Benutzer-Werkzeuge

Webseiten-Werkzeuge


stellar-wireless-wpa3-sae-raspberry-pi-deutsch

Unterschiede

Hier werden die Unterschiede zwischen zwei Versionen angezeigt.

Link zu dieser Vergleichsansicht

stellar-wireless-wpa3-sae-raspberry-pi-deutsch [2019/06/07 11:27] (aktuell)
benny angelegt
Zeile 1: Zeile 1:
 +====== Wie verbindet man den Raspberry Pi 3 B+ via WPA3-Personal (SAE/PMF) zum Stellar Wireless AP ======
 +
 +Eine Verbindung des Raspberry Pi Model 3 B+ via WPA3-Personal (SAE/PMF), specziell über die integrierte Wireless Netzwerkkarte,​ ist leider nicht ganz einfach. In diesem Artikel beschreibe ich die notwendigen Schritte um dies zu erreichen.
 +
 +**Verwendetes Equipment & Access Point:**
 +  * [[https://​www.al-enterprise.com/​en/​products/​wlan/​omniaccess-stellar-access-point-1201|Alcatel-Lucent Enterprise OmniAccess Stellar AP1201]]
 +  * AWOS v3.0.6.20
 +  * OmniVista 2500 v4.4R1 Build 39
 +  * Raspberry Pi Model 3 B+
 +{{ :​omniaccess-stellar-ap1201.png?​direct&​400 |}}
 +
 +<WRAP center round tip 60%>
 +Wie ein Windows 10 Laptop via WPA3-Personal an das Wireless Netzwerk angebunden werden kann, [[stellar-wireless-win10-windows-10-mit-wpa3-sae-deutsch|steht in diesem Artikel]]!
 +</​WRAP>​
 +
 +Die Verbindung zur SSID "​ov44b39"​ setzt "​Management Frame Protection"​ (MFP) bzw. Protected Management Frames (PMF) sowie SAE voraus. Dies geht aus dem folgenden Screenshot von **Wifi Explorer** hervor.
 +
 +{{:​wpa3.png?​direct|}}
 +
 +===== PCAP Screenshot =====
 +{{ ::​wireshark-ch140.png?​direct&​1000 |}}
 +Download des PCAP (z.B. #152 anschauen): {{ ::​ch140_2019-05-18_01.07.31.pcap.zip |}}
 +
 +===== SSID Überblick auf dem Access Point (get_wlan) =====
 +<​code>​
 +support@AP-1E:​60:/​tmp$ ssudo wam_debug get_wlan
 +{
 + [
 + {
 + "​srvname":​ "​ov44b39-portal",​
 + "​ssid":​ "​ov44b39-portal",​
 + "​hide":​ "​no",​
 + "​ssid_enable":​ "​enable",​
 + "​band":​ "​all",​
 + "​seclevel":​ "​psk",​
 + "​encryptype":​ "​wpa3_psk_sae_aes",​
 + "​ifindex":​ "2g: ath02, 5g_1: ath12, 5g_2: ",
 + "​passphrase":​ "​******",​
 + "​prekey":​ "​******",​
 + "​AAAprofile":​ "​ov44b39-portal",​
 + "​macau_enable":​ "​enable",​
 + "​bypass_enable":​ "​disable",​
 + "​mac_eap_allow":​ "​enable",​
 + "​macpassrole":​ "",​
 + "​classification_enable":​ "​disable",​
 + "​defaultrole":​ "​__ov44b39-portal",​
 + "​80211r_enable":​ "​disable",​
 + "​okc_enable":​ "​disable",​
 + "​l3_roaming":​ "​disable",​
 + "​bcrotation_enable":​ "​disable",​
 + "​bcrotation_inteval":​ 15,
 + "​mesh":​ "​disable",​
 + "​clientIsolation":​ "​disable"​
 + },
 + {
 + "​srvname":​ "​ov44b39",​
 + "​ssid":​ "​ov44b39",​
 + "​hide":​ "​no",​
 + "​ssid_enable":​ "​enable",​
 + "​band":​ "​all",​
 + "​seclevel":​ "​psk",​
 + "​encryptype":​ "​wpa3_sae_aes",​
 + "​ifindex":​ "2g: ath01, 5g_1: ath11, 5g_2: ",
 + "​passphrase":​ "​******",​
 + "​prekey":​ "​******",​
 + "​AAAprofile":​ "",​
 + "​macau_enable":​ "​disable",​
 + "​bypass_enable":​ "​disable",​
 + "​mac_eap_allow":​ "​enable",​
 + "​macpassrole":​ "",​
 + "​classification_enable":​ "​disable",​
 + "​defaultrole":​ "​__ov44b39",​
 + "​80211r_enable":​ "​disable",​
 + "​okc_enable":​ "​disable",​
 + "​l3_roaming":​ "​disable",​
 + "​bcrotation_enable":​ "​disable",​
 + "​bcrotation_inteval":​ 15,
 + "​mesh":​ "​disable",​
 + "​clientIsolation":​ "​disable"​
 + }
 + ]
 +}
 +</​code>​
 +
 +===== Client Überblick auf dem Access Point #1 (sta_list) =====
 +<​code>​
 +support@AP-1E:​60:/​tmp$ ssudo wam_debug sta_list
 +{
 + "​status":​ "​Success!!!",​
 + "​wlanServiceData":​ [
 + {
 + "​iface":​ "​ath02",​
 + "​ssid":​ "​ov44b39-portal",​
 + "​freq":​ "​2.4GHz",​
 + "​security":​ "​Personal(WPA3_PSK_SAE_AES)",​
 + "​wlanService":​ "​ov44b39-portal"​
 + },
 + {
 + "​iface":​ "​ath12",​
 + "​ssid":​ "​ov44b39-portal",​
 + "​freq":​ "​5GHz",​
 + "​security":​ "​Personal(WPA3_PSK_SAE_AES)",​
 + "​wlanService":​ "​ov44b39-portal"​
 + },
 + {
 + "​iface":​ "​ath01",​
 + "​ssid":​ "​ov44b39",​
 + "​freq":​ "​2.4GHz",​
 + "​security":​ "​Personal(WPA3_SAE_AES)",​
 + "​wlanService":​ "​ov44b39"​
 + },
 + {
 + "​iface":​ "​ath11",​
 + "​ssid":​ "​ov44b39",​
 + "​freq":​ "​5GHz",​
 + "​security":​ "​Personal(WPA3_SAE_AES)",​
 + "​wlanService":​ "​ov44b39",​
 + "​staData":​ [
 + {
 + "​staMAC":​ "​b8:​27:​eb:​ea:​8c:​42",​
 + "​staIP":​ "​192.168.12.115",​
 + "​staGlobalIPv6":​ "::",​
 + "​staLocalIPv6":​ "​fe80::​13de:​b443:​e411:​7bc7",​
 + "​associationTime":​ 847,
 + "​mappingType":​ 0,
 + "​assignedVLAN":​ 12,
 + "​assignedAR":​ "​__ov44b39",​
 + "​assignedPL":​ "",​
 + "​macAuthResult":​ "",​
 + "​ARFromMACAuth":​ "",​
 + "​PLFromMACAuth":​ "",​
 + "​redirectURLFromMACAuth":​ "",​
 + "​ARFrom8021xAuth":​ "",​
 + "​PLFrom8021xAuth":​ "",​
 + "​redirectURLFrom8021xAuth":​ "",​
 + "​CPAuthResult":​ "​FAILED",​
 + "​ARFromCPAuth":​ "",​
 + "​PLFromCPAuth":​ "",​
 + "​ARFromRoaming":​ "",​
 + "​PLFromRoaming":​ "",​
 + "​redirectURLFromRoaming":​ "",​
 + "​classificationMatched":​ "​none"​
 + }
 + ]
 + }
 + ]
 +}
 +</​code>​
 +
 +===== Client Überblick auf dem Access Point #2 (wlanconfig ath11 list) =====
 +Ich muss hier noch einige Dinge in der Ausgabe herausfinden. :)
 +
 +<​code>​
 +support@AP-1E:​60:/​tmp$ wlanconfig ath11 list
 +ADDR               AID CHAN TXRATE RXRATE RSSI MINRSSI MAXRSSI IDLE  TXSEQ  RXSEQ  CAPS XCAPS        ACAPS     ​ERP ​   STATE MAXRATE(DOT11) HTCAPS VHTCAPS ASSOCTIME ​   IEs   ​MODE ​                  ​PSMODE RXNSS TXNSS
 +b8:​27:​eb:​ea:​8c:​42 ​   1  140   ​6M ​    ​65M ​  ​63 ​     62      75   ​15 ​     0   ​65535 ​   EP  ORIf         ​0 ​         b              0              AQ             10g 00:​15:​24 ​ RSN WME IEEE80211_MODE_11NA_HT20 ​  0 1 1 
 + ​Minimum Tx Power : 3
 + ​Maximum Tx Power : 20
 + HT Capability :​ Yes
 + VHT Capability :​ No
 + MU capable : No
 + ​SNR :​ 63
 + ​Operating band : 5GHz
 + ​Current Operating class : 0
 + ​Supported Rates : 12  18  24  36  48  72  96  108 
 +
 +</​code>​
 +
 +===== Ausgabe vom Raspberry Pi (wpa_supplicant) =====
 +<​code>​
 +pi@raspberrypi:​~/​hostap_2_6/​wpa_supplicant $ sudo ./​wpa_supplicant -c wpa_supplicant.conf -dd -i wlan0
 +wpa_supplicant v2.6
 +random: Trying to read entropy from /dev/random
 +Successfully initialized wpa_supplicant
 +Initializing interface '​wlan0'​ conf '​wpa_supplicant.conf'​ driver '​default'​ ctrl_interface '​N/​A'​ bridge '​N/​A'​
 +Configuration file '​wpa_supplicant.conf'​ -> '/​home/​pi/​hostap_2_6/​wpa_supplicant/​wpa_supplicant.conf'​
 +Reading configuration file '/​home/​pi/​hostap_2_6/​wpa_supplicant/​wpa_supplicant.conf'​
 +ctrl_interface='​DIR=/​var/​run/​wpa_supplicant GROUP=netdev'​
 +eapol_version=1
 +ap_scan=1
 +fast_reauth=1
 +country='​DE'​
 +pmf=1
 +Line: 1947 - start of a new network block
 +ssid - hexdump_ascii(len=7):​
 +     6f 76 34 34 62 33 39                              ov44b39 ​        
 +proto: 0x2
 +key_mgmt: 0x400
 +sae_password - hexdump_ascii(len=8):​ [REMOVED]
 +Priority group 0
 +   id=0 ssid='​ov44b39'​
 +nl80211: Supported cipher 00-0f-ac:1
 +nl80211: Supported cipher 00-0f-ac:5
 +nl80211: Supported cipher 00-0f-ac:2
 +nl80211: Supported cipher 00-0f-ac:4
 +nl80211: Supported cipher 00-0f-ac:6
 +nl80211: Using driver-based off-channel TX
 +nl80211: Supported vendor command: vendor_id=0x1018 subcmd=1
 +nl80211: Supported vendor event: vendor_id=0x1018 subcmd=0
 +nl80211: Use separate P2P group interface (driver advertised support)
 +nl80211: Enable multi-channel concurrent (driver advertised support)
 +nl80211: use P2P_DEVICE support
 +nl80211: interface wlan0 in phy phy0
 +nl80211: Set mode ifindex 3 iftype 2 (STATION)
 +nl80211: Subscribe to mgmt frames with non-AP handle 0x1338538
 +nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1338538 match=0801
 +nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1338538 match=06
 +nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1338538 match=0a07
 +nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1338538 match=0a11
 +nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1338538 match=1101
 +nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1338538 match=1102
 +nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1338538 match=0505
 +nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1338538 match=0500
 +rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
 +netlink: Operstate: ifindex=3 linkmode=1 (userspace-control),​ operstate=5 (IF_OPER_DORMANT)
 +Add interface wlan0 to a new radio phy0
 +nl80211: Regulatory information - country=DE (DFS-ETSI)
 +nl80211: 2400-2483 @ 40 MHz 20 mBm
 +nl80211: 5150-5250 @ 80 MHz 20 mBm (no outdoor)
 +nl80211: 5250-5350 @ 80 MHz 20 mBm (no outdoor) (DFS)
 +nl80211: 5470-5725 @ 160 MHz 26 mBm (DFS)
 +nl80211: 5725-5875 @ 80 MHz 13 mBm
 +nl80211: 57000-66000 @ 2160 MHz 40 mBm
 +nl80211: Added 802.11b mode based on 802.11g information
 +wlan0: Own MAC address: b8:​27:​eb:​ea:​8c:​42
 +wpa_driver_nl80211_set_key:​ ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
 +wpa_driver_nl80211_set_key:​ ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
 +wpa_driver_nl80211_set_key:​ ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
 +wpa_driver_nl80211_set_key:​ ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
 +wpa_driver_nl80211_set_key:​ ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
 +wpa_driver_nl80211_set_key:​ ifindex=3 (wlan0) alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
 +wlan0: RSN: flushing PMKID list in the driver
 +nl80211: Flush PMKIDs
 +ENGINE: Loading dynamic engine
 +ENGINE: Loading dynamic engine
 +EAPOL: SUPP_PAE entering state DISCONNECTED
 +EAPOL: Supplicant port status: Unauthorized
 +nl80211: Skip set_supp_port(unauthorized) while not associated
 +EAPOL: KEY_RX entering state NO_KEY_RECEIVE
 +EAPOL: SUPP_BE entering state INITIALIZE
 +EAP: EAP entering state DISABLED
 +ctrl_interface_group=108 (from group name '​netdev'​)
 +wlan0: Added interface wlan0
 +wlan0: State: DISCONNECTED -> DISCONNECTED
 +nl80211: Set wlan0 operstate 0->0 (DORMANT)
 +netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
 +random: Got 20/20 bytes from /dev/random
 +RTM_NEWLINK:​ ifi_index=3 ifname=wlan0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
 +RTM_NEWLINK:​ ifi_index=3 ifname=wlan0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
 +wlan0: Starting delayed sched scan
 +wlan0: Use normal scan instead of sched_scan for initial scans (normal_scans=0)
 +wlan0: Setting scan request: 0.000000 sec
 +wlan0: State: DISCONNECTED -> SCANNING
 +wlan0: Starting AP scan for wildcard SSID
 +wlan0: Add radio work '​scan'​@0x1348f90
 +wlan0: First radio work item in the queue - schedule start immediately
 +wlan0: Starting radio work '​scan'​@0x1348f90 after 0.000653 second wait
 +wlan0: nl80211: scan request
 +nl80211: Scan SSID - hexdump_ascii(len=0):​ [NULL]
 +Scan requested (ret=0) - scan timeout 10 seconds
 +nl80211: Event message available
 +nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
 +wlan0: nl80211: Scan trigger
 +wlan0: Event SCAN_STARTED (47) received
 +wlan0: Own scan request started a scan in 0.001780 seconds
 +EAPOL: disable timer tick
 +RTM_NEWLINK:​ ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
 +nl80211: Event message available
 +nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
 +wlan0: nl80211: New scan results available
 +nl80211: Scan probed for SSID ''​
 +nl80211: Scan included frequencies:​ 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700
 +wlan0: Event SCAN_RESULTS (3) received
 +wlan0: Scan completed in 2.390465 seconds
 +nl80211: Received scan results (19 BSSes)
 +wlan0: BSS: Start scan result update 1
 +wlan0: BSS: Add new id 0 BSSID dc:​08:​56:​00:​1b:​d9 SSID '​V11-Home'​ freq 5540
 +wlan0: BSS: Add new id 1 BSSID dc:​08:​56:​00:​29:​19 SSID '​V11-Home'​ freq 5300
 +wlan0: BSS: Add new id 2 BSSID dc:​08:​56:​00:​29:​21 SSID '​V11-Home'​ freq 5580
 +wlan0: BSS: Add new id 3 BSSID dc:​08:​56:​13:​1e:​69 SSID '​ov44b39'​ freq 5700
 +wlan0: BSS: Add new id 4 BSSID dc:​08:​56:​13:​1e:​6a SSID '​ov44b39-portal'​ freq 5700
 +wlan0: BSS: Add new id 5 BSSID dc:​08:​56:​00:​1b:​d1 SSID '​V11-Home'​ freq 2412
 +wlan0: BSS: Add new id 6 BSSID dc:​08:​56:​13:​1e:​61 SSID '​ov44b39'​ freq 2437
 +wlan0: BSS: Add new id 7 BSSID dc:​08:​56:​13:​1e:​62 SSID '​ov44b39-portal'​ freq 2437
 +wlan0: BSS: Add new id 8 BSSID 6c:​f3:​7f:​77:​08:​01 SSID '​ALU4U-Mobility'​ freq 2462
 +wlan0: BSS: Add new id 9 BSSID dc:​08:​56:​00:​29:​11 SSID '​V11-Home'​ freq 2412
 +wlan0: BSS: Add new id 10 BSSID 44:​4e:​6d:​44:​ce:​7d SSID '​Bramkoppelweg'​ freq 2437
 +wlan0: BSS: Add new id 11 BSSID 88:​53:​d4:​be:​e0:​e6 SSID '​WLAN-E0E615'​ freq 2462
 +wlan0: BSS: Add new id 12 BSSID d4:​21:​22:​de:​da:​33 SSID '​WLAN-633353'​ freq 2412
 +wlan0: BSS: Add new id 13 BSSID 7c:​ff:​4d:​2e:​9c:​73 SSID '​Bramkoppelweg'​ freq 5220
 +wlan0: BSS: Add new id 14 BSSID 90:​67:​1c:​ef:​2f:​d2 SSID '​WLAN-WD57L2'​ freq 2452
 +wlan0: BSS: Add new id 15 BSSID f0:​99:​bf:​0a:​e1:​3e SSID '​Kerstins WLAN-Netzwerk'​ freq 2462
 +wlan0: BSS: Add new id 16 BSSID 44:​4e:​6d:​44:​ce:​7c SSID '​Bramkoppelweg'​ freq 5220
 +wlan0: BSS: Add new id 17 BSSID 90:​67:​1c:​ef:​2f:​d3 SSID '​Telekom_FON'​ freq 2452
 +wlan0: BSS: Add new id 18 BSSID 2e:​3a:​e8:​15:​8e:​ad SSID '​ECOVACS_0532'​ freq 2412
 +BSS: last_scan_res_used=19/​32
 +wlan0: New scan results available (own=1 ext=0)
 +wlan0: Radio work '​scan'​@0x1348f90 done in 2.430070 seconds
 +wlan0: radio_work_free('​scan'​@0x1348f90:​ num_active_works --> 0
 +wlan0: Selecting BSS from priority group 0
 +wlan0: 0: dc:​08:​56:​00:​1b:​d9 ssid='​V11-Home'​ wpa_ie_len=0 rsn_ie_len=20 caps=0x1511 level=-30 freq=5540 ​
 +wlan0: ​   skip - SSID mismatch
 +wlan0: 1: dc:​08:​56:​00:​29:​19 ssid='​V11-Home'​ wpa_ie_len=0 rsn_ie_len=20 caps=0x1511 level=-49 freq=5300 ​
 +wlan0: ​   skip - SSID mismatch
 +wlan0: 2: dc:​08:​56:​00:​29:​21 ssid='​V11-Home'​ wpa_ie_len=0 rsn_ie_len=20 caps=0x1511 level=-51 freq=5580 ​
 +wlan0: ​   skip - SSID mismatch
 +wlan0: 3: dc:​08:​56:​13:​1e:​69 ssid='​ov44b39'​ wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-13 freq=5700 ​
 +wlan0: ​   selected based on RSN IE
 +wlan0: ​   selected BSS dc:​08:​56:​13:​1e:​69 ssid='​ov44b39'​
 +wlan0: Considering connect request: reassociate:​ 0  selected: dc:​08:​56:​13:​1e:​69 ​ bssid: 00:​00:​00:​00:​00:​00 ​ pending: 00:​00:​00:​00:​00:​00 ​ wpa_state: SCANNING ​ ssid=0x1339468 ​ current_ssid=(nil)
 +wlan0: Request association with dc:​08:​56:​13:​1e:​69
 +wlan0: Add radio work '​connect'​@0x1348f90
 +wlan0: First radio work item in the queue - schedule start immediately
 +wlan0: Starting radio work '​connect'​@0x1348f90 after 0.000208 second wait
 +wlan0: Trying to associate with dc:​08:​56:​13:​1e:​69 (SSID='​ov44b39'​ freq=5700 MHz)
 +wlan0: Cancelling scan request
 +wlan0: WPA: clearing own WPA/RSN IE
 +wlan0: Automatic auth_alg selection: 0x1
 +RSN: PMKSA cache search - network_ctx=0x1339468 try_opportunistic=0
 +RSN: Search for BSSID dc:​08:​56:​13:​1e:​69
 +RSN: No PMKSA cache entry found
 +wlan0: RSN: using IEEE 802.11i/​D9.0
 +wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1024 proto 2
 +wlan0: WPA: Selected mgmt group cipher 32
 +wlan0: WPA: clearing AP WPA IE
 +WPA: set AP RSN IE - hexdump(len=22):​ 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 08 c0 00
 +wlan0: WPA: using GTK CCMP
 +wlan0: WPA: using PTK CCMP
 +wlan0: RSN: using KEY_MGMT SAE
 +wlan0: WPA: using MGMT group cipher AES-128-CMAC
 +WPA: Set own WPA IE default - hexdump(len=28):​ 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 08 80 00 00 00 00 0f ac 06
 +wlan0: State: SCANNING -> ASSOCIATING
 +nl80211: Set wlan0 operstate 0->0 (DORMANT)
 +netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
 +Limit connection to BSSID dc:​08:​56:​13:​1e:​69 freq=5700 MHz based on scan results (bssid_set=0)
 +wlan0: WPA: Selected AP supports MFP: require MFP
 +nl80211: Set mode ifindex 3 iftype 2 (STATION)
 +nl80211: Unsubscribe mgmt frames handle 0x89bb0db1 (mode change)
 +nl80211: Subscribe to mgmt frames with non-AP handle 0x1338538
 +nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1338538 match=0801
 +nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1338538 match=06
 +nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1338538 match=0a07
 +nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1338538 match=0a11
 +nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1338538 match=1101
 +nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1338538 match=1102
 +nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1338538 match=0505
 +nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1338538 match=0500
 +nl80211: Connect (ifindex=3)
 +  * bssid=dc:​08:​56:​13:​1e:​69
 +  * bssid_hint=dc:​08:​56:​13:​1e:​69
 +  * freq=5700
 +  * freq_hint=5700
 +  * SSID - hexdump_ascii(len=7):​
 +     6f 76 34 34 62 33 39                              ov44b39 ​        
 +  * IEs - hexdump(len=28):​ 30 1a 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 08 80 00 00 00 00 0f ac 06
 +  * WPA Versions 0x4
 +  * pairwise=0xfac04
 +  * group=0xfac04
 +  * akm=0xfac08
 +  * SAE password - hexdump_ascii(len=8):​ [REMOVED]
 +  * Auth Type 4
 +nl80211: Connect request send successfully
 +wlan0: Setting authentication timeout: 10 sec 0 usec
 +EAPOL: External notification - EAP success=0
 +EAPOL: External notification - EAP fail=0
 +EAPOL: External notification - portControl=Auto
 +RTM_NEWLINK:​ ifi_index=3 ifname=wlan0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
 +RTM_NEWLINK:​ ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
 +RTM_NEWLINK:​ ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
 +RTM_NEWLINK:​ ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
 +nl80211: Event message available
 +nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlan0
 +nl80211: Connect event (status=0 ignore_next_local_disconnect=0)
 +nl80211: Associated on 5700 MHz
 +nl80211: Associated with dc:​08:​56:​13:​1e:​69
 +nl80211: Operating frequency for the associated BSS from scan results: 5700 MHz
 +wlan0: Event ASSOC (0) received
 +wlan0: Association info event
 +req_ies - hexdump(len=133):​ 00 07 6f 76 34 34 62 33 39 01 08 8c 12 98 24 b0 48 60 6c 21 02 03 14 24 06 24 04 34 04 64 0b 30 26 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 08 cc 00 01 00 6d bb 3b a2 09 10 22 9e d9 af 7e 9b 57 65 5f 67 2d 1a 21 00 17 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 00 00 00 00 00 00 00 40 dd 09 00 10 18 02 00 00 10 00 00 dd 07 00 50 f2 02 00 01 00 ff 00 00 00
 +resp_ies - hexdump(len=114):​ 01 08 8c 12 98 24 b0 48 60 6c 2d 1a ad 09 03 ff ff 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 3d 16 8c 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 00 02 00 00 00 40 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 08 8c fd f0 01 01 02 01 00 00 00 00 00 00 00
 +wlan0: freq=5700 MHz
 +WPA: set own WPA/RSN IE - hexdump(len=40):​ 30 26 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 08 cc 00 01 00 6d bb 3b a2 09 10 22 9e d9 af 7e 9b 57 65 5f 67
 +RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
 +RSN: Search for PMKID - hexdump(len=16):​ 6d bb 3b a2 09 10 22 9e d9 af 7e 9b 57 65 5f 67
 +RSN: No PMKSA cache entry found
 +wlan0: RSN: PMKID from assoc IE not found from PMKSA cache
 +wlan0: State: ASSOCIATING -> ASSOCIATED
 +nl80211: Set wlan0 operstate 0->0 (DORMANT)
 +netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
 +wlan0: Associated to a new BSS: BSSID=dc:​08:​56:​13:​1e:​69
 +wlan0: Associated with dc:​08:​56:​13:​1e:​69
 +wlan0: WPA: Association event - clear replay counter
 +wlan0: WPA: Clear old PTK
 +EAPOL: External notification - portEnabled=0
 +EAPOL: External notification - portValid=0
 +EAPOL: External notification - EAP success=0
 +EAPOL: External notification - portEnabled=1
 +EAPOL: SUPP_PAE entering state CONNECTING
 +EAPOL: enable timer tick
 +EAPOL: SUPP_BE entering state IDLE
 +wlan0: Setting authentication timeout: 10 sec 0 usec
 +wlan0: Cancelling scan request
 +wlan0: Cancelling authentication timeout
 +wlan0: State: ASSOCIATED -> COMPLETED
 +wlan0: Radio work '​connect'​@0x1348f90 done in 0.177806 seconds
 +wlan0: radio_work_free('​connect'​@0x1348f90:​ num_active_works --> 0
 +wlan0: CTRL-EVENT-CONNECTED - Connection to dc:​08:​56:​13:​1e:​69 completed [id=0 id_str=]
 +nl80211: Set wlan0 operstate 0->1 (UP)
 +netlink: Operstate: ifindex=3 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
 +EAPOL: External notification - portValid=1
 +EAPOL: External notification - EAP success=1
 +EAPOL: SUPP_PAE entering state AUTHENTICATING
 +EAPOL: SUPP_BE entering state SUCCESS
 +EAP: EAP entering state DISABLED
 +EAPOL: SUPP_PAE entering state AUTHENTICATED
 +EAPOL: Supplicant port status: Authorized
 +nl80211: Set supplicant port authorized for dc:​08:​56:​13:​1e:​69
 +EAPOL: SUPP_BE entering state IDLE
 +EAPOL authentication completed - result=SUCCESS
 +WMM AC: Missing U-APSD configuration
 +wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
 +RTM_NEWLINK:​ ifi_index=3 ifname=wlan0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
 +RTM_NEWLINK:​ ifi_index=3 ifname=wlan0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
 +CTRL_IFACE monitor attached /​tmp/​dhcpcd-pi/​libdhcpcd-wpa-623.12\x00
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=3
 +EAPOL: EAP Session-Id not available
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=169
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=854
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=790
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=806
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=834
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=867
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=647
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=630
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=759
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=484
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=647
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=1085
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=883
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=835
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=912
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=829
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=671
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=981
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=510
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=278
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=0
 +EAPOL: EAP Session-Id not available
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=169
 +nl80211: Event message available
 +nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlan0
 +nl80211: Regulatory domain change
 + * initiator=3
 + * type=0
 + * alpha2=DE
 +wlan0: Event CHANNEL_LIST_CHANGED (28) received
 +wlan0: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=DE
 +CTRL-DEBUG: ctrl_sock-sendmsg:​ sock=12 sndbuf=163840 outq=0 send_len=63
 +CTRL_IFACE monitor sent successfully to /​tmp/​dhcpcd-pi/​libdhcpcd-wpa-623.12\x00
 +wlan0: Updating hw mode
 +nl80211: Regulatory information - country=DE (DFS-ETSI)
 +nl80211: 2400-2483 @ 40 MHz 20 mBm
 +nl80211: 5150-5250 @ 80 MHz 20 mBm (no outdoor)
 +nl80211: 5250-5350 @ 80 MHz 20 mBm (no outdoor) (DFS)
 +nl80211: 5470-5725 @ 160 MHz 26 mBm (DFS)
 +nl80211: 5725-5875 @ 80 MHz 13 mBm
 +nl80211: 57000-66000 @ 2160 MHz 40 mBm
 +nl80211: Added 802.11b mode based on 802.11g information
 +EAPOL: startWhen --> 0
 +EAPOL: disable timer tick
 +wlan0: Control interface command '​SCAN'​
 +wlan0: Setting scan request: 0.000000 sec
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=3
 +wlan0: Starting AP scan for wildcard SSID
 +wlan0: Add radio work '​scan'​@0x1348f90
 +wlan0: First radio work item in the queue - schedule start immediately
 +wlan0: Starting radio work '​scan'​@0x1348f90 after 0.000047 second wait
 +wlan0: nl80211: scan request
 +nl80211: Scan SSID - hexdump_ascii(len=0):​ [NULL]
 +Scan requested (ret=0) - scan timeout 30 seconds
 +nl80211: Event message available
 +nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
 +wlan0: nl80211: Scan trigger
 +wlan0: Event SCAN_STARTED (47) received
 +wlan0: Own scan request started a scan in 0.000200 seconds
 +CTRL-DEBUG: ctrl_sock-sendmsg:​ sock=12 sndbuf=163840 outq=0 send_len=24
 +CTRL_IFACE monitor sent successfully to /​tmp/​dhcpcd-pi/​libdhcpcd-wpa-623.12\x00
 +RTM_NEWLINK:​ ifi_index=3 ifname=wlan0 wext ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
 +nl80211: Event message available
 +nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
 +wlan0: nl80211: New scan results available
 +nl80211: Scan probed for SSID ''​
 +nl80211: Scan included frequencies:​ 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700
 +wlan0: Event SCAN_RESULTS (3) received
 +wlan0: Scan completed in 3.516924 seconds
 +nl80211: Associated on 5700 MHz
 +nl80211: Associated with dc:​08:​56:​13:​1e:​69
 +nl80211: Received scan results (18 BSSes)
 +nl80211: Scan results indicate BSS status with dc:​08:​56:​13:​1e:​69 as associated
 +wlan0: BSS: Start scan result update 2
 +BSS: last_scan_res_used=18/​32
 +wlan0: New scan results available (own=1 ext=0)
 +CTRL-DEBUG: ctrl_sock-sendmsg:​ sock=12 sndbuf=163840 outq=0 send_len=24
 +CTRL_IFACE monitor sent successfully to /​tmp/​dhcpcd-pi/​libdhcpcd-wpa-623.12\x00
 +wlan0: Radio work '​scan'​@0x1348f90 done in 3.523158 seconds
 +wlan0: radio_work_free('​scan'​@0x1348f90:​ num_active_works --> 0
 +wlan0: Selecting BSS from priority group 0
 +wlan0: 0: dc:​08:​56:​00:​1b:​d9 ssid='​V11-Home'​ wpa_ie_len=0 rsn_ie_len=20 caps=0x1511 level=-30 freq=5540 ​
 +wlan0: ​   skip - SSID mismatch
 +wlan0: 1: dc:​08:​56:​00:​29:​19 ssid='​V11-Home'​ wpa_ie_len=0 rsn_ie_len=20 caps=0x1511 level=-49 freq=5300 ​
 +wlan0: ​   skip - SSID mismatch
 +wlan0: 2: dc:​08:​56:​00:​29:​21 ssid='​V11-Home'​ wpa_ie_len=0 rsn_ie_len=20 caps=0x1511 level=-51 freq=5580 ​
 +wlan0: ​   skip - SSID mismatch
 +wlan0: 3: dc:​08:​56:​13:​1e:​69 ssid='​ov44b39'​ wpa_ie_len=0 rsn_ie_len=20 caps=0x511 level=-13 freq=5700 ​
 +wlan0: ​   selected based on RSN IE
 +wlan0: ​   selected BSS dc:​08:​56:​13:​1e:​69 ssid='​ov44b39'​
 +RSN: Ignored PMKID candidate without preauth flag
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=854
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=790
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=806
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=834
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=771
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=647
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=630
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=663
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=484
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=647
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=1085
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=883
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=834
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=913
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=828
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=669
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=980
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=510
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=279
 +CTRL-DEBUG: ctrl_sock-sendto:​ sock=12 sndbuf=163840 outq=0 send_len=0
 +</​code>​
 +
 +===== Verwendeter Kernel =====
 +<​code>​
 +pi@raspberrypi:​~/​hostap_2_6/​wpa_supplicant $ uname -a
 +Linux raspberrypi 4.14.114-v7+ #2 SMP Fri May 17 21:57:57 CEST 2019 armv7l GNU/Linux
 +</​code>​
 +
 +===== Ausgabe vom Stellar AP (tail -f /​tmp/​log/​wam.log) =====
 +<​code>​
 +1558133238.098527:​ Custom wireless event: '​Manage.auth 41 freq=5700'​
 +1558133238.098896:​ freq=5700
 +1558133238.099159:​ atheros_raw_receive:​ subtype 0xb len 41 freq=5700
 +1558133238.099634:​ ath11: Event AUTH (10) received
 +1558133238.099902: ​  New STA
 +1558133238.100917:​ ap_sta_add: register ap_handle_timer timeout for b8:​27:​eb:​ea:​8c:​42 (300 seconds - ap_max_inactivity)
 +1558133238.102770:​ _GOLSOH_[ ov44b39 @ ath11 ]: Receive STA <​b8:​27:​eb:​ea:​8c:​42>​ 80211 Auth event, Auth type OPEN_SYSTEM
 +1558133238.105133:​ start get roam flag
 +1558133238.105403:​ atheros_sta_auth:​ addr=b8:​27:​eb:​ea:​8c:​42 status_code=0
 +1558133238.115416:​ Custom wireless event: '​Manage.assoc_req 157 freq=5700'​
 +1558133238.115744:​ freq=5700
 +1558133238.115980:​ atheros_raw_receive:​ subtype 0x0 len 157 freq=5700
 +1558133238.117359:​ ath11: Event ASSOC (0) received
 +1558133238.118837:​ _GOLSOH_[ ov44b39 @ ath11 ]: Receive STA <​b8:​27:​eb:​ea:​8c:​42>​ 80211 assoc event
 +1558133238.121146:​ _GOLSOH_[ ov44b39 @ ath11 ]: STA <​b8:​27:​eb:​ea:​8c:​42>​ included RSN IE in (Re)AssocReq frame
 +1558133238.122845:​ [ ov44b39 @ ath11 ]: recv sta assoc frame, reassoc 0
 +1558133238.123761:​ RSN IE: STA PMKID - hexdump(len=16):​ 6d bb 3b a2 09 10 22 9e d9 af 7e 9b 57 65 5f 67
 +1558133238.126301:​ _GOLSOH_[ ov44b39 @ ath11 ]: STA <​b8:​27:​eb:​ea:​8c:​42>​ carried 1 PMKID in RSN IE
 +1558133238.127505:​ atheros_sta_assoc:​ addr=b8:​27:​eb:​ea:​8c:​42 status_code=0 reassoc 0
 +1558133238.131594:​ atheros_del_key:​ addr=b8:​27:​eb:​ea:​8c:​42 key_idx=0
 +1558133238.132067:​ hostapd_send_trap,​ send trap ssid ov44b39, type 3
 +1558133238.132509:​ wam_send_msg_to_roamtrace,​ ap mac dc:​08:​56:​13:​1e:​60
 +1558133238.133058:​ wam_send_msg_to_roamtrace,​ ssid ov44b39 ​
 +1558133238.133341:​ wam_send_msg_to_roamtrace,​ sec 1558133238 , usec 132054, sta sec 1558133238, sta usec 132054
 +1558133238.133803:​ wam_send_msg_to_roamtrace,​sizeof msg 176, op 3, assoc timestamp 1558133238.132054,​ auth srv ip 0.0.0.0, auth srv port 0
 +1558133238.134517:​ wam_send_msg_to_roamtrace,​ ap mac dc:​08:​56:​13:​1e:​60
 +1558133238.135057:​ wam_send_msg_to_roamtrace,​ssid ov44b39,
 +1558133238.135334:​ wam_send_msg_to_roamtrace,​authtype 0, iface ath11
 +1558133238.135644:​ wam_send_msg_to_roamtrace,​encrypto type 3,
 +1558133238.135920:​ wam_send_msg_to_roamtrace,​sta mac b8:​27:​eb:​ea:​8c:​42
 +1558133238.136441:​ wam_send_msg_to_roamtrace,​roamtype 0
 +1558133238.136700:​ wam_send_msg_to_roamtrace,​user name 
 +1558133238.137097:​ wam_send_msg_to_roamtrace,​ sendto succ, msg type 3, sizeofmsg 176
 +1558133238.137453:​ IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
 +1558133238.137803:​ WPA: b8:​27:​eb:​ea:​8c:​42 WPA_PTK entering state INITIALIZE
 +1558133238.138392:​ atheros_del_key:​ addr=b8:​27:​eb:​ea:​8c:​42 key_idx=0
 +1558133238.138841:​ atheros_set_sta_authorized:​ addr=b8:​27:​eb:​ea:​8c:​42 authorized=0
 +1558133238.139423:​ WPA: b8:​27:​eb:​ea:​8c:​42 WPA_PTK_GROUP entering state IDLE
 +1558133238.139960:​ WPA: b8:​27:​eb:​ea:​8c:​42 WPA_PTK entering state AUTHENTICATION
 +1558133238.140876:​ WPA: b8:​27:​eb:​ea:​8c:​42 WPA_PTK entering state AUTHENTICATION2
 +1558133238.142333:​ WPA: Assign ANonce - hexdump(len=32):​ 80 7f 37 2e 66 ef 66 66 4c fb 54 33 93 39 3d ac 80 14 ed 55 af 20 59 5e 84 b6 61 2f 9e 3e 75 7a
 +1558133238.146878:​ WPA: b8:​27:​eb:​ea:​8c:​42 WPA_PTK entering state INITPSK
 +1558133238.147518:​ No PSK for STA trying to use SAE with PMKSA caching
 +1558133238.147720:​ SAE: PMK from PMKSA cache
 +1558133238.147925:​ No PSK for STA trying to use SAE with PMKSA caching
 +1558133238.148123:​ WPA: b8:​27:​eb:​ea:​8c:​42 WPA_PTK entering state PTKSTART
 +1558133238.148788:​ RSN: Message 1/4 PMKID from PMKSA entry - hexdump(len=16):​ 6d bb 3b a2 09 10 22 9e d9 af 7e 9b 57 65 5f 67
 +1558133238.150007:​ WPA: Send EAPOL(version=0 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=22 keyidx=0 encr=0)
 +1558133238.150902:​ WPA: Replay Counter - hexdump(len=8):​ 00 00 00 00 00 00 00 01
 +1558133238.151945:​ WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
 +1558133238.152326:​ ath11: hostapd_new_assoc_sta:​ reschedule ap_handle_timer timeout for b8:​27:​eb:​ea:​8c:​42 (300 seconds - ap_max_inactivity)
 +1558133238.153447:​ l2_packet_receive:​ src=b8:​27:​eb:​ea:​8c:​42 len=153
 +1558133238.154149:​ ath11: Event EAPOL_RX (23) received
 +1558133238.154400:​ IEEE 802.1X: 139 bytes from b8:​27:​eb:​ea:​8c:​42
 +1558133238.154945: ​   IEEE 802.1X: version=2 type=3 length=135
 +1558133238.155285:​ WPA: Received EAPOL-Key from b8:​27:​eb:​ea:​8c:​42 key_info=0x108 type=2 mic_len=16 key_data_length=40
 +1558133238.155991:​ WPA: Received Key Nonce - hexdump(len=32):​ a2 b6 ea 4f ad 87 49 e2 b0 e9 87 4e c5 8e 16 39 b1 cf c7 3c 39 e3 cf 1f c3 82 e3 ea 70 55 82 af
 +1558133238.158076:​ WPA: Received Replay Counter - hexdump(len=8):​ 00 00 00 00 00 00 00 01
 +1558133238.159174:​ WPA: b8:​27:​eb:​ea:​8c:​42 WPA_PTK entering state PTKCALCNEGOTIATING
 +1558133238.159707:​ WPA: PTK derivation using PRF(SHA256)
 +1558133238.160429:​ WPA: PTK derivation - A1=dc:​08:​56:​13:​1e:​69 A2=b8:​27:​eb:​ea:​8c:​42
 +1558133238.161297:​ WPA: Nonce1 - hexdump(len=32):​ 80 7f 37 2e 66 ef 66 66 4c fb 54 33 93 39 3d ac 80 14 ed 55 af 20 59 5e 84 b6 61 2f 9e 3e 75 7a
 +1558133238.163380:​ WPA: Nonce2 - hexdump(len=32):​ a2 b6 ea 4f ad 87 49 e2 b0 e9 87 4e c5 8e 16 39 b1 cf c7 3c 39 e3 cf 1f c3 82 e3 ea 70 55 82 af
 +1558133238.165463:​ WPA: PMK - hexdump(len=32):​ [REMOVED]
 +1558133238.165767:​ WPA: PTK - hexdump(len=48):​ [REMOVED]
 +1558133238.166070:​ WPA: KCK - hexdump(len=16):​ [REMOVED]
 +1558133238.166449:​ WPA: KEK - hexdump(len=16):​ [REMOVED]
 +1558133238.166753:​ WPA: TK - hexdump(len=16):​ [REMOVED]
 +1558133238.167062:​ WPA: EAPOL-Key MIC using AES-CMAC (AKM-defined - SAE)
 +1558133238.167433:​ WPA: b8:​27:​eb:​ea:​8c:​42 WPA_PTK entering state PTKCALCNEGOTIATING2
 +1558133238.167969:​ WPA: b8:​27:​eb:​ea:​8c:​42 WPA_PTK entering state PTKINITNEGOTIATING
 +1558133238.168543:​ atheros_get_seqnum:​ addr=00:​00:​00:​00:​00:​00 idx=1
 +1558133238.169102:​ atheros_get_seqnum:​ addr=00:​00:​00:​00:​00:​00 idx=4
 +1558133238.169473:​ atheros: set80211priv:​ ath11: ioctl op=0x89f3 (??) len=76 failed: 22 (Invalid argument)
 +1558133238.170047:​ atheros_get_seqnum:​ Failed to get encryption data (addr ff:​ff:​ff:​ff:​ff:​ff key_idx 4)
 +1558133238.170774:​ WPA: Send EAPOL(version=0 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=76 keyidx=1 encr=1)
 +1558133238.171473:​ WPA: Replay Counter - hexdump(len=8):​ 00 00 00 00 00 00 00 02
 +1558133238.172385:​ Plaintext EAPOL-Key Key Data - hexdump(len=88):​ [REMOVED]
 +1558133238.172691:​ WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
 +1558133238.173277:​ WPA: EAPOL-Key MIC using AES-CMAC (AKM-defined - SAE)
 +1558133238.173737:​ WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
 +1558133238.175687:​ l2_packet_receive:​ src=b8:​27:​eb:​ea:​8c:​42 len=113
 +1558133238.176405:​ ath11: Event EAPOL_RX (23) received
 +1558133238.176652:​ IEEE 802.1X: 99 bytes from b8:​27:​eb:​ea:​8c:​42
 +1558133238.177203: ​   IEEE 802.1X: version=2 type=3 length=95
 +1558133238.177544:​ WPA: Received EAPOL-Key from b8:​27:​eb:​ea:​8c:​42 key_info=0x308 type=2 mic_len=16 key_data_length=0
 +1558133238.178251:​ WPA: Received Key Nonce - hexdump(len=32):​ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 +1558133238.181199:​ WPA: Received Replay Counter - hexdump(len=8):​ 00 00 00 00 00 00 00 02
 +1558133238.182280:​ WPA: EAPOL-Key MIC using AES-CMAC (AKM-defined - SAE)
 +1558133238.182630:​ WPA: b8:​27:​eb:​ea:​8c:​42 WPA_PTK entering state PTKINITDONE
 +1558133238.183226:​ atheros_set_key:​ alg=3 addr=b8:​27:​eb:​ea:​8c:​42 key_idx=0
 +1558133238.185642:​ ath11: AP-STA-CONNECTED b8:​27:​eb:​ea:​8c:​42
 +1558133238.187805:​ _GOLSOH_[ ov44b39 @ ath11 ]: AP-STA-CONNECTED b8:​27:​eb:​ea:​8c:​42
 +1558133238.188736:​ atheros_set_sta_authorized:​ addr=b8:​27:​eb:​ea:​8c:​42 authorized=1
 +1558133238.190501:​ ieee802_1x_set_sta_authorized() ​
 +1558133238.190755:​ hostapd_send_trap,​ send trap ssid ov44b39, type 1
 +1558133238.191079:​ wam_send_msg_to_roamtrace,​ ap mac dc:​08:​56:​13:​1e:​60
 +1558133238.191893:​ wam_send_msg_to_roamtrace,​ ssid ov44b39 ​
 +1558133238.192268:​ wam_send_msg_to_roamtrace,​ sec 1558133238 , usec 132054, sta sec 1558133238, sta usec 132054
 +1558133238.192742:​ wam_send_msg_to_roamtrace,​sizeof msg 176, op 1, assoc timestamp 1558133238.132054,​ auth srv ip 0.0.0.0, auth srv port 0
 +1558133238.193457:​ wam_send_msg_to_roamtrace,​ ap mac dc:​08:​56:​13:​1e:​60
 +1558133238.193998:​ wam_send_msg_to_roamtrace,​ssid ov44b39,
 +1558133238.194344:​ wam_send_msg_to_roamtrace,​authtype 0, iface ath11
 +1558133238.194658:​ wam_send_msg_to_roamtrace,​encrypto type 3,
 +1558133238.194937:​ wam_send_msg_to_roamtrace,​sta mac b8:​27:​eb:​ea:​8c:​42
 +1558133238.195459:​ wam_send_msg_to_roamtrace,​roamtype 0
 +1558133238.195719:​ wam_send_msg_to_roamtrace,​user name 
 +1558133238.196146:​ wam_send_msg_to_roamtrace,​ sendto succ, msg type 1, sizeofmsg 176
 +1558133238.196532:​ wam_authfail_start start
 +1558133238.196778:​ wam_ov_author_proc,​ auth_flag 5, auth_step 5, mac-auth status 1
 +1558133238.197166:​ find index 29
 +1558133238.197399:​ find arp_node: find name =__ov44b39
 +1558133238.199412:​ _GOLSOH_[ ov44b39 @ ath11 ]: Access Role(__ov44b39) from Default (MAC-Auth disable) will be applied to STA <​b8:​27:​eb:​ea:​8c:​42>​
 +1558133238.200564:​ wam_ov_author_proc :​apply_arp.redirect_enable:​0,​ sta->​mac_auth_result:​1,​ apply_arp.ExternalCaptivePortal_flag:​0,​
 +1558133238.200970:​ wam_ov_author_proc :​sta->​cp_auth_success= 0,​sta->​applied_redirect_url=,​ sta->​roam_flag =0 
 +1558133238.202910:​ ap_check_some_conditions_value:​ all conditions isn't satisfied ​
 +1558133238.203116:​ wam_check_send_conditions:​ all conditions don't match
 +
 +1558133238.205257:​ set add macvlan ubus msg: ubus call network.macvlan add_user '​{"​macAddress":"​b8:​27:​eb:​ea:​8c:​42","​vlanID":​12}'​
 +1558133238.258041:​ _GOLSOH_[ ov44b39 @ ath11 ]: Set MAC-vlan, Vlan-ID=[12] for STA <​b8:​27:​eb:​ea:​8c:​42>​
 +1558133238.259020:​ check policylist .
 +1558133238.259258:​ wam_ov_add_policylist,​ policylist : 
 +1558133238.259758:​ set policylist ubus msg: ubus call policy set_user_policy '​{"​macAddress":"​b8:​27:​eb:​ea:​8c:​42","​arpName":"​__ov44b39","​policyListName":"","​ifName":"​ath11","​ssid":"​ov44b39","​gwMacAddr":"","​isolateEnable":​0,"​wlanSvcName":"​ov44b39"​}'​
 +1558133238.307074:​ _GOLSOH_[ ov44b39 @ ath11 ]: Set the PolicyList:​[] from Access Role for STA <​b8:​27:​eb:​ea:​8c:​42>​
 +1558133238.307948:​ wam_ov_ApplyARP : ARP(__ov44b39) applied successful.
 +
 +1558133238.309842:​ gateway_mgr ubus msg: ubus call gateway_mgr adduser '​{"​userMac":"​b8:​27:​eb:​ea:​8c:​42","​gwIp":"​0.0.0.0"​}'​
 +1558133238.353798:​ hostapd_send_userauthor,​ send user author notify ssid ov44b39
 +1558133238.354143:​ wam_send_msg_to_roamtrace,​ ap mac dc:​08:​56:​13:​1e:​60
 +1558133238.354687:​ wam_send_msg_to_roamtrace,​ ssid ov44b39 ​
 +1558133238.354968:​ wam_send_msg_to_roamtrace,​ sec 1558133238 , usec 132054, sta sec 1558133238, sta usec 132054
 +1558133238.355428:​ Unknown msg type 18
 +1558133238.355657:​ wam_send_msg_to_roamtrace,​sizeof msg 176, op 18, assoc timestamp 1558133238.132054,​ auth srv ip 0.0.0.0, auth srv port 0
 +1558133238.356363:​ wam_send_msg_to_roamtrace,​ ap mac dc:​08:​56:​13:​1e:​60
 +1558133238.356905:​ wam_send_msg_to_roamtrace,​ssid ov44b39,
 +1558133238.357181:​ wam_send_msg_to_roamtrace,​authtype 0, iface ath11
 +1558133238.357490:​ wam_send_msg_to_roamtrace,​encrypto type 3,
 +1558133238.357771:​ wam_send_msg_to_roamtrace,​sta mac b8:​27:​eb:​ea:​8c:​42
 +1558133238.358288:​ wam_send_msg_to_roamtrace,​roamtype 0
 +1558133238.358542:​ wam_send_msg_to_roamtrace,​user name 
 +1558133238.358940:​ wam_send_msg_to_roamtrace,​ sendto succ, msg type 18, sizeofmsg 176
 +1558133238.359946:​ wam send event sta_info_notify,​ success
 +1558133238.360377:​ send_add_user_sync_info enter
 +1558133238.360969:​ enter send time 288887--s,​220893--us
 +1558133238.361300:​ send_ovmode_user_sync_info sta sync size 580
 +1558133238.361573:​ send_ovmode_user_sync_info,​ send cp success 0, mac-au success 0
 +1558133238.361893:​ send_ovmode_user_sync_info,​ append arp name __ov44b39
 +1558133238.362165:​ send user sync info dc:​08:​56:​13:​1e:​69iface ath11,​b8:​27:​eb:​ea:​8c:​42,​ ssid ov44b39,​ipv4 0.0.0.0,​userGlobalIPv6 ::, userLocalIPv6 ::, wlan ov44b39, arp __ov44b39
 +1558133238.368983:​ sta->​sync_type 0, cnt 2
 +1558133238.369273:​ sta_add_UserInfoToOtherbss,​ iface ath11
 +1558133238.369549:​ sta_add_UserInfoToOtherbss,​ find other bss ifname ath01, dc:​08:​56:​13:​1e:​61,​ own ifname ath11, dc:​08:​56:​13:​1e:​69
 +1558133238.373071:​ _GOLSOH_[ ov44b39 @ ath01 ]: receive STA <​b8:​27:​eb:​ea:​8c:​42>​ roaming context, ip 0.0.0.0,​userGlobalIPv6 ::, userLocalIPv6 ::, portal Auth success 0, roam flag 0, Sta applied access role __ov44b39, home ap 192.168.10.12
 +1558133238.373958:​ find index 29
 +1558133238.374193:​ find arp_node: find name =__ov44b39
 +1558133238.375478:​ _GOLSOH_save STA <​b8:​27:​eb:​ea:​8c:​42>​ roaming context in current AP
 +1558133238.377698:​ _GOLSOH_[ ov44b39 @ ath11 ]: send SYNC_ADD message to neighbors, STA <​b8:​27:​eb:​ea:​8c:​42>​ applied access role __ov44b39, sync_type 0, portal Auth fail
 +1558133238.378579:​ before nblist time 288887--s,​238505--us
 +1558133238.379067:​ 1558133238.379216:​ ath11: STA b8:​27:​eb:​ea:​8c:​42 WPA: pairwise key handshake completed (RSN)
 +1558133238.382039:​ _GOLSOH_[ ov44b39 @ ath11 ]: STA b8:​27:​eb:​ea:​8c:​42 - pairwise key handshake completed
 +1558133238.475352:​ ######​handle_dhcp_ipv6....#########​
 +1558133238.874458:​ ######​handle_dhcp....#########​
 +1558133238.876247:​ _GOLSOH_[ ov44b39 @ ath11 ]: dhcp_snoop: Found DHCPACK for STA b8:​27:​eb:​ea:​8c:​42 @ IPv4 address 192.168.12.115/​24
 +1558133238.877120:​ handle_dhcp,​ don't add sta route,​because function return is -1 or -2 
 +1558133238.877331:​ get_sta_all_ip6addr:​ ipv6_num = 0 
 +1558133238.877745:​ send message to track successful ​
 +1558133238.878010:​ handle_dhcp,​ (2)sta->​sta_gateway = 192.168.12.254 ​
 +1558133238.878410:​ gateway_mgr ubus msg: ubus call gateway_mgr adduser '​{"​userMac":"​b8:​27:​eb:​ea:​8c:​42","​gwIp":"​192.168.12.254"​}'​
 +1558133238.925232:​ send_add_user_sync_info enter
 +1558133238.925579:​ enter send time 288887--s,​785502--us
 +1558133238.925915:​ send_ovmode_user_sync_info sta sync size 580
 +1558133238.926239:​ send_ovmode_user_sync_info,​ send cp success 0, mac-au success 0
 +1558133238.926684:​ send_ovmode_user_sync_info,​ append arp name __ov44b39
 +1558133238.927013:​ send user sync info dc:​08:​56:​13:​1e:​69iface ath11,​b8:​27:​eb:​ea:​8c:​42,​ ssid ov44b39,​ipv4 192.168.12.115,​userGlobalIPv6 ::, userLocalIPv6 ::, wlan ov44b39, arp __ov44b39
 +1558133238.930578:​ sta->​sync_type 0, cnt 2
 +1558133238.930946:​ sta_add_UserInfoToOtherbss,​ iface ath11
 +1558133238.931295:​ sta_add_UserInfoToOtherbss,​ find other bss ifname ath01, dc:​08:​56:​13:​1e:​61,​ own ifname ath11, dc:​08:​56:​13:​1e:​69
 +1558133238.935488:​ _GOLSOH_[ ov44b39 @ ath01 ]: receive STA <​b8:​27:​eb:​ea:​8c:​42>​ roaming context, ip 192.168.12.115,​userGlobalIPv6 ::, userLocalIPv6 ::, portal Auth success 0, roam flag 0, Sta applied access role __ov44b39, home ap 192.168.10.12
 +1558133238.936418:​ find index 29
 +1558133238.936652:​ find arp_node: find name =__ov44b39
 +1558133238.938383:​ _GOLSOH_delete STA <​b8:​27:​eb:​ea:​8c:​42>​ roaming context in current AP
 +1558133238.941032:​ _GOLSOH_save STA <​b8:​27:​eb:​ea:​8c:​42>​ roaming context in current AP
 +1558133238.943818:​ _GOLSOH_[ ov44b39 @ ath11 ]: send SYNC_ADD message to neighbors, STA <​b8:​27:​eb:​ea:​8c:​42>​ applied access role __ov44b39, sync_type 0, portal Auth fail
 +1558133238.945354:​ before nblist time 288887--s,​805277--us
 +1558133238.946090:​ ######​handle_dhcp....#########​
 +1558133238.946656:​ ######​handle_dhcp....#########​
 +1558133238.947198:​ ######​handle_dhcp....#########​
 +1558133239.170348:​ send message to adme successful, operation = 1, megtype = 1
 +1558133239.504466:​ ######​handle_dhcp_ipv6....#########​
 +1558133239.505199:​ _GOLSOH_[ ov44b39 @ ath11 ]: handle_dhcpv6_icmpv6:​ Found DHCPv6 ACK for STA b8:​27:​eb:​ea:​8c:​42 @ IPv6 address fe80::​13de:​b443:​e411:​7bc7 ​
 +1558133239.505657:​ handle_dhcpv6_icmpv6,​ don't add sta route,​because function return is -1 or -2 
 +1558133239.505785:​ get_sta_all_ip6addr:​ IPv6 address fe80::​13de:​b443:​e411:​7bc7 ​
 +1558133239.505899:​ get_sta_all_ip6addr:​ ipv6_num = 1 
 +1558133239.506185:​ send message to track successful ​
 +1558133239.506333:​ get_sta_global_or_local_ip6addr:​ get IPv6 local-address for b8:​27:​eb:​ea:​8c:​42
 +1558133239.510433:​ wam send event sta_info_notify,​ success
 +1558133239.510575:​ send_add_user_sync_info enter
 +1558133239.510681:​ enter send time 288888--s,​370614--us
 +1558133239.510815:​ send_ovmode_user_sync_info sta sync size 580
 +1558133239.510926:​ send_ovmode_user_sync_info,​ send cp success 0, mac-au success 0
 +1558133239.511055:​ get_sta_global_or_local_ip6addr:​ get IPv6 local-address for b8:​27:​eb:​ea:​8c:​42
 +1558133239.511272:​ send_ovmode_user_sync_info,​ append arp name __ov44b39
 +1558133239.511403:​ send user sync info dc:​08:​56:​13:​1e:​69iface ath11,​b8:​27:​eb:​ea:​8c:​42,​ ssid ov44b39,​ipv4 192.168.12.115,​userGlobalIPv6 ::, userLocalIPv6 fe80::​13de:​b443:​e411:​7bc7,​ wlan ov44b39, arp __ov44b39
 +1558133239.512712:​ sta->​sync_type 0, cnt 2
 +1558133239.512833:​ sta_add_UserInfoToOtherbss,​ iface ath11
 +1558133239.512945:​ sta_add_UserInfoToOtherbss,​ find other bss ifname ath01, dc:​08:​56:​13:​1e:​61,​ own ifname ath11, dc:​08:​56:​13:​1e:​69
 +1558133239.514262:​ _GOLSOH_[ ov44b39 @ ath01 ]: receive STA <​b8:​27:​eb:​ea:​8c:​42>​ roaming context, ip 192.168.12.115,​userGlobalIPv6 ::, userLocalIPv6 ::, portal Auth success 0, roam flag 0, Sta applied access role __ov44b39, home ap 192.168.10.12
 +1558133239.514627:​ find index 29
 +1558133239.514721:​ find arp_node: find name =__ov44b39
 +1558133239.515244:​ _GOLSOH_delete STA <​b8:​27:​eb:​ea:​8c:​42>​ roaming context in current AP
 +1558133239.516041:​ _GOLSOH_save STA <​b8:​27:​eb:​ea:​8c:​42>​ roaming context in current AP
 +1558133239.516957:​ _GOLSOH_[ ov44b39 @ ath11 ]: send SYNC_ADD message to neighbors, STA <​b8:​27:​eb:​ea:​8c:​42>​ applied access role __ov44b39, sync_type 0, portal Auth fail
 +1558133239.517315:​ before nblist time 288888--s,​377247--us
 +1558133241.059063:​ Global ctrl_iface command: STA_LIST
 +</​code>​
 +
 +===== Howto: Schritte um dies zu erreichen =====
 +
 +  * Die Webseite für [[https://​community.cypress.com/​docs/​DOC-17441|Cypress Linux WiFi Driver Release (FMAC) [2019-05-08]]] besuchen und das Archiv herunterladen
 +  * Der Versuch den dort beschriebenen v4.14.77 Kernel für den Raspberry Pi zu bauen, wird vermutlich am Regenbogen Bildschirm gleich beim Start scheitern - daher besser den folgenden Hinweisen für einen aktuellen Raspi Kernel folgen
 +
 +==== Cross-Compiling des eigenen Linux Kernel ====
 +Ich habe mich für cross-compile des Raspi Linux Kernel auf Ubuntu 19.04 entschieden,​ dies sollte aber auch mit jeder anderen Distribution ähnlich funktionieren.
 +
 +<​code>​
 +# Installieren einiger Pakete die benötigt werden
 +sudo apt-get install git bison flex libssl-dev
 +
 +# Die "​tool-chain"​ für den Raspi herunterladen
 +git clone https://​github.com/​raspberrypi/​tools ~/tools
 +
 +# Voraussetzungen bzgl. Zugriff auf diese neuen Werkzeuge erfüllen
 +echo PATH=\$PATH:​~/​tools/​arm-bcm2708/​gcc-linaro-arm-linux-gnueabihf-raspbian-x64/​bin >> ~/.bashrc
 +source ~/.bashrc
 +
 +# Herunterladen des Raspberry Pi 4.14 Kernel Source
 +git clone --depth=1 --branch rpi-4.14.y https://​github.com/​raspberrypi/​linux
 +
 +# Entpacken des Cypress Archives und verschieben/​kopieren des cypress-patch Verzeichnisses in das Kernel Source Wurzelverzeichnis
 +tar xvzf cypress-patch-v4.14.77-2019_0503.tar.gz
 +cd linux
 +cp -r ../​cypress/​cypress-patch .
 +
 +# Die Patches anwenden, dabei einfach alles akzeptieren - die Korrekturen nehmen wir gleich manuell vor 
 +for i in cypress-patch/​*.patch;​ do patch -p1 < $i; done
 +
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​bus.h
 +Reversed (or previously applied) patch detected! ​ Assume -R? [n] 
 +Apply anyway? [n] 
 +Skipping patch.
 +3 out of 3 hunks ignored -- saving rejects to file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​bus.h.rej
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​common.c
 +Reversed (or previously applied) patch detected! ​ Assume -R? [n] 
 +Apply anyway? [n] 
 +Skipping patch.
 +5 out of 5 hunks ignored -- saving rejects to file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​common.c.rej
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​core.c
 +Hunk #1 succeeded at 989 (offset 39 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​core.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​fwil_types.h
 +Hunk #1 succeeded at 171 with fuzz 2 (offset 16 lines).
 +Hunk #2 succeeded at 858 (offset 16 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​pcie.c
 +Reversed (or previously applied) patch detected! ​ Assume -R? [n] 
 +Apply anyway? [n] 
 +Skipping patch.
 +2 out of 2 hunks ignored -- saving rejects to file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​pcie.c.rej
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Reversed (or previously applied) patch detected! ​ Assume -R? [n] 
 +Apply anyway? [n] 
 +Skipping patch.
 +2 out of 2 hunks ignored -- saving rejects to file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c.rej
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​usb.c
 +Reversed (or previously applied) patch detected! ​ Assume -R? [n] 
 +Apply anyway? [n] 
 +Skipping patch.
 +1 out of 1 hunk ignored -- saving rejects to file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​usb.c.rej
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​bcmsdh.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #3 succeeded at 4024 (offset 1 line).
 +Hunk #4 succeeded at 4080 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​of.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​vendor.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​bcmsdh.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​chip.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #1 succeeded at 625 (offset 1 line).
 +Hunk #2 succeeded at 645 (offset 1 line).
 +Hunk #3 succeeded at 707 (offset 1 line).
 +Hunk #4 succeeded at 2459 (offset 1 line).
 +Hunk #5 succeeded at 4080 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​include/​brcm_hw_ids.h
 +patching file include/​linux/​mmc/​sdio_ids.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 4581 (offset -39 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​chip.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #1 succeeded at 3366 (offset 1 line).
 +Hunk #2 succeeded at 4119 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​chip.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​common.c
 +Hunk #2 succeeded at 186 with fuzz 2 (offset 14 lines).
 +Hunk #3 FAILED at 183.
 +1 out of 3 hunks FAILED -- saving rejects to file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​common.c.rej
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​feature.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #1 succeeded at 2330 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #2 succeeded at 4121 (offset 1 line).
 +Hunk #3 succeeded at 4128 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #3 succeeded at 2557 (offset 1 line).
 +Hunk #4 succeeded at 2777 (offset 1 line).
 +Hunk #5 succeeded at 3634 (offset 1 line).
 +Hunk #6 succeeded at 4333 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​include/​chipcommon.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 1719 (offset -41 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​include/​brcmu_wifi.h
 +Hunk #1 succeeded at 239 (offset 2 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 5218 (offset -39 lines).
 +Hunk #2 succeeded at 5283 (offset -39 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #1 succeeded at 2568 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​pno.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​common.c
 +Hunk #2 succeeded at 469 (offset 11 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​common.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #2 succeeded at 2705 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 6686 (offset -38 lines).
 +Hunk #2 succeeded at 6711 (offset -38 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​common.c
 +Hunk #2 succeeded at 473 (offset 11 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​common.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 3667 (offset -39 lines).
 +Hunk #2 succeeded at 3729 (offset -39 lines).
 +Hunk #3 succeeded at 3778 (offset -39 lines).
 +Hunk #4 succeeded at 6540 (offset -38 lines).
 +Hunk #5 succeeded at 6563 (offset -38 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​common.c
 +Hunk #1 succeeded at 281 with fuzz 2 (offset 20 lines).
 +Hunk #2 succeeded at 398 (offset 11 lines).
 +Hunk #3 succeeded at 474 (offset 11 lines).
 +Hunk #4 succeeded at 562 (offset 11 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​core.c
 +Hunk #1 succeeded at 1237 (offset 39 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​core.h
 +Hunk #4 succeeded at 220 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​fwil_types.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 3758 (offset -39 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​pcie.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​include/​brcm_hw_ids.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​fwsignal.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​common.c
 +Hunk #2 succeeded at 476 (offset 11 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #2 succeeded at 2704 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​common.c
 +Hunk #2 succeeded at 480 (offset 11 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​common.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #1 succeeded at 4352 (offset 1 line).
 +Hunk #2 succeeded at 4369 (offset 1 line).
 +Hunk #3 succeeded at 4392 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​fwsignal.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 1721 (offset -41 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​core.c
 +Hunk #1 succeeded at 452 (offset 39 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #1 succeeded at 4352 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #1 succeeded at 3524 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​common.c
 +Hunk #2 succeeded at 192 with fuzz 2 (offset 14 lines).
 +Hunk #3 FAILED at 188.
 +1 out of 3 hunks FAILED -- saving rejects to file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​common.c.rej
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​common.c
 +Hunk #1 FAILED at 190.
 +1 out of 1 hunk FAILED -- saving rejects to file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​common.c.rej
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 6638 (offset -38 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​p2p.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​p2p.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #1 succeeded at 3532 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​fwsignal.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​p2p.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​p2p.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​p2p.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​chip.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 5428 (offset -39 lines).
 +Hunk #2 succeeded at 5590 (offset -39 lines).
 +Hunk #3 succeeded at 5911 (offset -39 lines).
 +Hunk #4 succeeded at 6025 (offset -39 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​common.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​fwsignal.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #2 succeeded at 2916 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​chip.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 6903 (offset -38 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​common.c
 +Hunk #2 succeeded at 482 (offset 21 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​common.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​fwil.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​fwsignal.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #2 succeeded at 519 (offset -41 lines).
 +Hunk #3 succeeded at 579 (offset -41 lines).
 +Hunk #4 succeeded at 681 (offset -41 lines).
 +Hunk #5 succeeded at 806 (offset -41 lines).
 +Hunk #6 succeeded at 863 (offset -41 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​core.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 6619 (offset -38 lines).
 +Hunk #2 succeeded at 6633 (offset -38 lines).
 +Hunk #3 succeeded at 6644 (offset -38 lines).
 +Hunk #4 succeeded at 6662 (offset -38 lines).
 +Hunk #5 succeeded at 6700 (offset -38 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 5358 (offset -39 lines).
 +Hunk #2 succeeded at 5371 (offset -39 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​p2p.c
 +Hunk #3 succeeded at 2023 (offset -1 lines).
 +Hunk #4 succeeded at 2169 (offset -1 lines).
 +Hunk #5 succeeded at 2208 (offset -1 lines).
 +Hunk #6 succeeded at 2236 (offset -1 lines).
 +Hunk #7 succeeded at 2282 (offset -1 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​p2p.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​bcmsdh.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​chip.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #1 succeeded at 622 (offset 1 line).
 +Hunk #2 succeeded at 644 (offset 1 line).
 +patching file include/​linux/​mmc/​sdio_ids.h
 +patching file include/​net/​cfg80211.h
 +patching file include/​uapi/​linux/​nl80211.h
 +patching file net/​wireless/​core.h
 +patching file net/​wireless/​nl80211.c
 +Hunk #1 succeeded at 13821 (offset 10 lines).
 +Hunk #2 succeeded at 13835 (offset 10 lines).
 +patching file net/​wireless/​nl80211.h
 +patching file net/​wireless/​sme.c
 +patching file net/​wireless/​util.c
 +patching file net/​wireless/​nl80211.c
 +Hunk #1 succeeded at 13851 (offset 10 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 5411 (offset -39 lines).
 +Hunk #2 succeeded at 5428 (offset -39 lines).
 +Hunk #3 succeeded at 5772 (offset -39 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 1733 (offset -41 lines).
 +Hunk #2 succeeded at 1778 (offset -41 lines).
 +Hunk #3 succeeded at 5737 (offset -39 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​common.c
 +Hunk #2 succeeded at 276 with fuzz 2 (offset 23 lines).
 +Hunk #3 succeeded at 383 (offset 21 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​debug.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​fweh.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #2 succeeded at 1097 (offset 1 line).
 +Hunk #3 succeeded at 1175 (offset 1 line).
 +Hunk #4 succeeded at 2569 (offset 1 line).
 +Hunk #5 succeeded at 2610 (offset 1 line).
 +Hunk #6 succeeded at 2680 (offset 1 line).
 +Hunk #7 succeeded at 2796 (offset 1 line).
 +Hunk #8 succeeded at 2845 (offset 1 line).
 +Hunk #9 succeeded at 4255 (offset 1 line).
 +Hunk #10 succeeded at 4335 (offset 1 line).
 +Hunk #11 succeeded at 4383 (offset 1 line).
 +Hunk #12 succeeded at 4634 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #1 succeeded at 3568 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 4380 (offset -39 lines).
 +Hunk #2 succeeded at 4534 (offset -39 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​chip.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​chip.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #1 succeeded at 4579 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​include/​chipcommon.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #2 succeeded at 4325 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​pcie.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​include/​brcm_hw_ids.h
 +patching file net/​wireless/​nl80211.c
 +Hunk #1 succeeded at 3864 (offset 1 line).
 +patching file include/​uapi/​linux/​nl80211.h
 +patching file include/​uapi/​linux/​nl80211.h
 +patching file net/​wireless/​nl80211.c
 +Hunk #1 succeeded at 7968 (offset 1 line).
 +patching file include/​linux/​ieee80211.h
 +patching file include/​net/​cfg80211.h
 +patching file include/​uapi/​linux/​nl80211.h
 +patching file net/​wireless/​nl80211.c
 +Hunk #2 succeeded at 3867 (offset 1 line).
 +Hunk #3 succeeded at 8187 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 1382 (offset -41 lines).
 +Hunk #2 succeeded at 1620 (offset -41 lines).
 +Hunk #3 succeeded at 1652 (offset -41 lines).
 +Hunk #4 succeeded at 1821 (offset -41 lines).
 +Hunk #5 succeeded at 1903 (offset -41 lines).
 +Hunk #6 succeeded at 2109 (offset -41 lines).
 +Hunk #7 succeeded at 2128 (offset -41 lines).
 +Hunk #8 succeeded at 5489 (offset -39 lines).
 +Hunk #9 succeeded at 6973 (offset -38 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​feature.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​feature.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​fwil_types.h
 +Hunk #2 succeeded at 537 (offset 16 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​include/​brcmu_wifi.h
 +Hunk #1 succeeded at 242 (offset 2 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #2 succeeded at 4343 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 2934 (offset -39 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​fwsignal.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​usb.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 6987 (offset -38 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​fwsignal.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​usb.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​chip.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​chip.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​pcie.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​chip.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 2896 (offset -39 lines).
 +Hunk #2 succeeded at 7059 (offset -38 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​common.c
 +Hunk #3 succeeded at 528 (offset 21 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​common.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 3891 (offset -39 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 2132 (offset -41 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #1 succeeded at 3847 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​fwsignal.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 6711 (offset -38 lines).
 +Hunk #2 succeeded at 6726 (offset -38 lines).
 +Hunk #3 succeeded at 6772 (offset -38 lines).
 +Hunk #4 succeeded at 6781 (offset -38 lines).
 +Hunk #5 succeeded at 6800 (offset -38 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #2 succeeded at 506 (offset -41 lines).
 +Hunk #3 succeeded at 530 (offset -41 lines).
 +Hunk #4 succeeded at 625 (offset -41 lines).
 +Hunk #5 succeeded at 750 (offset -41 lines).
 +Hunk #6 succeeded at 807 (offset -41 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​core.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​core.c
 +Hunk #1 succeeded at 409 (offset 39 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​fwsignal.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​bus.h
 +Hunk #1 succeeded at 259 (offset 3 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​core.c
 +Hunk #1 succeeded at 967 (offset 39 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​debug.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​debug.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​usb.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​fwil_types.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #1 succeeded at 3574 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​fwil_types.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 6872 (offset -38 lines).
 +Hunk #2 succeeded at 6943 (offset -38 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​fweh.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​vendor.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​vendor.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​usb.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​bus.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​fwsignal.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​usb.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 6633 (offset -38 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​usb.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​pcie.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​chip.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #1 succeeded at 4603 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #2 succeeded at 1119 (offset 1 line).
 +Hunk #3 succeeded at 1180 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​debug.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #2 succeeded at 6012 (offset -39 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​fwsignal.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​fwsignal.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​p2p.c
 +patching file include/​net/​cfg80211.h
 +patching file include/​uapi/​linux/​nl80211.h
 +patching file net/​wireless/​nl80211.c
 +Hunk #1 succeeded at 13837 (offset 10 lines).
 +patching file net/​wireless/​sme.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 5751 (offset -39 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​msgbuf.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​p2p.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 5544 (offset -39 lines).
 +Hunk #2 succeeded at 5615 (offset -39 lines).
 +Hunk #3 succeeded at 6028 (offset -39 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 5718 (offset -39 lines).
 +Hunk #2 succeeded at 5819 (offset -39 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​core.c
 +Hunk #1 succeeded at 1184 (offset 39 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​msgbuf.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​bcmsdh.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 3710 (offset -39 lines).
 +Hunk #2 succeeded at 3748 (offset -39 lines).
 +Hunk #3 succeeded at 3818 (offset -39 lines).
 +Hunk #4 succeeded at 3865 (offset -39 lines).
 +Hunk #5 succeeded at 7425 (offset -28 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​pcie.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​usb.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #2 succeeded at 4359 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​bcmsdh.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​sdio.c
 +Hunk #2 succeeded at 4386 (offset 1 line).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​core.c
 +Hunk #1 succeeded at 383 (offset 39 lines).
 +Hunk #2 succeeded at 401 (offset 39 lines).
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​fweh.h
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​msgbuf.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 3610 (offset -39 lines).
 +patching file include/​net/​cfg80211.h
 +patching file net/​wireless/​nl80211.c
 +Hunk #1 succeeded at 13782 (offset 10 lines).
 +patching file net/​wireless/​sme.c
 +patching file drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​cfg80211.c
 +Hunk #1 succeeded at 5885 (offset -39 lines).
 +
 +# Nun müssen wir manuell eine Datei korrigieren,​ die sich seit den Cypress Patches etwas geändert hat 
 +vi drivers/​net/​wireless/​broadcom/​brcm80211/​brcmfmac/​fwil_types.h
 +
 +# In Zeile 1011 die folgende Definition komplett auskommentieren
 +# Da dies zweimal definiert ist, würde die Kompilierung später fehlschlagen (vergl. Zeile 894)
 +/**
 + * struct brcmf_dload_data_le - data passing to firmware for downloading
 + */
 +/*struct brcmf_dload_data_le {
 +*       ​__le16 flag;
 +*       ​__le16 dload_type;
 +*       ​__le32 len;
 +*       ​__le32 crc;
 +*       u8 data[1];
 +};*/
 +
 +# Sicherstellen dass wir den richtigen Kernel erzeugen ...
 +export KERNEL=kernel7
 +
 +# Ich habe mich für "​bcm2709_defconfig"​ entschieden
 +make ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- bcm2709_defconfig
 +
 +# Kernel kompilieren
 +make -j2 ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- zImage modules dtbs
 +
 +# Erzeugen eines Verzeichnisses um die Module zu sammeln
 +mkdir /​tmp/​modules
 +
 +# Die Module dort sammeln
 +make ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- INSTALL_MOD_PATH=/​tmp/​modules modules_install
 +
 +# Nun müssen der Kernel und die Module noch auf den Raspberry Pi kopiert werden
 +cd arch/​arm/​boot/​
 +scp zImage pi@192.168.2.153:​
 +
 +# Module
 +cd /​tmp/​modules
 +tar czf newmodules.tar.gz lib/
 +scp newmodules.tar.gz pi@192.168.2.153:​
 +
 +#
 +# Auf dem Raspberry Pi: 
 +#  - "​zImage"​ sollte einen passenderen Namen bekommen (z.B. kernelwifi.img) und nach /boot verschoben/​kopiert werden
 +#  - Sicherstellen dass die Zeile "​kernel=kernelwifi.img"​ am Ende der /​boot/​config.txt eingefügt wird
 +#  - Entpacken der Module (newmodules.tar.gz) bzw. 4.14.114-v7+ Verzeichnis nach /​lib/​modules
 +#  - Sicherheitskopie des /​lib/​firmware/​brcm Verzeichnisses erstellen
 +#  - SCP des cypress-firmware-v4.14.77-2019_0503.tar.gz Firmware Pakets auf den Raspberry Pi und entpacken und verschieben in den Zielordner
 +#  - tar xvzf cypress-firmware-v4.14.77-2019_0503.tar.gz
 +#  - sudo cp firmware/* /​lib/​firmware/​brcm/​
 +</​code>​
 +
 +==== Kompilieren und Patchen des hostap/​wpa_supplicant ====
 +<​code>​
 +# Herunterladen des hostap_2_6 Pakets
 +
 +wget https://​w1.fi/​cgit/​hostap/​snapshot/​hostap_2_6.tar.gz
 +--2019-05-17 22:​24:​40-- ​ https://​w1.fi/​cgit/​hostap/​snapshot/​hostap_2_6.tar.gz
 +Resolving w1.fi (w1.fi)... 212.71.239.96
 +Connecting to w1.fi (w1.fi)|212.71.239.96|:​443... connected.
 +HTTP request sent, awaiting response... 200 OK
 +Length: unspecified [application/​x-gzip]
 +Saving to: ‘hostap_2_6.tar.gz’
 +
 +hostap_2_6.tar.gz ​                                  ​[ ​  <​=> ​                                                                                                ​] ​  ​3.49M ​ 7.79MB/​s ​   in 0.4s    ​
 +
 +2019-05-17 22:24:42 (7.79 MB/s) - ‘hostap_2_6.tar.gz’ saved [3657570]
 +
 +# Entpacken des Archives
 +tar xvzf hostap_2_6.tar.gz ​
 +
 +# SCP und entpacken des hostap_2_6 patch Archives von Cypress ​
 +tar xvzf cypress-hostap_2_6-2019_0502.tar.gz ​
 +
 +# Verschieben der Patches in das hostap Verzeichnis
 +mv cypress-hostap_2_6 hostap_2_6
 +cd hostap_2_6/
 +
 +# Anwenden der Cypress Patches
 +for i in cypress-hostap_2_6/​*.patch;​ do patch -p1 < $i; done
 +
 +patching file src/​ap/​ieee802_11.c
 +patching file src/​ap/​wpa_auth.c
 +patching file src/​ap/​wpa_auth.h
 +patching file src/​ap/​wpa_auth_ft.c
 +patching file src/​ap/​wpa_auth_i.h
 +patching file src/​common/​wpa_common.h
 +patching file src/​rsn_supp/​wpa.c
 +patching file src/​rsn_supp/​wpa_i.h
 +patching file src/​rsn_supp/​wpa.c
 +patching file src/​rsn_supp/​wpa_i.h
 +patching file src/​common/​wpa_common.h
 +patching file src/​rsn_supp/​wpa.c
 +patching file src/​rsn_supp/​wpa_i.h
 +patching file src/​ap/​wpa_auth.c
 +patching file src/​rsn_supp/​tdls.c
 +patching file wpa_supplicant/​wnm_sta.c
 +patching file src/​rsn_supp/​wpa.c
 +patching file src/​rsn_supp/​wpa_ft.c
 +patching file src/​rsn_supp/​wpa_i.h
 +patching file src/​drivers/​nl80211_copy.h
 +patching file src/​drivers/​nl80211_copy.h
 +patching file src/​drivers/​nl80211_copy.h
 +patching file src/​drivers/​nl80211_copy.h
 +patching file src/​drivers/​nl80211_copy.h
 +patching file src/​drivers/​nl80211_copy.h
 +patching file src/​drivers/​nl80211_copy.h
 +patching file src/​drivers/​driver_nl80211.c
 +patching file src/​drivers/​driver_nl80211_capa.c
 +patching file src/​drivers/​driver_nl80211.c
 +patching file src/​drivers/​driver.h
 +patching file src/​drivers/​driver_common.c
 +patching file src/​drivers/​driver_nl80211_event.c
 +patching file wpa_supplicant/​events.c
 +patching file wpa_supplicant/​wpa_supplicant.c
 +patching file src/​drivers/​driver_nl80211.c
 +patching file src/​drivers/​nl80211_copy.h
 +patching file src/​drivers/​nl80211_copy.h
 +patching file src/​drivers/​nl80211_copy.h
 +patching file wpa_supplicant/​config.c
 +patching file wpa_supplicant/​config_file.c
 +patching file wpa_supplicant/​config_ssid.h
 +patching file wpa_supplicant/​config_winreg.c
 +patching file wpa_supplicant/​mesh_rsn.c
 +patching file wpa_supplicant/​sme.c
 +patching file wpa_supplicant/​wpa_supplicant.c
 +patching file wpa_supplicant/​wpa_supplicant.conf
 +patching file wpa_supplicant/​wpa_supplicant.conf
 +patching file wpa_supplicant/​wpa_supplicant.c
 +patching file wpa_supplicant/​sme.c
 +patching file wpa_supplicant/​wpa_supplicant.c
 +patching file src/​drivers/​driver_nl80211.c
 +patching file src/​drivers/​nl80211_copy.h
 +patching file src/​drivers/​driver.h
 +patching file src/​drivers/​driver_nl80211_capa.c
 +patching file src/​drivers/​driver.h
 +patching file src/​drivers/​driver_nl80211.c
 +patching file wpa_supplicant/​wpa_supplicant.c
 +patching file src/​rsn_supp/​wpa.c
 +patching file src/​drivers/​driver_nl80211_event.c
 +patching file wpa_supplicant/​wpas_glue.c
 +
 +# In das wpa_supplicant Verzeichnis wechseln
 +cd wpa_supplicant/​
 +
 +# Die Datei defconfig nach .config kopieren
 +cp defconfig .config
 +
 +# Die Datei .config editieren und folgende Zeilen hinzufügen
 +vi .config
 +
 +CONFIG_IEEE80211W=y
 +CONFIG_SAE=y
 +CONFIG_SUITEB=y
 +
 +# Installieren des libssl-dev Pakets um sicherzustellen dass alles klappt
 +sudo apt-get install libssl-dev libnl-dev
 +
 +# Abhängig vom System werden evtl. noch libnl Pakete benötigt
 +# Dies sind die libnl Pakete die bei mir installiert sind
 +dpkg -l | grep libnl
 +ii  libnl-3-200:​armhf ​                    ​3.2.27-2 ​                         armhf        library for dealing with netlink sockets
 +ii  libnl-cli-3-200:​armhf ​                ​3.2.27-2 ​                         armhf        library for dealing with netlink sockets - cli helpers
 +ii  libnl-dev ​                            ​1.1-8 ​                            ​armhf ​       development library and headers for libnl
 +ii  libnl-genl-3-200:​armhf ​               3.2.27-2 ​                         armhf        library for dealing with netlink sockets - generic netlink
 +ii  libnl-nf-3-200:​armhf ​                 3.2.27-2 ​                         armhf        library for dealing with netlink sockets - netfilter interface
 +ii  libnl-route-3-200:​armhf ​              ​3.2.27-2 ​                         armhf        library for dealing with netlink sockets - route interface
 +ii  libnl1:​armhf ​                         1.1-8                             ​armhf ​       library for dealing with netlink sockets
 +
 +# Aktuell würde der Versuch dies zu kompilieren noch fehlschlagen,​ daher müssen wir einige Deklarationen auskommentieren
 +vi ../​src/​drivers/​driver_nl80211.c
 +
 +# Zu Zeile 4969 wechseln und folgende Einträge auskommentieren
 +# Dies betrifft nur "Fast Transition"​ also 802.11r, für ein stationären Raspberry Pi eher verzichtbar
 +/*              case WPA_KEY_MGMT_FT_IEEE8021X:​
 +                        mgmt = RSN_AUTH_KEY_MGMT_FT_802_1X;​
 +                        break;
 +                case WPA_KEY_MGMT_FT_PSK:​
 +                        mgmt = RSN_AUTH_KEY_MGMT_FT_PSK;​
 +                        break;*/
 +
 +# Kompilieren
 +make
 +
 +</​code>​
 +
 +==== Inhalt meiner wpa_supplicant.conf ====
 +Dies muss abhängig vom verwendeten Netz natürlich angepasst werden. "​pmf=1"​ signalisiert dass der Client Protected Management Frames (PMF) unterstützt,​ während ein reines WPA3-Personal (SAE) ohne Rückwärtskompatibilität zu WPA2 dies sowieso als verpflichtend voraussetzt.
 +<​code>​
 +ctrl_interface=DIR=/​var/​run/​wpa_supplicant GROUP=netdev
 +eapol_version=1
 +ap_scan=1
 +fast_reauth=1
 +country=DE
 +pmf=1
 +network={
 + ssid="​ov44b39"​
 + proto=RSN
 + key_mgmt=SAE
 + sae_password="​12345678"​
 +}
 +</​code>​
 +
 +==== Finaler Schritt ====
 +<​code>​
 +# Da der wpa_supplicant vermutlich bereits läuft, muss die laufende Variante (vom System) erstmal beendet werden
 +sudo killall wpa_supplicant
 +
 +# Ausführen unseres eigenen wpa_supplicant mit der obigen Konfiguration
 +sudo ./​wpa_supplicant -c wpa_supplicant.conf -dd -i wlan0
 +</​code>​
 +
  
stellar-wireless-wpa3-sae-raspberry-pi-deutsch.txt · Zuletzt geändert: 2019/06/07 11:27 von benny