fn=0x4203a9f0
0x4203a9f0: get_handle_from_ifkey_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:795

D (107488) esp_netif_lwip: call api in lwip: ret=0x0, give sem
I (107494) net_utils: Retry connecting AP: IGS-MESH, delay=0 sec
D (107501) wifi:Start wifi connect
D (107504) wifi:connect status 4 -> 0
D (107507) wifi:connect chan=0
D (107510) wifi:first chan=3
D (107512) wifi:connect status 0 -> 1
D (107516) wifi:filter: set rx policy=3
D (107519) wifi:clear scan ap list
D (107522) wifi:start scan: type=0x50f, priority=2, cb=0x42094e18, arg=0x0, ss_state=0x1, time=107528219, index=0
0x42094e18: cnx_start_handoff_cb at ??:?

D (107532) wifi:perform scan: ss_state=0x9, chan<3,0>, dur<0,120>
D (107552) wifi:rsn valid: gcipher=3 ucipher=3 akm=5 mac=ac:15:a2:4e:6b:47
D (107553) wifi:profile match: ss_state=0x7
D (107561) wifi:rsn valid: gcipher=3 ucipher=3 akm=5 mac=ac:15:a2:4e:6b:47
D (107562) wifi:profile match: ss_state=0x7
D (107659) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (107659) wifi:perform scan: ss_state=0xd, chan<1,0>, dur<0,120>
D (107780) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (107780) wifi:perform scan: ss_state=0xd, chan<2,0>, dur<0,120>
D (107901) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (107902) wifi:perform scan: ss_state=0xd, chan<4,0>, dur<0,120>
D (108023) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (108023) wifi:perform scan: ss_state=0xd, chan<5,0>, dur<0,120>
D (108144) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (108145) wifi:perform scan: ss_state=0xd, chan<6,0>, dur<0,120>
D (108266) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (108266) wifi:perform scan: ss_state=0xd, chan<7,0>, dur<0,120>
D (108387) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (108387) wifi:perform scan: ss_state=0xd, chan<8,0>, dur<0,120>
D (108508) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (108509) wifi:perform scan: ss_state=0xd, chan<9,0>, dur<0,120>
D (108630) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (108630) wifi:perform scan: ss_state=0xd, chan<10,0>, dur<0,120>
D (108751) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (108752) wifi:perform scan: ss_state=0xd, chan<11,0>, dur<0,120>
D (108873) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (108873) wifi:perform scan: ss_state=0xd, chan<12,0>, dur<360,360>
D (109234) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (109234) wifi:perform scan: ss_state=0xd, chan<13,0>, dur<360,360>
D (109595) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (109595) wifi:perform scan: ss_state=0xd, chan<14,0>, dur<360,360>
D (109956) wifi:scan end: arg=0x0, status=0, ss_state=0x7
D (109957) wifi:filter: set rx policy=4
D (109957) wifi:first chan=1
D (109957) wifi:handoff_cb: status=0
D (109960) wifi:ap found, mac=ac:15:a2:4e:6b:47
D (109964) wifi:going for connection with bssid=ac:15:a2:4e:6b:47
D (109970) wifi:new_bss=0x3fca34e0, cur_bss=0x0, new_chan=<3,1>, cur_chan=3
D (109977) wifi:filter: set rx policy=5
D (109980) wpa: WPA: set AP RSNXE - hexdump(len=0):
D (109985) wpa:  [NULL]
I (109988) wifi:new:<3,1>, old:<3,0>, ap:<255,255>, sta:<3,1>, prof:1
D (109994) wifi:connect_op: status=0, auth=5, cipher=3 
D (109999) wifi:auth mode is not none
D (110002) wifi:connect_bss: auth=1, reconnect=0
I (110006) wifi:state: init -> auth (b0)
D (110010) wifi:start 1s AUTH timer
D (110013) wifi:clear scan ap list
D (110017) event: running post WIFI_EVENT:41 with handler 0x420114c4 and context 0x3fcba3c4 on loop 0x3fcb38dc

I (110027) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=3/old_snd=0, new_chan=3/new_snd=1
D (110030) wifi:recv auth: seq=2, status=0
I (110040) wifi:state: auth -> assoc (0)
D (110044) wifi:restart connect 1s timer for assoc
D (110056) wifi:recv assoc: type=0x10
D (110057) wifi:filter: set rx policy=6
I (110057) wifi:state: assoc -> run (10)
D (110059) wifi:start 10s connect timer for 4 way handshake
D (110064) wpa: WPA: Association event - clear replay counter
D (110070) wpa: WPA: Clear old PTK
D (110073) wpa: IEEE 802.1X RX: version=2 type=3 length=95
D (110079) wpa:   EAPOL-Key type=2
D (110082) wpa:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
D (110088) wpa:   key_length=16 key_data_length=0
D (110093) wpa:   replay_counter - hexdump(len=8):
D (110098) wpa: 00 00 00 00 00 00 00 01 
D (110102) wpa:   key_nonce - hexdump(len=32):
D (110107) wpa: 0d d2 b6 c1 cd 57 35 7b 78 db b7 23 c6 07 86 6b 
D (110113) wpa: d0 d3 7b 95 e4 59 07 c8 9b 05 47 25 96 28 74 47 
D (110119) wpa:   key_iv - hexdump(len=16):
D (110123) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (110129) wpa:   key_rsc - hexdump(len=8):
D (110133) wpa: 00 00 00 00 00 00 00 00 
D (110137) wpa:   key_id (reserved) - hexdump(len=8):
D (110142) wpa: 00 00 00 00 00 00 00 00 
D (110146) wpa:   key_mic - hexdump(len=16):
D (110151) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (110157) wpa: WPA 1/4-Way Handshake
D (110161) wpa: RSN: msg 1/4 key data - hexdump(len=0):
D (110166) wpa: WPA: Renewed SNonce - hexdump(len=32):
D (110171) wpa: 29 7f b2 2a ce 2e 78 b2 24 d0 fc cb 84 cb 93 13 
D (110177) wpa: 28 c5 7d f3 55 5c f8 88 54 e4 f1 75 a3 56 5f ac 
D (110184) wpa: WPA: PTK derivation - A1=dc:da:0c:7c:d8:c0 A2=ac:15:a2:4e:6b:47

D (110191) wpa: WPA: PTK - hexdump(len=48):
D (110195) wpa: 72 2c 9e 40 1c 12 d9 4b b0 46 8d 72 41 28 73 9d 
D (110201) wpa: 13 8a 67 78 59 9a 66 78 06 0f 87 d5 0b 64 76 91 
D (110207) wpa: c3 52 a8 56 b0 bc 0f 87 68 55 4e 05 02 86 16 e3 
D (110213) wpa: WPA: KCK - hexdump(len=16):
D (110218) wpa: 72 2c 9e 40 1c 12 d9 4b b0 46 8d 72 41 28 73 9d 
D (110224) wpa: WPA: KEK - hexdump(len=16):
D (110228) wpa: 13 8a 67 78 59 9a 66 78 06 0f 87 d5 0b 64 76 91 
D (110234) wpa: WPA: TK - hexdump(len=16):
D (110238) wpa: c3 52 a8 56 b0 bc 0f 87 68 55 4e 05 02 86 16 e3 
D (110244) wpa: WPA Send EAPOL-Key 2/4
D (110248) wpa: WPA: KCK - hexdump(len=16):
D (110252) wpa: 72 2c 9e 40 1c 12 d9 4b b0 46 8d 72 41 28 73 9d 
D (110258) wpa: WPA: Derived Key MIC - hexdump(len=16):
D (110264) wpa: 53 4b 50 62 dd d3 a3 57 a3 77 15 9d 31 35 ed 4b 
D (110271) wpa: IEEE 802.1X RX: version=2 type=3 length=95
D (110276) wpa:   EAPOL-Key type=2
D (110279) wpa:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
D (110285) wpa:   key_length=16 key_data_length=0
D (110290) wpa:   replay_counter - hexdump(len=8):
D (110295) wpa: 00 00 00 00 00 00 00 02 
D (110299) wpa:   key_nonce - hexdump(len=32):
D (110303) wpa: 0d d2 b6 c1 cd 57 35 7b 78 db b7 23 c6 07 86 6b 
D (110309) wpa: d0 d3 7b 95 e4 59 07 c8 9b 05 47 25 96 28 74 47 
D (110315) wpa:   key_iv - hexdump(len=16):
D (110320) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (110326) wpa:   key_rsc - hexdump(len=8):
D (110330) wpa: 00 00 00 00 00 00 00 00 
D (110334) wpa:   key_id (reserved) - hexdump(len=8):
D (110339) wpa: 00 00 00 00 00 00 00 00 
D (110343) wpa:   key_mic - hexdump(len=16):
D (110348) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (110354) wpa: WPA 1/4-Way Handshake
D (110357) wpa: RSN: msg 1/4 key data - hexdump(len=0):
D (110363) wpa: WPA: PTK derivation - A1=dc:da:0c:7c:d8:c0 A2=ac:15:a2:4e:6b:47

D (110370) wpa: WPA: PTK - hexdump(len=48):
D (110374) wpa: 72 2c 9e 40 1c 12 d9 4b b0 46 8d 72 41 28 73 9d 
D (110381) wpa: 13 8a 67 78 59 9a 66 78 06 0f 87 d5 0b 64 76 91 
D (110387) wpa: c3 52 a8 56 b0 bc 0f 87 68 55 4e 05 02 86 16 e3 
D (110393) wpa: WPA: KCK - hexdump(len=16):
D (110397) wpa: 72 2c 9e 40 1c 12 d9 4b b0 46 8d 72 41 28 73 9d 
D (110403) wpa: WPA: KEK - hexdump(len=16):
D (110407) wpa: 13 8a 67 78 59 9a 66 78 06 0f 87 d5 0b 64 76 91 
D (110413) wpa: WPA: TK - hexdump(len=16):
D (110417) wpa: c3 52 a8 56 b0 bc 0f 87 68 55 4e 05 02 86 16 e3 
D (110424) wpa: WPA Send EAPOL-Key 2/4
D (110428) wpa: WPA: KCK - hexdump(len=16):
D (110432) wpa: 72 2c 9e 40 1c 12 d9 4b b0 46 8d 72 41 28 73 9d 
D (110438) wpa: WPA: Derived Key MIC - hexdump(len=16):
D (110443) wpa: 1e ab 07 47 1f 7c 96 64 26 67 95 44 13 45 0f 63 
D (110455) wpa: IEEE 802.1X RX: version=2 type=3 length=151
D (110456) wpa:   EAPOL-Key type=2
D (110458) wpa:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
D (110467) wpa:   key_length=16 key_data_length=56
D (110472) wpa:   replay_counter - hexdump(len=8):
D (110477) wpa: 00 00 00 00 00 00 00 03 
D (110481) wpa:   key_nonce - hexdump(len=32):
D (110485) wpa: 0d d2 b6 c1 cd 57 35 7b 78 db b7 23 c6 07 86 6b 
D (110491) wpa: d0 d3 7b 95 e4 59 07 c8 9b 05 47 25 96 28 74 47 
D (110497) wpa:   key_iv - hexdump(len=16):
D (110501) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (110508) wpa:   key_rsc - hexdump(len=8):
D (110512) wpa: 00 00 00 00 00 00 00 00 
D (110516) wpa:   key_id (reserved) - hexdump(len=8):
D (110521) wpa: 00 00 00 00 00 00 00 00 
D (110525) wpa:   key_mic - hexdump(len=16):
D (110529) wpa: f3 87 9e 5d 74 11 1e f4 dc 1d 74 60 1d 0b 76 9b 
D (110535) wpa: RSN: encrypted key data - hexdump(len=56):
D (110541) wpa: 16 f7 1f e4 7b 30 d5 08 66 21 04 ff f2 64 9a 72 
D (110547) wpa: e0 6c 39 69 3a f8 2c 6e cb 40 c8 75 a1 8a ec ee 
D (110553) wpa: bd fd 5b 2a 77 d9 32 64 e3 83 96 22 ce 8c 88 b3 
D (110559) wpa: f6 91 c4 e1 7d 1d 83 bd 
D (110563) wpa: WPA: decrypted EAPOL-Key key data - hexdump(len=48):
D (110570) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (110576) wpa: 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 21 f8 
D (110582) wpa: 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e dd 00 
D (110588) wpa: WPA 3/4-Way Handshake
D (110591) wpa: WPA: RSN IE in EAPOL-Key - hexdump(len=22):
D (110597) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (110603) wpa: 00 0f ac 02 0c 00 
D (110607) wpa: WPA: GTK in EAPOL-Key - hexdump(len=24):
D (110612) wpa: dd 16 00 0f ac 01 01 00 21 f8 03 98 86 7b 8a 79 
D (110618) wpa: d0 33 2a c5 cd a0 6f 3e 
D (110622) wpa: WPA: IE KeyData - hexdump(len=48):
D (110627) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (110633) wpa: 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 21 f8 
D (110639) wpa: 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e dd 00 
D (110645) wpa: WPA: RSC - hexdump(len=8):
D (110649) wpa: 00 00 00 00 00 00 00 00 
D (110653) wpa: RSN: received GTK in pairwise handshake - hexdump(len=18):
D (110660) wpa: 01 00 21 f8 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 
D (110666) wpa: 6f 3e 
D (110669) wpa: tx 4/4 txcb_flags=8192
D (110673) wpa: WPA Send EAPOL-Key 4/4
D (110677) wpa: WPA: KCK - hexdump(len=16):
D (110681) wpa: 72 2c 9e 40 1c 12 d9 4b b0 46 8d 72 41 28 73 9d 
D (110687) wpa: WPA: Derived Key MIC - hexdump(len=16):
D (110692) wpa: f9 2d 11 58 1a 7e 90 58 1a 39 de 14 a1 86 22 e0 
D (110699) wpa: IEEE 802.1X RX: version=2 type=3 length=151
D (110705) wpa:   EAPOL-Key type=2
D (110707) wpa:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
D (110716) wpa:   key_length=16 key_data_length=56
D (110721) wpa:   replay_counter - hexdump(len=8):
D (110726) wpa: 00 00 00 00 00 00 00 04 
D (110730) wpa:   key_nonce - hexdump(len=32):
D (110734) wpa: 0d d2 b6 c1 cd 57 35 7b 78 db b7 23 c6 07 86 6b 
D (110740) wpa: d0 d3 7b 95 e4 59 07 c8 9b 05 47 25 96 28 74 47 
D (110746) wpa:   key_iv - hexdump(len=16):
D (110751) wpa: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
D (110757) wpa:   key_rsc - hexdump(len=8):
D (110761) wpa: 00 00 00 00 00 00 00 00 
D (110765) wpa:   key_id (reserved) - hexdump(len=8):
D (110770) wpa: 00 00 00 00 00 00 00 00 
D (110774) wpa:   key_mic - hexdump(len=16):
D (110778) wpa: 28 41 93 47 c1 1d 63 14 b2 99 74 46 57 04 3a 55 
D (110784) wpa: RSN: encrypted key data - hexdump(len=56):
D (110790) wpa: 16 f7 1f e4 7b 30 d5 08 66 21 04 ff f2 64 9a 72 
D (110796) wpa: e0 6c 39 69 3a f8 2c 6e cb 40 c8 75 a1 8a ec ee 
D (110802) wpa: bd fd 5b 2a 77 d9 32 64 e3 83 96 22 ce 8c 88 b3 
D (110808) wpa: f6 91 c4 e1 7d 1d 83 bd 
D (110813) wpa: WPA: decrypted EAPOL-Key key data - hexdump(len=48):
D (110819) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (110825) wpa: 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 21 f8 
D (110831) wpa: 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e dd 00 
D (110837) wpa: WPA 3/4-Way Handshake
D (110841) wpa: WPA: RSN IE in EAPOL-Key - hexdump(len=22):
D (110846) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (110852) wpa: 00 0f ac 02 0c 00 
D (110856) wpa: WPA: GTK in EAPOL-Key - hexdump(len=24):
D (110861) wpa: dd 16 00 0f ac 01 01 00 21 f8 03 98 86 7b 8a 79 
D (110867) wpa: d0 33 2a c5 cd a0 6f 3e 
D (110871) wpa: WPA: IE KeyData - hexdump(len=48):
D (110876) wpa: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 
D (110882) wpa: 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 21 f8 
D (110888) wpa: 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e dd 00 
D (110894) wpa: WPA: RSC - hexdump(len=8):
D (110898) wpa: 00 00 00 00 00 00 00 00 
D (110902) wpa: RSN: received GTK in pairwise handshake - hexdump(len=18):
D (110909) wpa: 01 00 21 f8 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 
D (110915) wpa: 6f 3e 
D (110918) wpa: tx 4/4 txcb_flags=8192
D (110922) wpa: WPA Send EAPOL-Key 4/4
D (110926) wpa: WPA: KCK - hexdump(len=16):
D (110930) wpa: 72 2c 9e 40 1c 12 d9 4b b0 46 8d 72 41 28 73 9d 
D (110936) wpa: WPA: Derived Key MIC - hexdump(len=16):
D (110941) wpa: 2b 57 0c da 2b ed 37 82 df 18 a8 cb 9d d4 19 75 
D (111058) wpa: 2/4 txcb, flags=8192, txfail 0
D (111143) wpa: 2/4 txcb, flags=8192, txfail 0
D (111189) wpa: WPA: Installing PTK to the driver.
D (111190) wpa: WPA: Group Key - hexdump(len=16):
D (111190) wpa: 21 f8 03 98 86 7b 8a 79 d0 33 2a c5 cd a0 6f 3e 
D (111194) wpa: WPA: Judge GTK: (keyidx=1 len=16).
D (111199) wpa: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16).
D (111206) wpa: WPA: RSC - hexdump(len=6):
D (111210) wpa: 00 00 00 00 00 00 
D (111214) wpa: WPA: Key negotiation completed with ac:15:a2:4e:6b:47 [PTK=CCMP GTK=CCMP]

I (111222) wifi:connected with IGS-MESH, aid = 2, channel 3, 40U, bssid = ac:15:a2:4e:6b:47
I (111230) wifi:security: WPA2-PSK, phy: bgn, rssi: -73
D (111235) wifi:remove all except ac:15:a2:4e:6b:47 from rc list
D (111241) wifi:clear blacklist
D (111244) wifi:filter: set rx policy=7
I (111247) wifi:pm start, type: 0

I (111250) wifi:set rx beacon pti, rx_bcn_pti: 0, bcn_timeout: 25000, mt_pti: 0, mt_time: 10000
D (111259) wifi:Send sta connected event
D (111262) wifi:connect status 1 -> 5
D (111266) wifi:obss scan is disabled
D (111269) wifi:start obss scan: obss scan is stopped
I (111274) wifi:AP's beacon interval = 102400 us, DTIM period = 1
D (111280) event: running post WIFI_EVENT:4 with handler 0x4205d79c and context 0x3fcba160 on loop 0x3fcb38dc
0x4205d79c: wifi_default_action_sta_connected at /home/axel/esp/esp-idf/components/esp_wifi/src/wifi_default.c:85

D (111290) esp_netif_handlers: esp_netif action connected with netif0x3fcba290 from event_id=4
D (111298) esp_netif_lwip: check: remote, if=0x3fcba290 fn=0x4203b55c
0x4203b55c: esp_netif_up_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:1648

D (111305) esp_netif_lwip: esp_netif_up_api esp_netif:0x3fcba290
D (111311) esp_netif_lwip: check: local, if=0x3fcba290 fn=0x4203be6c
0x4203be6c: esp_netif_update_default_netif_lwip at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:317

D (111317) esp_netif_lwip: esp_netif_update_default_netif_lwip 0x3fcba290
D (111324) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (111330) esp_netif_lwip: check: remote, if=0x3fcba290 fn=0x4203b97c
0x4203b97c: esp_netif_dhcpc_start_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:1440

D (111337) esp_netif_lwip: esp_netif_dhcpc_start_api esp_netif:0x3fcba290
D (111344) esp_netif_lwip: esp_netif_start_ip_lost_timer esp_netif:0x3fcba290
D (111351) esp_netif_lwip: if0x3fcba290 start ip lost tmr: already started
D (111358) esp_netif_lwip: starting dhcp client
D (111363) wifi:D (111363) esp_netif_lwip: call api in lwip: ret=0x0, give sem
eb is dhcp or dns sport = 68, dport = 67
D (111373) event: running post WIFI_EVENT:4 with handler 0x420114c4 and context 0x3fcba3c4 on loop 0x3fcb38dc

I (111383) net_utils: STA connected
I (111619) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
D (111863) wifi:eb is dhcp or dns sport = 68, dport = 67
I (111871) wifi:<ba-del>idx:0, tid:7
I (111998) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
D (112863) wifi:eb is dhcp or dns sport = 68, dport = 67
I (112869) wifi:<ba-del>idx:0, tid:7
I (113015) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
D (114863) wifi:eb is dhcp or dns sport = 68, dport = 67
I (114869) wifi:<ba-del>idx:0, tid:7
I (115021) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
I (118483) wifi:<ba-del>idx:0, tid:7
I (118489) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
D (118863) wifi:eb is dhcp or dns sport = 68, dport = 67
D (122863) wifi:eb is dhcp or dns sport = 68, dport = 67
AxelLin commented 2 weeks ago

I can reproduce only when the AP's RSSI is -5X ~ -7X. If I move the device closer to the AP, (RSSI is -2X), I cannot reproduce this issue. However, the question is ESP32 works fine in all my test cases.

MaxwellAlan commented 2 weeks ago

Hi @AxelLin

below shows the "Disconnect reason: 34" log

This means AP can not receive S3 reply 802.11 acks, also from below comments:

I can reproduce only when the AP's RSSI is -5X ~ -7X. If I move the device closer to the AP, (RSSI is -2X), I cannot reproduce this issue. However, the question is ESP32 works fine in all my test cases.

seems this issue related with S3 tx power is abnormal.

Could you please upload the sdkconfig? And you can try below config before test:

  1. idf.py erase-flash // erease s3 flash
  2. re-test

Or:

  1. disable Component config -> PHY -> Store phy calibration data in NVS
  2. re-test

Thanks.

AxelLin commented 1 week ago

Hi @MaxwellAlan

I have much less chance to see "Disconnect reason: 34" after setting CONFIG_ESP_PHY_CALIBRATION_AND_DATA_STORAGE=n, (I just found disconnect reason 34 once , see below log)

However, it may take quite long time to upload a 40KB file (sometimes it took 20 ~ 50 sec), the AP RSSI is -67. Sometimes I got below failure (RSSI is -68): W (46979) esp-tls: Failed to open new connection in specified timeout E (46979) transport_base: Failed to open a new connection Or below failure: E (41298) esp-tls: [sock=49] select() timeout E (41299) esp-tls: Failed to open new connection E (41299) transport_base: Failed to open a new connection E (41303) HTTP_CLIENT: Connection failed, sock < 0

But the ESP32 test is stable and just needs less than 5 sec when test at the same place.

Below is the long when I got disconnect reason 34, (just once).

I (41072) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
D (41551) wifi:eb is dhcp or dns sport = 68, dport = 67
D (42551) wifi:eb is dhcp or dns sport = 68, dport = 67
D (44074) wifi:recv deauth, reason=0x22
I (44074) wifi:state: run -> init (22c0)
D (44075) wifi:stop beacon and connect timers
D (44075) wifi:recv deauth/disassoc
D (44078) wifi:connect status 5 -> 4
D (44081) wifi:sta leave
I (44083) wifi:pm stop, total sleep time: 0 us / 3143159 us

D (44089) wifi:stop CSA timer
I (44091) wifi:<ba-del>idx:0, tid:7
D (44095) wifi:remove ac:15:a2:4e:6b:47 from rc list
I (44099) wifi:new:<2,0>, old:<2,1>, ap:<255,255>, sta:<2,1>, prof:1
D (44106) wifi:filter: set rx policy=8
D (44109) wifi:Send disconnect event, reason=34, AP number=0
D (44114) event: running post WIFI_EVENT:41 with handler 0x420114c4 and context 0x3fcba3c4 on loop 0x3fcb38dc

I (44124) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=2/old_snd=1, new_chan=2/new_snd=0
D (44134) event: running post WIFI_EVENT:5 with handler 0x4205d770 and context 0x3fcba19c on loop 0x3fcb38dc
0x4205d770: wifi_default_action_sta_disconnected at /home/axel/esp/esp-idf/components/esp_wifi/src/wifi_default.c:104

D (44144) esp_netif_handlers: esp_netif action disconnected with netif0x3fcba290 from event_id=5
D (44152) esp_netif_lwip: check: remote, if=0x3fcba290 fn=0x4203b8f8
0x4203b8f8: esp_netif_down_api at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:1674

D (44159) esp_netif_lwip: esp_netif_down_api esp_netif:0x3fcba290
D (44165) esp_netif_lwip: esp_netif_start_ip_lost_timer esp_netif:0x3fcba290
D (44172) esp_netif_lwip: if0x3fcba290 start ip lost tmr: already started
D (44179) esp_netif_lwip: check: local, if=0x3fcba290 fn=0x4203be60
0x4203be60: esp_netif_update_default_netif_lwip at /home/axel/esp/esp-idf/components/esp_netif/lwip/esp_netif_lwip.c:317

D (44185) esp_netif_lwip: esp_netif_update_default_netif_lwip 0x3fcba290
D (44192) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (44198) event: running post WIFI_EVENT:5 with handler 0x420114c4 and context 0x3fcba3c4 on loop 0x3fcb38dc

I (44208) net_utils: Disconnect reason: 34, rssi=-70
MaxwellAlan commented 1 week ago

Hi @AxelLin

I have much less chance to see "Disconnect reason: 34" after setting CONFIG_ESP_PHY_CALIBRATION_AND_DATA_STORAGE=n, (I just found disconnect reason 34 once , see below log)

seems PHY recalibration can make TX power to normal, but there still have some issues, maybe related with Bandwidth, did you test with AP bandwidth HT20-only and HT40-only to check whether HT40 issue. PS: did you test with other S3 boards?

AxelLin commented 1 week ago

We have observed several wifi issue with S3, but not every device is debug build. So at the moment, I'm not sure if this is a single case or other boards have the same issue. I will update to you when I have more test result. But overall, when the AP's rssi is < -6X, the S3 (ESP32S3-WROOM-1 module) has very high chance fail to upload data. e.g. W (49531) transport_base: Poll timeout or error, errno=Connection already in progress, fd=49, timeout_ms=15000 This is very strange because I think -6X is not very weak.

Also it looks like using esp_camera has impact on wifi transfer.

AxelLin commented 1 week ago

BTW, is there any API I can use to check if TX power is good or not?

AxelLin commented 1 week ago

I notice ESP32S3 may switch channel multiple times when join an AP.

I (2100) net_utils: Joining AP: IGS-MESH
I (2102) phy_init: phy_version 670,b7bc9b9,Apr 30 2024,10:54:13
I (2137) wifi:mode : sta (dc:da:0c:7c:d9:0c)
I (2138) wifi:enable tsf
I (2138) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=0/old_snd=0, new_chan=1/new_snd=0
I (2143) net_utils: STA started
I (4919) wifi:new:<1,1>, old:<1,0>, ap:<255,255>, sta:<1,1>, prof:1
I (4920) wifi:state: init -> auth (b0)
I (4921) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=1/old_snd=0, new_chan=1/new_snd=1
I (4937) wifi:state: auth -> assoc (0)
I (4949) wifi:state: assoc -> run (10)
I (7958) wpa: EAPOL1 received for 4 times, sending deauth
I (7959) wifi:state: run -> init (f00)
I (7960) wifi:new:<1,0>, old:<1,1>, ap:<255,255>, sta:<1,1>, prof:1
I (7964) wifi:new:<1,1>, old:<1,0>, ap:<255,255>, sta:<1,1>, prof:1
I (7970) wifi:state: init -> auth (b0)
I (7973) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=1/old_snd=1, new_chan=1/new_snd=0
I (7982) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=1/old_snd=0, new_chan=1/new_snd=1
I (7996) wifi:state: auth -> assoc (0)
I (8028) wifi:state: assoc -> run (10)
I (11038) wpa: EAPOL1 received for 4 times, sending deauth
I (11039) wifi:state: run -> init (f00)
I (11039) wifi:new:<1,0>, old:<1,1>, ap:<255,255>, sta:<1,1>, prof:1
I (11045) wifi:new:<1,1>, old:<1,0>, ap:<255,255>, sta:<1,1>, prof:1
I (11050) wifi:state: init -> auth (b0)
I (11054) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=1/old_snd=1, new_chan=1/new_snd=0
I (11062) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=1/old_snd=0, new_chan=1/new_snd=1
I (11071) wifi:state: auth -> assoc (0)
I (12076) wifi:state: assoc -> init (2700)
I (12077) wifi:new:<1,0>, old:<1,1>, ap:<255,255>, sta:<1,1>, prof:1
I (12078) wifi:new:<1,1>, old:<1,0>, ap:<255,255>, sta:<1,1>, prof:1
I (12082) wifi:state: init -> auth (b0)
I (12085) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=1/old_snd=1, new_chan=1/new_snd=0
I (12094) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=1/old_snd=0, new_chan=1/new_snd=1
I (13085) wifi:state: auth -> init (200)
I (13086) wifi:new:<1,0>, old:<1,1>, ap:<255,255>, sta:<1,1>, prof:1
I (13087) wifi:new:<8,0>, old:<1,0>, ap:<255,255>, sta:<8,0>, prof:1
I (13091) wifi:state: init -> auth (b0)
I (13094) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=1/old_snd=1, new_chan=1/new_snd=0
I (13098) wifi:state: auth -> assoc (0)
I (13107) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=1/old_snd=0, new_chan=8/new_snd=0
I (13113) wifi:state: assoc -> run (10)
I (13134) wifi:connected with IGS-MESH, aid = 2, channel 8, BW20, bssid = ac:15:a2:4e:6b:47
I (13135) wifi:security: WPA2-PSK, phy: bgn, rssi: -70
I (13136) wifi:pm start, type: 1

I (13139) wifi:dp: 1, bi: 102400, li: 3, scale listen interval from 307200 us to 307200 us
I (13148) wifi:set rx beacon pti, rx_bcn_pti: 0, bcn_timeout: 25000, mt_pti: 0, mt_time: 10000
I (13156) wifi:AP's beacon interval = 102400 us, DTIM period = 1

Below is ESP32 log for comparison:

I (1958) phy_init: phy_version 4791,2c4672b,Dec 20 2023,16:06:06
I (2027) wifi:mode : sta (08:d1:f9:ca:35:f4)
I (2028) wifi:enable tsf
I (2028) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=0/old_snd=0, new_chan=1/new_snd=0
I (2033) net_utils: STA started
I (4609) wifi:new:<8,0>, old:<1,0>, ap:<255,255>, sta:<8,0>, prof:1
I (4610) wifi:state: init -> auth (b0)
I (4611) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=1/old_snd=0, new_chan=8/new_snd=0
I (4622) wifi:state: auth -> assoc (0)
I (4629) wifi:state: assoc -> run (10)
I (4644) wifi:connected with IGS-MESH, aid = 2, channel 8, BW20, bssid = ac:15:a2:4e:6b:47
I (4644) wifi:security: WPA2-PSK, phy: bgn, rssi: -62
I (4646) wifi:pm start, type: 1

I (4649) wifi:dp: 1, bi: 102400, li: 3, scale listen interval from 307200 us to 307200 us
I (4663) wifi:<ba-add>idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64
I (4720) wifi:AP's beacon interval = 102400 us, DTIM period = 1
AxelLin commented 1 week ago

I also observed below symptom when test with freenove s3 dev board:

  1. Sometimes I got "disconnect reason:34" or "39"
  2. If the AP's rssi is week, I can observe the upload failure. If move the device closer to AP, it works fine. However, even in the upload success case, the upload time is much longer than esp32.

    ping the device: $ ping 192.168.0.160 PING 192.168.0.160 (192.168.0.160) 56(84) bytes of data. 64 bytes from 192.168.0.160: icmp_seq=1 ttl=64 time=22.6 ms 64 bytes from 192.168.0.160: icmp_seq=6 ttl=64 time=1628 ms 64 bytes from 192.168.0.160: icmp_seq=13 ttl=64 time=1863 ms 64 bytes from 192.168.0.160: icmp_seq=14 ttl=64 time=839 ms 64 bytes from 192.168.0.160: icmp_seq=23 ttl=64 time=768 ms 64 bytes from 192.168.0.160: icmp_seq=24 ttl=64 time=1408 ms 64 bytes from 192.168.0.160: icmp_seq=25 ttl=64 time=391 ms

AxelLin commented 1 week ago

@MaxwellAlan Is this a known issue for esp32s3? https://www.esp32.com/viewtopic.php?f=2&t=40111&sid=283a77286dd295dcfdd896e2c0d6e3f2#p132803

hansw123 commented 1 week ago

hi @AxelLin we do not have tp-link AX1800 ,could you provide the capture in channel 1 ,thank you very much !

AxelLin commented 1 week ago

@hansw123 Please check attached log.

The AP mac: ac:15:a2:4e:6b:47 ESP32S3 mac: dc:da:0c:7c:d9:0c bug_report.pcapng.txt

hansw123 commented 1 week ago

@AxelLin do you use USB , you can disable USB module and retest ,thank you !

AxelLin commented 1 week ago

@AxelLin do you use USB , you can disable USB module and retest ,thank you !

@hansw123 What's your finding in the wireshark log? Any thing unusual?

According to this comment https://www.esp32.com/viewtopic.php?f=2&t=40111&sid=283a77286dd295dcfdd896e2c0d6e3f2#p133443 , the impact of usb is very limited. So why you suggest to disable usb usage?

hansw123 commented 1 week ago

@AxelLin we find the station recv ack from ap may loss , so the eapol process sometimes will tinmeout . We're guessing that it's probably due to the influence of the USB

AxelLin commented 1 week ago

@hansw123 @MaxwellAlan

As I said in prvious comment, your colleague says the impact of USB is limited. Howver, in my test, this issue seems happens after I init camera. See below log:

I (2345) net_utils: Joining AP: IGS-MESH I (2348) phy_init: phy_version 670,b7bc9b9,Apr 30 2024,10:54:13 I (2390) wifi:mode : sta (dc:da:0c:7c:d9:0c) I (2390) wifi:enable tsf I (2391) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=0/old_snd=0, new_chan=1/new_snd=0 I (2395) net_utils: STA started I (5168) wifi:new:<1,1>, old:<1,0>, ap:<255,255>, sta:<1,1>, prof:1 I (5169) wifi:state: init -> auth (b0) I (5169) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=1/old_snd=0, new_chan=1/new_snd=1 I (5171) wifi:state: auth -> init (8a0) I (5179) wifi:new:<1,0>, old:<1,1>, ap:<255,255>, sta:<1,1>, prof:1 I (5187) wifi:new:<1,1>, old:<1,0>, ap:<255,255>, sta:<1,1>, prof:1 I (5192) wifi:state: init -> auth (b0) I (5195) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=1/old_snd=1, new_chan=1/new_snd=0 I (5199) wifi:state: auth -> assoc (0) I (5208) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=1/old_snd=0, new_chan=1/new_snd=1 I (5214) wifi:state: assoc -> run (10) I (5242) wifi:connected with IGS-MESH, aid = 2, channel 1, 40U, bssid = ac:15:a2:4e:6b:47 I (5242) wifi:security: WPA2-PSK, phy: bgn, rssi: -72 I (5244) wifi:pm start, type: 1

I (5247) wifi:dp: 1, bi: 102400, li: 3, scale listen interval from 307200 us to 307200 us I (5255) wifi:set rx beacon pti, rx_bcn_pti: 0, bcn_timeout: 25000, mt_pti: 0, mt_time: 10000 I (5264) net_utils: STA connected I (5272) wifi:idx:0 (ifx:0, ac:15:a2:4e:6b:47), tid:7, ssn:0, winSize:64 I (5339) wifi:AP's beacon interval = 102400 us, DTIM period = 1 I (6264) esp_netif_handlers: sta ip: 192.168.0.244, mask: 255.255.255.0, gw: 192.168.0.1 I (6339) wifi:idx:1 (ifx:0, ac:15:a2:4e:6b:47), tid:0, ssn:0, winSize:64 // Start init esp_camera here I (16041) wifi:state: run -> init (22c0) I (16043) wifi:pm stop, total sleep time: 5845865 us / 10795879 us

I (16043) wifi:idx:1, tid:0 I (16045) wifi:idx:0, tid:7 I (16048) wifi:new:<1,0>, old:<1,1>, ap:<255,255>, sta:<1,1>, prof:1 I (16055) net_utils: WIFI_EVENT_HOME_CHANNEL_CHANGE: old_chan=1/old_snd=1, new_chan=1/new_snd=0 I (16064) net_utils: Disconnect reason: 34, rssi=-73

Could you help to check if this is related to esp_camera usage? (This happens after lcd_camera_controller is enabled) Also please check my feedback here: https://github.com/espressif/esp32-camera/issues/662#issuecomment-2182278303

AxelLin commented 1 week ago

@hansw123 @MaxwellAlan

Attached 2 wireshark log that uploading data to http server: 1 ok case, 1 fail case. S3 has much higher chance to hit the failure case.

s3-http-ok1.pcapng.txt s3-http-fail1.pcapng.txt

hansw123 commented 4 days ago

@AxelLin Can you provide the model number and example code of the camera development board you are using? do ESP32-s3-EYE