http://download.csdn.net/detail/myxmu/6346741
29 19:01:50.907508 802.11 Probe Req CA:DD:C9:F2:0F:C3 Ethernet Broadcast Ethernet Broadcast 6 213
30 19:01:50.911518 802.11 Probe Rsp 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 336
31 19:01:51.000118 802.11 Ack CA:DD:C9:F2:0F:C3 6 14
32 19:01:51.010189 802.11 Action 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 51
33 19:01:51.015564 802.11 Action CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 160
34 19:01:51.015578 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 14
35 19:01:51.063325 802.11 Action 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 189
36 19:01:51.921102 802.11 Probe Rsp CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 349
37 19:01:51.921125 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 14
38 19:01:52.240110 802.11 Action 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 CA:DD:C9:F2:0F:C3 6 193
39 19:01:52.243972 802.11 Action CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 148
40 19:01:52.243995 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 14
41 19:01:52.253126 802.11 Action 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 CA:DD:C9:F2:0F:C3 6 111
42 19:01:52.280356 802.11 Probe Req CA:DD:C9:F2:0F:C3 Ethernet Broadcast Ethernet Broadcast 6 228
43 19:01:52.558074 802.11 Probe Req CA:DD:C9:F2:0F:C3 Ethernet Broadcast Ethernet Broadcast 6 228
44 19:01:52.566055 802.11 Probe Rsp 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 406
45 19:01:52.587744 802.11 Auth CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 34
46 19:01:52.587762 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 14
47 19:01:52.588351 802.11 Auth 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 34
48 19:01:52.589104 802.11 Assoc Req CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 171
49 19:01:52.589119 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 14
50 19:01:52.616078 EAP Request 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 47
51 19:01:52.617200 EAP Response CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 76
52 19:01:52.617222 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 14
53 19:01:52.623121 EAP Request 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 56
54 19:01:52.714086 EAP Response CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 457
55 19:01:52.714110 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 14
56 19:01:52.832947 EAP Request 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 479
57 19:01:52.907312 802.11 CTS 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 14
58 19:01:52.907453 EAP Response CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 180
59 19:01:52.907478 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 14
60 19:01:52.922225 EAP Request 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 248
61 19:01:52.925349 802.11 CTS 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 14
62 19:01:52.925448 EAP Response CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 176
63 19:01:52.938077 EAP Request 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 176
64 19:01:52.941216 802.11 CTS 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 14
65 19:01:52.941232 EAP Response CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 176
66 19:01:52.941245 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 14
67 19:01:52.951467 EAP Request 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 272
68 19:01:52.954925 802.11 CTS 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 14
69 19:01:52.955053 EAP Response CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 116
70 19:01:52.955067 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 14
71 19:01:52.971357 EAP Failure 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 46
72 19:01:52.973495 802.11 Deauth CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 30
73 19:01:52.973512 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 14
74 19:01:52.982749 802.11 Probe Req CA:DD:C9:F2:0F:C3 Ethernet Broadcast Ethernet Broadcast 6 225
75 19:01:52.991088 802.11 Probe Rsp 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 381
76 19:01:53.011950 802.11 Auth CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 34
77 19:01:53.011975 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 14
78 19:01:53.022840 802.11 Assoc Rsp 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 193
79 19:01:53.049301 EAPOL-Key 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 137
80 19:01:53.049799 EAPOL-Key 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 137
81 19:01:53.050053 EAPOL-Key 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 137
82 19:01:53.059328 EAPOL-Key CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 159
83 19:01:53.059359 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 14
84 19:01:53.066470 EAPOL-Key 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 6 193
85 19:01:53.068333 EAPOL-Key CA:DD:C9:F2:0F:C3 02:08:22:30:8C:11 02:08:22:30:8C:11 6 137
86 19:01:53.068350 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 14
87 19:01:53.195825 802.11 CTS 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 14
88 19:01:53.195850 802.11 Encrypted Data CA:DD:C9:F2:0F:C3 33:33:00:00:00:02 02:08:22:30:8C:11 6 110
89 19:01:53.195864 802.11 Ack 02:08:22:30:8C:11 CA:DD:C9:F2:0F:C3 6 14
802.11 MAC Header
Version: 0 [0 Mask 0x03]
Type: %00 Management [0]
Subtype: %1101 Action [0]
Frame Control Flags: %00000000 [1]
0... .... Non-strict order
.0.. .... Non-Protected Frame
..0. .... No More Data
...0 .... Power Management - active mode
.... 0... This is not a Re-Transmission
.... .0.. Last or Unfragmented Frame
.... ..0. Not an Exit from the Distribution System
.... ...0 Not to the Distribution System
Duration: 60 Microseconds [2-3]
Destination: 02:08:22:30:8C:11 [0-5]
Source: CA:DD:C9:F2:0F:C3 [6-11]
BSSID: 02:08:22:30:8C:11 [12-17]
Seq Number: 2515 [18-19 Mask 0xFFF0]
Frag Number: 0 [18 Mask 0x0F]
802.11 Management - Action
Category Code: 4 Public Action [20]
Action Code: 9 Vendor Specific [21]
OUI: 0x50-0x6F-0x9A Wi-Fi Alliance [22-24]
Subtype: 9 [25]
OUI Subtype: 0 GO Negotiation Request [26]
Dialog Token: 2 [27]
Wi-Fi Direct
Element ID: 221 Vendor Specific - Wi-Fi Alliance [28]
Length: 95 [29]
OUI: 0x50-0x6F-0x9A Wi-Fi Alliance [30-32]
OUI Type: 0x09 Wi-Fi Direct [33]
P2P Attribute
ID: 2 P2P Capability [34]
Length: 2 [35-36]
Device Capability: %00100100 [37]
xx.. .... Reserved
..1. .... Processes Invitation Procedure
...0 .... Device Limit not set
.... 0... Infrastructure Managed not set
.... .1.. Concurrent Operation supported
.... ..0. P2P Client Discovery not supported
.... ...0 Service Discovery not supported
Group Capability: %00101010 [38]
x... .... Reserved
.0.. .... Group Formation - Not Owner
..1. .... Persistent Reconnect supported
...0 .... Cross Connection not supported
.... 1... Intra-BSS Distribution supported
.... .0.. P2P Group Limit not set
.... ..1. Persistent P2P Group set
.... ...0 P2P Group Owner not set
P2P Attribute
ID: 4 Group Owner Intent [39]
Length: 1 [40-41]
GO Intent
Intent: 7 [42 Mask 0xFE]
Tie Breaker: 1 [42 Mask 0x01]
P2P Attribute
ID: 5 Configuration Timeout [43]
Length: 2 [44-45]
GO Config Timeout: 100 (1000 msec) [46]
Client Config Timeout:20 (200 msec) [47]
P2P Attribute
ID: 6 Listen Channel [48]
Length: 5 [49-50]
Country String: XX /0x04 [51-53]
Operating Class: 81 [54]
Channel Number: 6 [55]
P2P Attribute
ID: 9 Intended P2P Interface Address [56]
Length: 6 [57-58]
Interface Address: CA:DD:C9:F2:0F:C3 [59-64]
P2P Attribute
ID: 11 Channel List [65]
Length: 18 [66-67]
Country String: XX /0x04 [68-70]
Operating Class: 81 [71]
Channels: 13 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 [72-85]
P2P Attribute
ID: 13 P2P Device Info [86]
Length: 28 [87-88]
Device Address: CA:DD:C9:F2:0F:C3 [89-94]
Config Methods: 0x0080 [95-96]
xxxx xxx. .... .... Reserved
.... ...0 .... .... Keypad: no
.... .... 1... .... Pushbutton: yes
.... .... .0.. .... NFC Interface: no
.... .... ..0. .... Integrated NFC Token: no
.... .... ...0 .... External NFC Token: no
.... .... .... 0... Display: no
.... .... .... .0.. Label: no
.... .... .... ..0. Ethernet: no
.... .... .... ...0 USBA (Flash Drive): no
Category: 10 Telephone [97-98]
OUI: 0x00-0x50-0xF2-0x04 [99-102]
Sub Category ID: 5 [103-104]
Secondary Device Types:0 [105]
Device Name: Android [110-116]
P2P Attribute
ID: 17 Operating Channel [117]
Length: 5 [118-119]
Country String: XX /0x04 [120-122]
Operating Class: 81 [123]
Channel Number: 6 [124]
WPS
Element ID: 221 WPS [125]
Length: 25 [126]
OUI: 0x00-0x50-0xF2 Microsoft [127-129]
OUI Type: 4 Wi-Fi Protected Setup [130]
Version: 0x10 1.0 [135]
Device Password ID: 0x0004 PushButton [140-141]
Vendor Extension: 0x00372A000120 [146-151]
root@android:/etc/wifi # cat p2p_supplicant.conf
cat p2p_supplicant.conf
ctrl_interface=DIR=/data/misc/p2p_supplicant GROUP=wifi
update_config=1
uuid=12345678-9abc-def0-1234-56789abcdef0
manufacturer=MediaTek Inc.
device_name=Wireless Client
model_name=MTK Wireless Model
model_number=1.0
serial_number=1.0
device_type=10-0050F204-5
os_version=01020300
config_methods=display push_button keypad
root@android:/ # cd data/misc/wifi/
cd data/misc/wifi/
root@android:/data/misc/wifi # cat p2p_supplicant.conf
cat p2p_supplicant.conf
ctrl_interface=/data/misc/wpa_supplicant
driver_param=use_p2p_group_interface=1
update_config=1
uuid=12345678-9abc-def0-1234-56789abcdef0
device_name=Android_ec1d
manufacturer=MediaTek Inc.
model_name=MTK Wireless Model
model_number=1.0
serial_number=1.0
device_type=10-0050F204-5
os_version=01020300
config_methods=virtual_push_button physical_display keypad
p2p_oper_reg_class=81
p2p_oper_channel=6
p2p_ssid_postfix=-Android_ec1d
persistent_reconnect=1
network={
ssid="DIRECT-B1-Android"
bssid=ca:dd:c9:f2:0f:c3
psk=c7eb7cf9555d0687ed094715463045901d724847338f259da46bb356ab3923c2
proto=RSN
key_mgmt=WPA-PSK
pairwise=CCMP
auth_alg=OPEN
disabled=2
}
/**
* A class representing a Wi-Fi P2p configuration for setting up a connection
*
* {@see WifiP2pManager}
*/
public class WifiP2pConfig implements Parcelable {
/**
* The device MAC address uniquely identifies a Wi-Fi p2p device
*/
public String deviceAddress;
/**
* Wi-Fi Protected Setup information
*/
public WpsInfo wps;
/** @hide */
public static final int MAX_GROUP_OWNER_INTENT = 15;
/** @hide */
public static final int MIN_GROUP_OWNER_INTENT = 0;
/**
* This is an integer value between 0 and 15 where 0 indicates the least
* inclination to be a group owner and 15 indicates the highest inclination
* to be a group owner.
*
* A value of -1 indicates the system can choose an appropriate value.
*/
public int groupOwnerIntent = -1;
/** @hide */
public int netId = WifiP2pGroup.PERSISTENT_NET_ID;
public WifiP2pConfig() {
//set defaults
wps = new WpsInfo();
wps.setup = WpsInfo.PBC;
}
/** P2P-GO-NEG-REQUEST 42:fc:89:a8:96:09 dev_passwd_id=4 {@hide}*/
public WifiP2pConfig(String supplicantEvent) throws IllegalArgumentException {
String[] tokens = supplicantEvent.split(" ");
if (tokens.length < 2 || !tokens[0].equals("P2P-GO-NEG-REQUEST")) {
throw new IllegalArgumentException("Malformed supplicant event");
}
deviceAddress = tokens[1];
wps = new WpsInfo();
if (tokens.length > 2) {
String[] nameVal = tokens[2].split("=");
int devPasswdId;
try {
devPasswdId = Integer.parseInt(nameVal[1]);
} catch (NumberFormatException e) {
devPasswdId = 0;
}
//Based on definitions in wps/wps_defs.h
switch (devPasswdId) {
//DEV_PW_USER_SPECIFIED = 0x0001,
case 0x01:
wps.setup = WpsInfo.DISPLAY;
break;
//DEV_PW_PUSHBUTTON = 0x0004,
case 0x04:
wps.setup = WpsInfo.PBC;
break;
//DEV_PW_REGISTRAR_SPECIFIED = 0x0005
case 0x05:
wps.setup = WpsInfo.KEYPAD;
break;
default:
wps.setup = WpsInfo.PBC;
break;
}
}
}
private void notifyInvitationReceived() {
Resources r = Resources.getSystem();
final WpsInfo wps = mSavedPeerConfig.wps;
final View textEntryView = LayoutInflater.from(mContext)
.inflate(R.layout.wifi_p2p_dialog, null);
ViewGroup group = (ViewGroup) textEntryView.findViewById(R.id.info);
addRowToDialog(group, R.string.wifi_p2p_from_message, getDeviceName(
mSavedPeerConfig.deviceAddress));
final EditText pin = (EditText) textEntryView.findViewById(R.id.wifi_p2p_wps_pin);
AlertDialog dialog = new AlertDialog.Builder(mContext)
.setTitle(r.getString(R.string.wifi_p2p_invitation_to_connect_title))
.setView(textEntryView)
.setPositiveButton(r.getString(R.string.accept), new OnClickListener() {
public void onClick(DialogInterface dialog, int which) {
if (wps.setup == WpsInfo.KEYPAD) {
mSavedPeerConfig.wps.pin = pin.getText().toString();
}
if (DBG) logd(getName() + " accept invitation " + mSavedPeerConfig);
sendMessage(PEER_CONNECTION_USER_ACCEPT);
}
})
static void p2p_rx_p2p_action(struct p2p_data *p2p, const u8 *sa,
const u8 *data, size_t len, int rx_freq)
{
wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
"P2P: RX P2P Public Action from " MACSTR, MAC2STR(sa));
wpa_hexdump(MSG_MSGDUMP, "P2P: P2P Public Action contents", data, len);
if (len < 1)
return;
switch (data[0]) {
case P2P_GO_NEG_REQ:
p2p_process_go_neg_req(p2p, sa, data + 1, len - 1, rx_freq);
break;
case P2P_GO_NEG_RESP:
p2p_process_go_neg_resp(p2p, sa, data + 1, len - 1, rx_freq);
break;
case P2P_GO_NEG_CONF:
p2p_process_go_neg_conf(p2p, sa, data + 1, len - 1);
break;
case P2P_INVITATION_REQ:
p2p_process_invitation_req(p2p, sa, data + 1, len - 1,
rx_freq);
break;
case P2P_INVITATION_RESP:
p2p_process_invitation_resp(p2p, sa, data + 1, len - 1);
break;
case P2P_PROV_DISC_REQ:
p2p_process_prov_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
break;
case P2P_PROV_DISC_RESP:
p2p_process_prov_disc_resp(p2p, sa, data + 1, len - 1);
break;
case P2P_DEV_DISC_REQ:
p2p_process_dev_disc_req(p2p, sa, data + 1, len - 1, rx_freq);
break;
case P2P_DEV_DISC_RESP:
p2p_process_dev_disc_resp(p2p, sa, data + 1, len - 1);
break;
default:
wpa_msg(p2p->cfg->msg_ctx, MSG_DEBUG,
"P2P: Unsupported P2P Public Action frame type %d",
data[0]);
break;
}
}
09-10 20:21:40.948 3757 3757 D wpa_supplicant: p2p0: Event RX_ACTION (21) received
09-10 20:21:40.948 3757 3757 D wpa_supplicant: p2p0: Received Action frame: SA=ca:dd:c9:f2:0f:c3 Category=4 DataLen=101 freq=2462 MHz
09-10 20:21:40.948 3757 3757 D wpa_supplicant: p2p0: P2P: RX P2P Public Action from ca:dd:c9:f2:0f:c3
09-10 20:21:40.948 3757 3757 D wpa_supplicant: p2p0: P2P: Received Invitation Request from ca:dd:c9:f2:0f:c3 (freq=2462)
09-10 20:21:40.952 3757 3757 D wpa_supplicant: p2p0: P2P: Action frame TX callback (state=8 freq=2462 dst=ca:dd:c9:f2:0f:c3 src=ca:dd:c9:79:0a:89 bssid=ca:dd:c9:79:0a:89 result=0
09-10 20:21:40.952 3757 3757 D wpa_supplicant: p2p0: P2P: Invitation ResponseTX callback: success=1
09-10 20:21:40.952 3757 3757 D wpa_supplicant: Off-channel: Action frame sequence done notification
09-10 20:21:40.952 3757 3757 D wpa_supplicant: nl80211: Cancel remain-on-channel with cookie 0x17d
09-10 20:21:40.952 3757 3757 D wpa_supplicant: P2P: Invitation from peer ca:dd:c9:f2:0f:c3 was rejected (status 8)
09-10 20:21:44.048 545 614 D WifiP2pService: WifiP2pService accept invitation
09-10 20:21:44.048 545 614 D WifiP2pService: address: ca:dd:c9:f2:0f:c3
09-10 20:21:44.048 545 614 D WifiP2pService: wps: setup: 0
09-10 20:21:44.048 545 614 D WifiP2pService: BSSID: null
09-10 20:21:44.048 545 614 D WifiP2pService: pin: null
09-10 20:21:44.048 545 614 D WifiP2pService:
09-10 20:21:44.048 545 614 D WifiP2pService: groupOwnerIntent: -1
09-10 20:21:44.048 545 614 D WifiP2pService: persist: -2
09-10 20:21:44.079 545 614 D WifiCommon: [p2p0] SET "P2P_PEER ca:dd:c9:f2:0f:c3"
09-10 20:21:44.080 3757 3757 D wpa_supplicant: p2p0: Control interface command 'P2P_PEER ca:dd:c9:f2:0f:c3'
09-10 20:21:44.081 545 614 D WifiP2pService: target ssid is null join:false
09-10 20:21:44.081 545 614 D WifiP2pService: netId related with ca:dd:c9:f2:0f:c3 = -1
09-10 20:21:44.081 545 614 D WifiNative-p2p0: doBoolean: P2P_STOP_FIND
09-10 20:21:44.082 545 614 D WifiCommon: [p2p0] SET "P2P_STOP_FIND"
09-10 20:21:44.082 3757 3757 D wpa_supplicant: p2p0: Control interface command 'P2P_STOP_FIND'
09-10 20:21:44.082 3757 3757 D wpa_supplicant: p2p0: P2P: Stopping find
09-10 20:21:44.082 3757 3757 D wpa_supplicant: p2p0: P2P: Clear timeout (state=SEARCH)
09-10 20:21:44.082 3757 3757 I wpa_supplicant: p2p0: P2P-FIND-STOPPED
09-10 20:21:44.082 3757 3757 D wpa_supplicant: p2p0: P2P: State SEARCH -> IDLE
09-10 20:21:44.082 3757 3757 D wpa_supplicant: p2p0: P2P: Clear timeout (state=IDLE)
09-10 20:21:44.082 3757 3757 D wpa_supplicant: p2p0: P2P: Clear drv_in_listen (2462)
09-10 20:21:44.082 3757 3757 D wpa_supplicant: nl80211: Cancel remain-on-channel with cookie 0x187
09-10 20:21:44.082 545 9671 D WifiCommon: [p2p0]GET "P2P-FIND-STOPPED "
09-10 20:21:44.085 545 614 D WifiNative-p2p0: doString: P2P_CONNECT ca:dd:c9:f2:0f:c3 pbc persistent go_intent=7
09-10 20:21:44.085 545 614 D WifiCommon: [p2p0] SET "P2P_CONNECTca:dd:c9:f2:0f:c3pbcpersistentgo_intent=7 "
09-10 20:21:44.085 3757 3757 D wpa_supplicant: p2p0: Control interface command 'P2P_CONNECT ca:dd:c9:f2:0f:c3 pbc persistent go_intent=7 '
09-10 20:21:44.086 3757 3757 D wpa_supplicant: p2p0: P2P: Request to start group negotiation - peer=ca:dd:c9:f2:0f:c3 GO Intent=7 Intended Interface Address=ca:dd:c9:79:0a:89 wps_method=3 persistent_group=2 pd_before_go_neg=0 force_freq 2437
09-10 20:21:44.086 3757 3757 D wpa_supplicant: p2p0: Single channel list 6
09-10 20:21:44.086 3757 3757 D wpa_supplicant: p2p0: P2P: Own preference for operation channel: Operating Class 81 Channel 6 (forced)
09-10 20:21:44.086 3757 3757 D wpa_supplicant: P2P: * Dialog Token: 1
09-10 20:21:44.086 3757 3757 D wpa_supplicant: P2P: * P2P IE header
09-10 20:21:44.086 3757 3757 D wpa_supplicant: P2P: * Capability dev=24 group=2a
09-10 20:21:44.086 3757 3757 D wpa_supplicant: P2P: * GO Intent: Intent 7 Tie breaker 1
09-10 20:21:44.086 3757 3757 D wpa_supplicant: P2P: * Configuration Timeout: GO 100 (*10ms) client 20 (*10ms)
09-10 20:21:44.087 3757 3757 D wpa_supplicant: P2P: * Listen Channel: Regulatory Class 81 Channel 11
09-10 20:21:44.087 3757 3757 D wpa_supplicant: P2P: * Intended P2P Interface Address ca:dd:c9:79:0a:89
09-10 20:21:44.087 3757 3757 D wpa_supplicant: P2P: * Device Info
09-10 20:21:44.087 3757 3757 D wpa_supplicant: P2P: * Operating Channel: Regulatory Class 81 Channel 6
09-10 20:21:44.087 3757 3757 D wpa_supplicant: WPS: * Version (hardcoded 0x10)
09-10 20:21:44.087 3757 3757 D wpa_supplicant: P2P: WPS IE Device Password ID: 4
09-10 20:21:44.087 3757 3757 D wpa_supplicant: WPS: * Version2 (0x20)
09-10 20:21:44.087 3757 3757 D wpa_supplicant: p2p0: P2P: Sending GO Negotiation Request
09-10 20:21:44.087 3757 3757 D wpa_supplicant: p2p0: P2P: State IDLE -> CONNECT
09-10 20:21:44.087 3757 3757 D wpa_supplicant: Off-channel: Send action frame: freq=2437 dst=ca:dd:c9:f2:0f:c3 src=ca:dd:c9:79:0a:89 bssid=ca:dd:c9:f2:0f:c3 len=125
09-10 20:21:44.085 545 614 D WifiNative-p2p0: doString: P2P_CONNECT ca:dd:c9:f2:0f:c3 pbc persistent go_intent=7
09-10 20:21:44.085 545 614 D WifiCommon: [p2p0] SET "P2P_CONNECT ca:dd:c9:f2:0f:c3 pbc persistent go_intent=7 "
09-10 20:21:44.085 3757 3757 D wpa_supplicant: p2p0: Control interface command 'P2P_CONNECT ca:dd:c9:f2:0f:c3 pbc persistent go_intent=7 '
09-10 20:21:44.184 3757 3757 D wpa_supplicant: p2p0: Event RX_ACTION (21) received
09-10 20:21:44.184 3757 3757 D wpa_supplicant: p2p0: Received Action frame: SA=ca:dd:c9:f2:0f:c3 Category=4 DataLen=107 freq=2437 MHz
09-10 20:21:44.184 3757 3757 D wpa_supplicant: p2p0: P2P: RX P2P Public Action from ca:dd:c9:f2:0f:c3
09-10 20:21:44.184 3757 3757 D wpa_supplicant: p2p0: P2P: Received GO Negotiation Response from ca:dd:c9:f2:0f:c3 (freq=2437)
09-10 20:21:44.184 3757 3757 D wpa_supplicant: P2P: Parsing the received message
09-10 20:21:44.184 3757 3757 D wpa_supplicant: P2P: * Dialog Token: 1
09-10 20:21:44.184 3757 3757 D wpa_supplicant: P2P: Parsing WPS IE
09-10 20:21:44.184 3757 3757 E wpa_supplicant: WPS: WFA subelement id=0 len=1
09-10 20:21:44.184 3757 3757 D wpa_supplicant: P2P: Device Password ID: 4
09-10 20:21:44.184 3757 3757 D wpa_supplicant: P2P: Parsing P2P IE
09-10 20:21:44.184 3757 3757 D wpa_supplicant: P2P: Attribute 0 length 1
09-10 20:21:44.184 3757 3757 D wpa_supplicant: P2P: * Status: 0
09-10 20:21:44.184 3757 3757 D wpa_supplicant: P2P: Attribute 2 length 2
09-10 20:21:44.184 3757 3757 D wpa_supplicant: P2P: * Device Capability 24 Group Capability 00
09-10 20:21:44.184 3757 3757 D wpa_supplicant: P2P: Attribute 4 length 1
09-10 20:21:44.184 3757 3757 D wpa_supplicant: P2P: * GO Intent: Intent 7 Tie breaker 0
09-10 20:21:44.184 3757 3757 D wpa_supplicant: P2P: Attribute 5 length 2
09-10 20:21:44.184 3757 3757 D wpa_supplicant: P2P: * Configuration Timeout
09-10 20:21:44.184 3757 3757 D wpa_supplicant: P2P: Attribute 9 length 6
09-10 20:21:44.184 3757 3757 D wpa_supplicant: P2P: * Intended P2P Interface Address: ca:dd:c9:f2:0f:c3
09-10 20:21:44.184 3757 3757 D wpa_supplicant: P2P: Attribute 11 length 6
09-10 20:21:44.184 3757 3757 D wpa_supplicant: P2P: * Channel List: Country String 'XX(0x04)'
09-10 20:21:44.184 3757 3757 D wpa_supplicant: P2P: Attribute 13 length 28
09-10 20:21:44.184 3757 3757 D wpa_supplicant: P2P: * Device Info: addr ca:dd:c9:f2:0f:c3 primary device type 10-0050F204-5device name 'Android'config methods 0x80
09-10 20:21:44.184 3757 3757 D wpa_supplicant: p2p0: P2P: Own reg_classes 1 peer reg_classes 1 intersection reg_classes 1
09-10 20:21:44.184 3757 3757 D wpa_supplicant: p2p0: P2P: Peer using pushbutton
09-10 20:21:44.184 3757 3757 D wpa_supplicant: P2P: reg_class 81
09-10 20:21:44.186 3757 3757 D wpa_supplicant: p2p0: P2P: State CONNECT -> GO_NEG
09-10 20:21:44.186 3757 3757 D wpa_supplicant: p2p0: P2P: Clear timeout (state=GO_NEG)
09-10 20:21:44.186 3757 3757 D wpa_supplicant: p2p0: P2P: GO Negotiation with ca:dd:c9:f2:0f:c3
09-10 20:21:44.186 3757 3757 D wpa_supplicant: p2p0: P2P: Building GO Negotiation Confirm
09-10 20:21:44.186 3757 3757 D wpa_supplicant: P2P: * Dialog Token: 1
09-10 20:21:44.186 3757 3757 D wpa_supplicant: P2P: * P2P IE header
09-10 20:21:44.186 3757 3757 D wpa_supplicant: P2P: * Status: 0
09-10 20:21:44.186 3757 3757 D wpa_supplicant: P2P: * Capability dev=24 group=00
09-10 20:21:44.186 3757 3757 D wpa_supplicant: P2P: * Operating Channel: Regulatory Class 81 Channel 6
09-10 20:21:44.186 3757 3757 D wpa_supplicant: P2P: * P2P Group ID ca:dd:c9:79:0a:89
09-10 20:21:44.186 3757 3757 D wpa_supplicant: p2p0: P2P: Sending GO Negotiation Confirm
09-10 20:21:44.188 3757 3757 D wpa_supplicant: p2p0: P2P: GO Negotiation with ca:dd:c9:f2:0f:c3 completed (local end will be GO)
09-10 20:21:44.190 3757 3757 D wpa_supplicant: p2p0: P2P: Clear timeout (state=GO_NEG)
09-10 20:21:44.190 3757 3757 D wpa_supplicant: p2p0: P2P: State GO_NEG -> PROVISIONING
09-10 20:21:44.190 3757 3757 I wpa_supplicant: p2p0: P2P-GO-NEG-SUCCESS
09-10 20:21:44.190 3757 3757 D wpa_supplicant: p2p0: P2P: Starting GO
09-10 20:21:44.190 545 9671 D WifiCommon: [p2p0]GET "P2P-GO-NEG-SUCCESS "
09-10 20:21:44.289 3757 3757 D wpa_supplicant: p2p0: P2P: Request scan (that will be skipped) to start GO)
09-10 20:21:44.289 3757 3757 D wpa_supplicant: Start a pre-selected network without scan step
09-10 20:21:44.289 3757 3757 D wpa_supplicant: Setting up AP (SSID='DIRECT-af-Android_ec1d')
09-10 20:21:44.289 3757 3757 D wpa_supplicant: nl80211: Setup AP operations for P2P group (GO)
09-10 20:21:44.289 3757 3757 D wpa_supplicant: nl80211: Set mode ifindex 12 iftype 9 (P2P_GO)
09-10 20:21:44.402 3757 3757 D wpa_supplicant: p2p0: State: SCANNING -> COMPLETED
09-10 20:21:44.402 3757 3757 D wpa_supplicant: p2p0: Find the channel for p2p. wpa_s assoc_freq 2437 ifname p2p0
09-10 20:21:44.402 3757 3757 I wpa_supplicant: p2p0: CTRL-EVENT-CONNECTED - Connection to ca:dd:c9:79:0a:89 completed (auth) [id=0 id_str=]
09-10 20:21:44.402 3757 3757 D wpa_supplicant: wpa_driver_nl80211_set_operstate: operstate 1->1 (UP)
09-10 20:21:44.402 3757 3757 D wpa_supplicant: netlink: Operstate: linkmode=-1, operstate=6
09-10 20:21:44.402 3757 3757 D wpa_supplicant: P2P: Setting up WPS for GO provisioning
09-10 20:21:44.402 545 9671 D WifiCommon: [p2p0]GET "CTRL-EVENT-CONNECTED - Connection to ca:dd:c9:79:0a:89 completed (auth) [id=0 id_str=]"
09-10 20:21:44.402 3757 3757 D wpa_supplicant: AP: Set MAC address filter: ca:dd:c9:f2:0f:c3
09-10 20:21:44.402 3757 3757 D wpa_supplicant: WPS: Button pushed - PBC mode started
09-10 20:21:44.904 3757 3757 D wpa_supplicant: WPS: Probe Request for PBC received from ca:dd:c9:f2:0f:c3
09-10 20:21:44.904 3757 3757 D wpa_supplicant: WPS: Checking active PBC sessions for overlap
09-10 20:21:44.904 3757 3757 D wpa_supplicant: WPS: Add one for the requested UUID
09-10 20:21:44.904 3757 3757 D wpa_supplicant: WPS: Consider PBC session with ca:dd:c9:f2:0f:c3
09-10 20:21:44.904 3757 3757 D wpa_supplicant: WPS: 1 active PBC session(s) found
09-10 20:21:44.998 3757 3757 D wpa_supplicant: STA included WPS IE in (Re)AssocReq
09-10 20:21:44.998 3757 3757 D wpa_supplicant: New STA
09-10 20:21:44.998 3757 3757 D wpa_supplicant: ap_sta_add: register ap_handle_timer timeout for ca:dd:c9:f2:0f:c3 (300 seconds - ap_max_inactivity)
09-10 20:21:44.998 3757 3757 E wpa_supplicant: WPS: WFA subelement id=0 len=1
09-10 20:21:44.998 3757 3757 D wpa_supplicant: WPS: STA supports WPS 2.0
09-10 20:21:44.998 3757 3757 D wpa_supplicant: hostapd_logger: STA ca:dd:c9:f2:0f:c3 - start authentication
09-10 20:21:44.998 3757 3757 D wpa_supplicant: EAP: Server state machine created
09-10 20:21:44.998 3757 3757 D wpa_supplicant: IEEE 802.1X: ca:dd:c9:f2:0f:c3 BE_AUTH entering state IDLE
09-10 20:21:44.998 3757 3757 D wpa_supplicant: IEEE 802.1X: ca:dd:c9:f2:0f:c3 CTRL_DIR entering state FORCE_BOTH
09-10 20:21:44.998 3757 3757 D wpa_supplicant: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for ca:dd:c9:f2:0f:c3 (300 seconds - ap_max_inactivity)
09-10 20:21:44.999 3757 3757 D wpa_supplicant: WPS: Building WPS IE for (Re)Association Response
09-10 20:21:44.999 3757 3757 D wpa_supplicant: WPS: * Version (hardcoded 0x10)
09-10 20:21:44.999 3757 3757 D wpa_supplicant: WPS: * Response Type (3)
09-10 20:21:44.999 3757 3757 D wpa_supplicant: WPS: * Version2 (0x20)
09-10 20:21:44.999 3757 3757 D wpa_supplicant: P2P: * P2P IE header
09-10 20:21:45.001 3757 3757 D wpa_supplicant: EAP: EAP entering state INITIALIZE
09-10 20:21:45.001 3757 3757 I wpa_supplicant: p2p0: CTRL-EVENT-EAP-STARTED ca:dd:c9:f2:0f:c3
09-10 20:21:45.001 3757 3757 D wpa_supplicant: EAP: EAP entering state SELECT_ACTION
09-10 20:21:45.001 3757 3757 D wpa_supplicant: EAP: getDecision: no identity known yet -> CONTINUE
09-10 20:21:45.001 3757 3757 D wpa_supplicant: EAP: EAP entering state PROPOSE_METHOD
09-10 20:21:45.001 3757 3757 D wpa_supplicant: EAP: getNextMethod: vendor 0 type 1
09-10 20:21:45.001 3757 3757 I wpa_supplicant: p2p0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
09-10 20:21:45.001 3757 3757 D wpa_supplicant: EAP: EAP entering state METHOD_REQUEST
09-10 20:21:45.001 3757 3757 D wpa_supplicant: EAP: building EAP-Request: Identifier 75
09-10 20:21:45.001 3757 3757 D wpa_supplicant: EAP: EAP entering state SEND_REQUEST
09-10 20:21:45.001 545 9671 D WifiCommon: [p2p0]GET "CTRL-EVENT-EAP-STARTED ca:dd:c9:f2:0f:c3"
09-10 20:21:45.001 3757 3757 D wpa_supplicant: EAP: EAP entering state IDLE
09-10 20:21:45.002 545 9671 D WifiCommon: [p2p0]GET "CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1"
09-10 20:21:45.002 139 389 D SurfaceFlinger: postEvent(770, v/c=65286)
09-10 20:21:45.002 3757 3757 D wpa_supplicant: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
09-10 20:21:45.002 770 770 D DisplayEventReceiver: rev(0x69fffc70) w/ vsync, t=4156958911789, id=0, c=65286
09-10 20:21:45.002 3757 3757 D wpa_supplicant: IEEE 802.1X: ca:dd:c9:f2:0f:c3 AUTH_PAE entering state CONNECTING
09-10 20:21:45.002 3757 3757 D wpa_supplicant: IEEE 802.1X: ca:dd:c9:f2:0f:c3 AUTH_PAE entering state AUTHENTICATING
09-10 20:21:45.002 3757 3757 D wpa_supplicant: IEEE 802.1X: ca:dd:c9:f2:0f:c3 BE_AUTH entering state REQUEST