← Back to team overview

kernel-packages team mailing list archive

[Bug 1572131] [NEW] wifi woefully poor connection speeds

 

Public bug reported:

wifi woefully poor connection speeds (6Mbps - 70Mbps - flakey at the top
end)when compared to windows 270-300Mbps, slow but steady. I've even
resorted to attempting to use ndiswrapper which loads the drivers and
even appears to get the card going, however despite wpa_supplicant
installed and everything set up ok, the connections to my routers fail
(they negotiate wpa fine). So back to trying to get these bcmwl kernel
drivers working again.  I got the card on a quick Google search for a
wifi AC card with linux support. I saw broadcom had drivers for it, so I
bought it a few months ago. Its been a pain ever since.

Anyway, per https://help.ubuntu.com/community/WifiDocs/Driver/bcm43xx

There is some data attached to this bug report I'm sure, however to assist I'll post the extra terminal content and some of the ndiswrapper stuff as it might help as a comparison:
________________________
lspci -vvnn | grep -A 9 Network
lsb_release -rd
uname -a
sudo dmidecode -s bios-version
sudo dmidecode -s bios-release-date 
________________________

Respectively:
________________________
0a:00.0 Network controller [0280]: Broadcom Corporation BCM4360 802.11ac Wireless Network Adapter [14e4:43a0] (rev 03)
        Subsystem: Broadcom Corporation BCM4360 802.11ac Wireless Network Adapter [14e4:0619]
        Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR+ FastB2B- DisINTx-
        Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- <TAbort- <MAbort- >SERR- <PERR- INTx-
        Latency: 0, Cache Line Size: 32 bytes
        Interrupt: pin A routed to IRQ 19
        Region 0: Memory at f7ef8000 (64-bit, non-prefetchable) [size=32K]
        Region 2: Memory at f7c00000 (64-bit, non-prefetchable) [size=2M]
        Capabilities: <access denied>
        Kernel driver in use: wl
        Kernel modules: bcma, wl
Description:    Ubuntu 16.04 LTS
Release:        16.04
Linux HerculesLinux 4.4.0-18-generic #34-Ubuntu SMP Wed Apr 6 14:01:02 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux
1703   
06/26/2012
________________________

ok - so ndiswrapper attempted workaround
using bcmwl5.inf bcmwl564.sys  14E4:43A0.5.conf

________________________
$ sudo rmmod wl
$ sudo rmmod cfg80211
$ sudo modprobe ndiswrapper

dmesg:
[ 8719.640644] ndiswrapper version 1.59 loaded (smp=yes, preempt=no)
[ 8719.874630] ndiswrapper: driver bcmwl5 (TP-LINK,11/07/2013, 6.30.223.201) loaded
[ 8719.894483] ndiswrapper: using IRQ 19
[ 8720.125536] wlan0: ethernet device c4:e9:84:96:11:2a using NDIS driver: bcmwl5, version: 0x61edfc9, NDIS version: 0x501, vendor: 'NDIS Network Adapter', 14E4:43A0.5.conf
[ 8720.126460] wlan0: encryption modes supported: WEP; TKIP with WPA, WPA2, WPA2-PSK; AES/CCMP with WPA, WPA2, WPA2-PSK
[ 8720.126870] ndiswrapper 0000:0a:00.0 enp10s0: renamed from wlan0
[ 8720.134408] usbcore: registered new interface driver ndiswrapper
[ 8720.143260] ndiswrapper: interface renamed to 'enp10s0'
[ 8720.177929] cfg80211: World regulatory domain updated:
[ 8720.177932] cfg80211:  DFS Master region: unset
[ 8720.177933] cfg80211:   (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp), (dfs_cac_time)
[ 8720.177935] cfg80211:   (2402000 KHz - 2472000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A)
[ 8720.177936] cfg80211:   (2457000 KHz - 2482000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A)
[ 8720.177937] cfg80211:   (2474000 KHz - 2494000 KHz @ 20000 KHz), (N/A, 2000 mBm), (N/A)
[ 8720.177939] cfg80211:   (5170000 KHz - 5250000 KHz @ 80000 KHz, 160000 KHz AUTO), (N/A, 2000 mBm), (N/A)
[ 8720.177940] cfg80211:   (5250000 KHz - 5330000 KHz @ 80000 KHz, 160000 KHz AUTO), (N/A, 2000 mBm), (0 s)
[ 8720.177942] cfg80211:   (5490000 KHz - 5730000 KHz @ 160000 KHz), (N/A, 2000 mBm), (0 s)
[ 8720.177943] cfg80211:   (5735000 KHz - 5835000 KHz @ 80000 KHz), (N/A, 2000 mBm), (N/A)
[ 8720.177944] cfg80211:   (57240000 KHz - 63720000 KHz @ 2160000 KHz), (N/A, 0 mBm), (N/A)

________________________

sudo wpa_supplicant -D wext -i enp10s0 -c/etc/wpa_supplicant.conf -d > wpa_supplicant_output.txt
________________________

wpa_supplicant v2.4
random: Trying to read entropy from /dev/random
Successfully initialized wpa_supplicant
Initializing interface 'enp10s0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
Priority group 3
   id=2 ssid='ChateauXXXXX'
Priority group 2
   id=1 ssid='ChateauXXXXX'
Priority group 1
   id=0 ssid='ChateauXXXXX'
SIOCGIWRANGE: WE(compiled)=22 WE(source)=19 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0x1f flags 0x0
netlink: Operstate: ifindex=5 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
Add interface enp10s0 to a new radio N/A
enp10s0: Own MAC address: c4:e9:XX:XX:XX:XX
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
ioctl[SIOCSIWENCODEEXT]: Invalid argument
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
ioctl[SIOCSIWENCODEEXT]: Invalid argument
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_countermeasures
enp10s0: RSN: flushing PMKID list in the driver
enp10s0: Setting scan request: 0.100000 sec
TDLS: TDLS operation not supported by driver
TDLS: Driver uses internal link setup
TDLS: Driver does not support TDLS channel switching
enp10s0: WPS: UUID based on MAC address: e53fbfbc-e5a2-XXXX-XXXX-XXXXXXXXXXXX
ENGINE: Loading dynamic engine
ENGINE: Loading dynamic engine
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
enp10s0: Added interface enp10s0
enp10s0: State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
random: Got 20/20 bytes from /dev/random
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=48
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
WEXT: if_removed already cleared - ignore event
enp10s0: State: DISCONNECTED -> SCANNING
enp10s0: Starting AP scan for wildcard SSID
enp10s0: Add radio work 'scan'@0x55c37e2c9fe0
enp10s0: First radio work item in the queue - schedule start immediately
enp10s0: Starting radio work 'scan'@0x55c37e2c9fe0 after 0.000072 second wait
Scan requested (ret=0) - scan timeout 10 seconds
EAPOL: disable timer tick
Ignore event for foreign ifindex 3
Scan timeout - try to get results
enp10s0: Event SCAN_RESULTS (3) received
Received 2691 bytes of scan results (4 BSSes)
enp10s0: BSS: Start scan result update 1
enp10s0: BSS: Add new id 0 BSSID 78:a0:XX:XX:XX:XX SSID 'ChateauXXXXX'
enp10s0: BSS: Add new id 1 BSSID 90:e3:XX:XX:XX:XX SSID 'ChateauXXXXX'
enp10s0: BSS: Add new id 2 BSSID 04:bd:88:XX:XX:XX SSID 'XXXXXX'
enp10s0: BSS: Add new id 3 BSSID 04:bd:88:XX:XX:XX SSID 'XXXXXX'
BSS: last_scan_res_used=4/32
enp10s0: New scan results available (own=0 ext=0)
WPS: AP 78:a0:XX:XX:XX:XX type 0 added
WPS: AP 90:e3:XX:XX:XX:XX type 0 added
WPS: AP[0] 78:a0:XX:XX:XX:XX type=0 tries=0 last_attempt=-1 sec ago blacklist=0
WPS: AP[1] 90:e3:XX:XX:XX:XX type=0 tries=0 last_attempt=-1 sec ago blacklist=0
enp10s0: Radio work 'scan'@0x55c37e2c9fe0 done in 10.002111 seconds
enp10s0: Selecting BSS from priority group 3
enp10s0: 0: 78:a0:XX:XX:XX:XX ssid='ChateauXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-61 wps
enp10s0:    skip - BSSID mismatch
enp10s0: 1: 90:e3:XX:XX:XX:XX ssid='ChateauXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-73 wps
enp10s0:    skip - BSSID mismatch
enp10s0: 2: 04:bd:88:XX:XX:XX ssid='XXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-74
enp10s0:    skip - SSID mismatch
enp10s0: 3: 04:bd:88:XX:XX:XX ssid='XXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-77
enp10s0:    skip - SSID mismatch
enp10s0: Selecting BSS from priority group 2
enp10s0: 0: 78:a0:XX:XX:XX:XX ssid='ChateauXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-61 wps
enp10s0:    skip - BSSID mismatch
enp10s0: 1: 90:e3:XX:XX:XX:XX ssid='ChateauXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-73 wps
enp10s0:    selected based on RSN IE
enp10s0:    selected BSS 90:e3:XX:XX:XX:XX ssid='ChateauXXXXX'
enp10s0: Considering connect request: reassociate: 0  selected: 90:e3:XX:XX:XX:XX  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING  ssid=0x55c37e2ac420  current_ssid=(nil)
enp10s0: Request association with 90:e3:XX:XX:XX:XX
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=15): 00 0d 43 68 61 74 65 61 75 42 75 6c 6c 6f 77
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 03 01 09
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 2a 01 00
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=24): 3d 16 09 0f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: WMM Parameter Element - hexdump(len=24): 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
TDLS: TDLS is allowed in the target BSS
TDLS: TDLS channel switch allowed in the target BSS
enp10s0: Add radio work 'connect'@0x55c37e2c9fe0
enp10s0: First radio work item in the queue - schedule start immediately
enp10s0: Starting radio work 'connect'@0x55c37e2c9fe0 after 0.000084 second wait
enp10s0: Trying to associate with 90:e3:XX:XX:XX:XX (SSID='ChateauXXXXX' freq=2452 MHz)
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
enp10s0: Cancelling scan request
enp10s0: WPA: clearing own WPA/RSN IE
enp10s0: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=0x55c37e2ac420 try_opportunistic=0
RSN: Search for BSSID 90:e3:XX:XX:XX:XX
RSN: No PMKSA cache entry found
enp10s0: RSN: using IEEE 802.11i/D9.0
enp10s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
enp10s0: WPA: Selected mgmt group cipher 32
enp10s0: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
enp10s0: WPA: using GTK CCMP
enp10s0: WPA: using PTK CCMP
enp10s0: WPA: using KEY_MGMT WPA-PSK
enp10s0: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
enp10s0: State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
Limit connection to BSSID 90:e3:XX:XX:XX:XX freq=2452 MHz based on scan results (bssid_set=1)
enp10s0: set_disable_max_amsdu: -1
enp10s0: set_ampdu_factor: -1
enp10s0: set_ampdu_density: -1
enp10s0: set_disable_ht40: 0
enp10s0: set_disable_sgi: 0
enp10s0: set_disable_ldpc: 0
enp10s0: Determining shared radio frequencies (max len 1)
enp10s0: Shared frequencies (len=0): completed iteration
wpa_driver_wext_associate
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_psk
enp10s0: Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b04 len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=29
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 78:a0:XX:XX:XX:XX
enp10s0: Event ASSOC (0) received
enp10s0: State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
enp10s0: Associated to a new BSS: BSSID=78:a0:XX:XX:XX:XX
enp10s0: Associated with 78:a0:XX:XX:XX:XX
enp10s0: WPA: Association event - clear replay counter
enp10s0: WPA: Clear old PTK
TDLS: Remove peers on association
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
enp10s0: Setting authentication timeout: 10 sec 0 usec
enp10s0: Cancelling scan request
l2_packet_receive: src=78:a0:XX:XX:XX:XX len=121
enp10s0: RX EAPOL from 78:a0:XX:XX:XX:XX
enp10s0: Setting authentication timeout: 10 sec 0 usec
enp10s0: IEEE 802.1X RX: version=2 type=3 length=117
enp10s0:   EAPOL-Key type=2
enp10s0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
enp10s0:   key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_nonce - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f3
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
enp10s0: State: ASSOCIATED -> 4WAY_HANDSHAKE
enp10s0: WPA: RX message 1 of 4-Way Handshake from 78:a0:XX:XX:XX:XX (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
RSN: PMKID from Authenticator - hexdump(len=16): 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
enp10s0: RSN: no matching PMKID found
WPA: Renewed SNonce - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77
WPA: PTK derivation - A1=c4:e9:XX:XX:XX:XX A2=78:a0:XX:XX:XX:XX
WPA: Nonce1 - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77
WPA: Nonce2 - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f3
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00
enp10s0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 9f 49 2f 79 22 44 57 d6 3f f8 29 2b 44 e4 3f a3
l2_packet_receive: src=78:a0:XX:XX:XX:XX len=121
enp10s0: RX EAPOL from 78:a0:XX:XX:XX:XX
enp10s0: IEEE 802.1X RX: version=2 type=3 length=117
enp10s0:   EAPOL-Key type=2
enp10s0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
enp10s0:   key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f4
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
enp10s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
enp10s0: WPA: RX message 1 of 4-Way Handshake from 78:a0:XX:XX:XX:XX (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
RSN: PMKID from Authenticator - hexdump(len=16): 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
enp10s0: RSN: no matching PMKID found
WPA: PTK derivation - A1=c4:e9:XX:XX:XX:XX A2=78:a0:XX:XX:XX:XX
WPA: Nonce1 - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77
WPA: Nonce2 - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f4
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
enp10s0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): c5 c2 42 28 e0 a1 43 76 f5 13 a2 ec 31 37 55 65
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
l2_packet_receive: src=78:a0:XX:XX:XX:XX len=121
enp10s0: RX EAPOL from 78:a0:XX:XX:XX:XX
enp10s0: IEEE 802.1X RX: version=2 type=3 length=117
enp10s0:   EAPOL-Key type=2
enp10s0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
enp10s0:   key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_nonce - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f5
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
enp10s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
enp10s0: WPA: RX message 1 of 4-Way Handshake from 78:a0:XX:XX:XX:XX (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
RSN: PMKID from Authenticator - hexdump(len=16): 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
enp10s0: RSN: no matching PMKID found
WPA: PTK derivation - A1=c4:e9:XX:XX:XX:XX A2=78:a0:XX:XX:XX:XX
WPA: Nonce1 - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77
WPA: Nonce2 - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f5
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00
enp10s0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): f8 a0 b6 74 b9 d1 de cc 02 d9 cb 12 53 fc 2b 37
l2_packet_receive: src=78:a0:XX:XX:XX:XX len=121
enp10s0: RX EAPOL from 78:a0:XX:XX:XX:XX
enp10s0: IEEE 802.1X RX: version=2 type=3 length=117
enp10s0:   EAPOL-Key type=2
enp10s0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
enp10s0:   key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_nonce - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f6
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
enp10s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
enp10s0: WPA: RX message 1 of 4-Way Handshake from 78:a0:XX:XX:XX:XX (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
RSN: PMKID from Authenticator - hexdump(len=16): 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
enp10s0: RSN: no matching PMKID found
WPA: PTK derivation - A1=c4:e9:XX:XX:XX:XX A2=78:a0:XX:XX:XX:XX
WPA: Nonce1 - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77
WPA: Nonce2 - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f6
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00
enp10s0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 70 6f 35 67 38 16 8b 15 82 d2 fa 5d 00 b2 31 45
l2_packet_receive: src=78:a0:XX:XX:XX:XX len=121
enp10s0: RX EAPOL from 78:a0:XX:XX:XX:XX
enp10s0: IEEE 802.1X RX: version=2 type=3 length=117
enp10s0:   EAPOL-Key type=2
enp10s0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
enp10s0:   key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_nonce - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f7
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
enp10s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
enp10s0: WPA: RX message 1 of 4-Way Handshake from 78:a0:XX:XX:XX:XX (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
RSN: PMKID from Authenticator - hexdump(len=16): 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
enp10s0: RSN: no matching PMKID found
WPA: PTK derivation - A1=c4:e9:XX:XX:XX:XX A2=78:a0:XX:XX:XX:XX
WPA: Nonce1 - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77
WPA: Nonce2 - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f7
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00
enp10s0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 27 fa b4 f3 3b b5 16 9d ba 59 56 ed 47 ba e7 c4
enp10s0: Authentication with 78:a0:XX:XX:XX:XX timed out.
Added BSSID 78:a0:XX:XX:XX:XX into blacklist
TDLS: Remove peers on disassociation
enp10s0: WPA: Clear old PMK and PTK
enp10s0: Request to deauthenticate - bssid=78:a0:XX:XX:XX:XX pending_bssid=00:00:00:00:00:00 reason=3 state=4WAY_HANDSHAKE
TDLS: Tear down peers
wpa_driver_wext_deauthenticate
enp10s0: Event DEAUTH (12) received
enp10s0: Deauthentication notification
enp10s0:  * reason 3 (locally generated)
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
enp10s0: CTRL-EVENT-DISCONNECTED bssid=78:a0:XX:XX:XX:XX reason=3 locally_generated=1
enp10s0: WPA: 4-Way Handshake failed - pre-shared key may be incorrect
enp10s0: CTRL-EVENT-SSID-TEMP-DISABLED id=1 ssid="ChateauXXXXX" auth_failures=1 duration=10 reason=WRONG_KEY
enp10s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=7)
enp10s0: Setting scan request: 0.100000 sec
enp10s0: Radio work 'connect'@0x55c37e2c9fe0 done in 10.591082 seconds
BSSID 78:a0:XX:XX:XX:XX blacklist count incremented to 2
enp10s0: Blacklist count 2 --> request scan in 500 ms
enp10s0: Ignore new scan request for 0.500000 sec since an earlier request is scheduled to trigger sooner
TDLS: Remove peers on disassociation
enp10s0: WPA: Clear old PMK and PTK
enp10s0: Disconnect event - remove keys
enp10s0: State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
enp10s0: State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
enp10s0: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=48
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:00:00:00:00:00
enp10s0: Event DISASSOC (1) received
enp10s0: Disassociation notification
enp10s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
enp10s0: Do not request new immediate scan
TDLS: Remove peers on disassociation
enp10s0: WPA: Clear old PMK and PTK
enp10s0: Disconnect event - remove keys
enp10s0: State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
WEXT: if_removed already cleared - ignore event
enp10s0: State: DISCONNECTED -> SCANNING
enp10s0: Starting AP scan for wildcard SSID
enp10s0: Add radio work 'scan'@0x55c37e2c9fe0
enp10s0: First radio work item in the queue - schedule start immediately
enp10s0: Starting radio work 'scan'@0x55c37e2c9fe0 after 0.000081 second wait
Scan requested (ret=0) - scan timeout 10 seconds
enp10s0: Removing interface enp10s0
enp10s0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=SCANNING
TDLS: Tear down peers
enp10s0: State: SCANNING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_wext_set_countermeasures
enp10s0: WPA: Clear old PMK and PTK
Removed BSSID 78:a0:XX:XX:XX:XX from blacklist (clear)
enp10s0: BSS: Remove id 0 BSSID 78:a0:XX:XX:XX:XX SSID 'ChateauXXXXX' due to wpa_bss_flush
enp10s0: BSS: Remove id 1 BSSID 90:e3:XX:XX:XX:XX SSID 'ChateauXXXXX' due to wpa_bss_flush
enp10s0: BSS: Remove id 2 BSSID 04:bd:88:XX:XX:XX SSID 'XXXXXX' due to wpa_bss_flush
enp10s0: BSS: Remove id 3 BSSID 04:bd:88:XX:XX:XX SSID 'XXXXXX' due to wpa_bss_flush
enp10s0: Cancelling scan request
enp10s0: Cancelling authentication timeout
Remove interface enp10s0 from radio 
enp10s0: Remove radio work 'scan'@0x55c37e2c9fe0 (started)
Remove radio 
netlink: Operstate: ifindex=5 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
enp10s0: CTRL-EVENT-TERMINATING

ProblemType: Bug
DistroRelease: Ubuntu 16.04
Package: bcmwl-kernel-source 6.30.223.248+bdcom-0ubuntu8
ProcVersionSignature: Ubuntu 4.4.0-18.34-generic 4.4.6
Uname: Linux 4.4.0-18-generic x86_64
NonfreeKernelModules: nvidia_uvm nvidia_modeset nvidia wl
ApportVersion: 2.20.1-0ubuntu2
Architecture: amd64
Date: Tue Apr 19 22:38:11 2016
EcryptfsInUse: Yes
InstallationDate: Installed on 2014-05-25 (694 days ago)
InstallationMedia: Ubuntu 14.04 LTS "Trusty Tahr" - Release amd64 (20140417)
ProcEnviron:
 LANGUAGE=en_AU:en
 TERM=xterm
 PATH=(custom, no user)
 LANG=en_AU.UTF-8
 SHELL=/bin/bash
SourcePackage: bcmwl
UpgradeStatus: Upgraded to xenial on 2016-04-10 (9 days ago)

** Affects: bcmwl (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: amd64 apport-bug xenial

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bcmwl in Ubuntu.
https://bugs.launchpad.net/bugs/1572131

Title:
  wifi woefully poor connection speeds

Status in bcmwl package in Ubuntu:
  New

Bug description:
  wifi woefully poor connection speeds (6Mbps - 70Mbps - flakey at the
  top end)when compared to windows 270-300Mbps, slow but steady. I've
  even resorted to attempting to use ndiswrapper which loads the drivers
  and even appears to get the card going, however despite wpa_supplicant
  installed and everything set up ok, the connections to my routers fail
  (they negotiate wpa fine). So back to trying to get these bcmwl kernel
  drivers working again.  I got the card on a quick Google search for a
  wifi AC card with linux support. I saw broadcom had drivers for it, so
  I bought it a few months ago. Its been a pain ever since.

  Anyway, per https://help.ubuntu.com/community/WifiDocs/Driver/bcm43xx

  There is some data attached to this bug report I'm sure, however to assist I'll post the extra terminal content and some of the ndiswrapper stuff as it might help as a comparison:
  ________________________
  lspci -vvnn | grep -A 9 Network
  lsb_release -rd
  uname -a
  sudo dmidecode -s bios-version
  sudo dmidecode -s bios-release-date 
  ________________________

  Respectively:
  ________________________
  0a:00.0 Network controller [0280]: Broadcom Corporation BCM4360 802.11ac Wireless Network Adapter [14e4:43a0] (rev 03)
          Subsystem: Broadcom Corporation BCM4360 802.11ac Wireless Network Adapter [14e4:0619]
          Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR+ FastB2B- DisINTx-
          Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- <TAbort- <MAbort- >SERR- <PERR- INTx-
          Latency: 0, Cache Line Size: 32 bytes
          Interrupt: pin A routed to IRQ 19
          Region 0: Memory at f7ef8000 (64-bit, non-prefetchable) [size=32K]
          Region 2: Memory at f7c00000 (64-bit, non-prefetchable) [size=2M]
          Capabilities: <access denied>
          Kernel driver in use: wl
          Kernel modules: bcma, wl
  Description:    Ubuntu 16.04 LTS
  Release:        16.04
  Linux HerculesLinux 4.4.0-18-generic #34-Ubuntu SMP Wed Apr 6 14:01:02 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux
  1703   
  06/26/2012
  ________________________

  ok - so ndiswrapper attempted workaround
  using bcmwl5.inf bcmwl564.sys  14E4:43A0.5.conf

  ________________________
  $ sudo rmmod wl
  $ sudo rmmod cfg80211
  $ sudo modprobe ndiswrapper

  dmesg:
  [ 8719.640644] ndiswrapper version 1.59 loaded (smp=yes, preempt=no)
  [ 8719.874630] ndiswrapper: driver bcmwl5 (TP-LINK,11/07/2013, 6.30.223.201) loaded
  [ 8719.894483] ndiswrapper: using IRQ 19
  [ 8720.125536] wlan0: ethernet device c4:e9:84:96:11:2a using NDIS driver: bcmwl5, version: 0x61edfc9, NDIS version: 0x501, vendor: 'NDIS Network Adapter', 14E4:43A0.5.conf
  [ 8720.126460] wlan0: encryption modes supported: WEP; TKIP with WPA, WPA2, WPA2-PSK; AES/CCMP with WPA, WPA2, WPA2-PSK
  [ 8720.126870] ndiswrapper 0000:0a:00.0 enp10s0: renamed from wlan0
  [ 8720.134408] usbcore: registered new interface driver ndiswrapper
  [ 8720.143260] ndiswrapper: interface renamed to 'enp10s0'
  [ 8720.177929] cfg80211: World regulatory domain updated:
  [ 8720.177932] cfg80211:  DFS Master region: unset
  [ 8720.177933] cfg80211:   (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp), (dfs_cac_time)
  [ 8720.177935] cfg80211:   (2402000 KHz - 2472000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A)
  [ 8720.177936] cfg80211:   (2457000 KHz - 2482000 KHz @ 40000 KHz), (N/A, 2000 mBm), (N/A)
  [ 8720.177937] cfg80211:   (2474000 KHz - 2494000 KHz @ 20000 KHz), (N/A, 2000 mBm), (N/A)
  [ 8720.177939] cfg80211:   (5170000 KHz - 5250000 KHz @ 80000 KHz, 160000 KHz AUTO), (N/A, 2000 mBm), (N/A)
  [ 8720.177940] cfg80211:   (5250000 KHz - 5330000 KHz @ 80000 KHz, 160000 KHz AUTO), (N/A, 2000 mBm), (0 s)
  [ 8720.177942] cfg80211:   (5490000 KHz - 5730000 KHz @ 160000 KHz), (N/A, 2000 mBm), (0 s)
  [ 8720.177943] cfg80211:   (5735000 KHz - 5835000 KHz @ 80000 KHz), (N/A, 2000 mBm), (N/A)
  [ 8720.177944] cfg80211:   (57240000 KHz - 63720000 KHz @ 2160000 KHz), (N/A, 0 mBm), (N/A)

  ________________________

  sudo wpa_supplicant -D wext -i enp10s0 -c/etc/wpa_supplicant.conf -d > wpa_supplicant_output.txt
  ________________________

  wpa_supplicant v2.4
  random: Trying to read entropy from /dev/random
  Successfully initialized wpa_supplicant
  Initializing interface 'enp10s0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
  Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
  Reading configuration file '/etc/wpa_supplicant.conf'
  Priority group 3
     id=2 ssid='ChateauXXXXX'
  Priority group 2
     id=1 ssid='ChateauXXXXX'
  Priority group 1
     id=0 ssid='ChateauXXXXX'
  SIOCGIWRANGE: WE(compiled)=22 WE(source)=19 enc_capa=0xf
    capabilities: key_mgmt 0xf enc 0x1f flags 0x0
  netlink: Operstate: ifindex=5 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT)
  Add interface enp10s0 to a new radio N/A
  enp10s0: Own MAC address: c4:e9:XX:XX:XX:XX
  wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
  ioctl[SIOCSIWENCODEEXT]: Invalid argument
  Driver did not support SIOCSIWENCODEEXT
  wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
  ioctl[SIOCSIWENCODEEXT]: Invalid argument
  Driver did not support SIOCSIWENCODEEXT
  wpa_driver_wext_set_countermeasures
  enp10s0: RSN: flushing PMKID list in the driver
  enp10s0: Setting scan request: 0.100000 sec
  TDLS: TDLS operation not supported by driver
  TDLS: Driver uses internal link setup
  TDLS: Driver does not support TDLS channel switching
  enp10s0: WPS: UUID based on MAC address: e53fbfbc-e5a2-XXXX-XXXX-XXXXXXXXXXXX
  ENGINE: Loading dynamic engine
  ENGINE: Loading dynamic engine
  EAPOL: SUPP_PAE entering state DISCONNECTED
  EAPOL: Supplicant port status: Unauthorized
  EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  EAPOL: SUPP_BE entering state INITIALIZE
  EAP: EAP entering state DISABLED
  enp10s0: Added interface enp10s0
  enp10s0: State: DISCONNECTED -> DISCONNECTED
  wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  random: Got 20/20 bytes from /dev/random
  RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
  WEXT: if_removed already cleared - ignore event
  RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
  WEXT: if_removed already cleared - ignore event
  Wireless event: cmd=0x8b06 len=12
  RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
  WEXT: if_removed already cleared - ignore event
  Wireless event: cmd=0x8b1a len=48
  RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
  WEXT: if_removed already cleared - ignore event
  enp10s0: State: DISCONNECTED -> SCANNING
  enp10s0: Starting AP scan for wildcard SSID
  enp10s0: Add radio work 'scan'@0x55c37e2c9fe0
  enp10s0: First radio work item in the queue - schedule start immediately
  enp10s0: Starting radio work 'scan'@0x55c37e2c9fe0 after 0.000072 second wait
  Scan requested (ret=0) - scan timeout 10 seconds
  EAPOL: disable timer tick
  Ignore event for foreign ifindex 3
  Scan timeout - try to get results
  enp10s0: Event SCAN_RESULTS (3) received
  Received 2691 bytes of scan results (4 BSSes)
  enp10s0: BSS: Start scan result update 1
  enp10s0: BSS: Add new id 0 BSSID 78:a0:XX:XX:XX:XX SSID 'ChateauXXXXX'
  enp10s0: BSS: Add new id 1 BSSID 90:e3:XX:XX:XX:XX SSID 'ChateauXXXXX'
  enp10s0: BSS: Add new id 2 BSSID 04:bd:88:XX:XX:XX SSID 'XXXXXX'
  enp10s0: BSS: Add new id 3 BSSID 04:bd:88:XX:XX:XX SSID 'XXXXXX'
  BSS: last_scan_res_used=4/32
  enp10s0: New scan results available (own=0 ext=0)
  WPS: AP 78:a0:XX:XX:XX:XX type 0 added
  WPS: AP 90:e3:XX:XX:XX:XX type 0 added
  WPS: AP[0] 78:a0:XX:XX:XX:XX type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  WPS: AP[1] 90:e3:XX:XX:XX:XX type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  enp10s0: Radio work 'scan'@0x55c37e2c9fe0 done in 10.002111 seconds
  enp10s0: Selecting BSS from priority group 3
  enp10s0: 0: 78:a0:XX:XX:XX:XX ssid='ChateauXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-61 wps
  enp10s0:    skip - BSSID mismatch
  enp10s0: 1: 90:e3:XX:XX:XX:XX ssid='ChateauXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-73 wps
  enp10s0:    skip - BSSID mismatch
  enp10s0: 2: 04:bd:88:XX:XX:XX ssid='XXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-74
  enp10s0:    skip - SSID mismatch
  enp10s0: 3: 04:bd:88:XX:XX:XX ssid='XXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-77
  enp10s0:    skip - SSID mismatch
  enp10s0: Selecting BSS from priority group 2
  enp10s0: 0: 78:a0:XX:XX:XX:XX ssid='ChateauXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-61 wps
  enp10s0:    skip - BSSID mismatch
  enp10s0: 1: 90:e3:XX:XX:XX:XX ssid='ChateauXXXXX' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-73 wps
  enp10s0:    selected based on RSN IE
  enp10s0:    selected BSS 90:e3:XX:XX:XX:XX ssid='ChateauXXXXX'
  enp10s0: Considering connect request: reassociate: 0  selected: 90:e3:XX:XX:XX:XX  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING  ssid=0x55c37e2ac420  current_ssid=(nil)
  enp10s0: Request association with 90:e3:XX:XX:XX:XX
  WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=15): 00 0d 43 68 61 74 65 61 75 42 75 6c 6c 6f 77
  WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 03 01 09
  WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 2a 01 00
  WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=24): 3d 16 09 0f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  WPA: WMM Parameter Element - hexdump(len=24): 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  TDLS: TDLS is allowed in the target BSS
  TDLS: TDLS channel switch allowed in the target BSS
  enp10s0: Add radio work 'connect'@0x55c37e2c9fe0
  enp10s0: First radio work item in the queue - schedule start immediately
  enp10s0: Starting radio work 'connect'@0x55c37e2c9fe0 after 0.000084 second wait
  enp10s0: Trying to associate with 90:e3:XX:XX:XX:XX (SSID='ChateauXXXXX' freq=2452 MHz)
  FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
  enp10s0: Cancelling scan request
  enp10s0: WPA: clearing own WPA/RSN IE
  enp10s0: Automatic auth_alg selection: 0x1
  RSN: PMKSA cache search - network_ctx=0x55c37e2ac420 try_opportunistic=0
  RSN: Search for BSSID 90:e3:XX:XX:XX:XX
  RSN: No PMKSA cache entry found
  enp10s0: RSN: using IEEE 802.11i/D9.0
  enp10s0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
  enp10s0: WPA: Selected mgmt group cipher 32
  enp10s0: WPA: clearing AP WPA IE
  WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  enp10s0: WPA: using GTK CCMP
  enp10s0: WPA: using PTK CCMP
  enp10s0: WPA: using KEY_MGMT WPA-PSK
  enp10s0: WPA: not using MGMT group cipher
  WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  enp10s0: State: SCANNING -> ASSOCIATING
  wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  Limit connection to BSSID 90:e3:XX:XX:XX:XX freq=2452 MHz based on scan results (bssid_set=1)
  enp10s0: set_disable_max_amsdu: -1
  enp10s0: set_ampdu_factor: -1
  enp10s0: set_ampdu_density: -1
  enp10s0: set_disable_ht40: 0
  enp10s0: set_disable_sgi: 0
  enp10s0: set_disable_ldpc: 0
  enp10s0: Determining shared radio frequencies (max len 1)
  enp10s0: Shared frequencies (len=0): completed iteration
  wpa_driver_wext_associate
  wpa_driver_wext_set_drop_unencrypted
  wpa_driver_wext_set_psk
  enp10s0: Setting authentication timeout: 10 sec 0 usec
  EAPOL: External notification - EAP success=0
  EAPOL: External notification - EAP fail=0
  EAPOL: External notification - portControl=Auto
  RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
  WEXT: if_removed already cleared - ignore event
  Wireless event: cmd=0x8b06 len=12
  RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
  WEXT: if_removed already cleared - ignore event
  Wireless event: cmd=0x8b04 len=16
  RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
  WEXT: if_removed already cleared - ignore event
  Wireless event: cmd=0x8b1a len=29
  RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
  WEXT: if_removed already cleared - ignore event
  RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
  WEXT: if_removed already cleared - ignore event
  Wireless event: cmd=0x8b15 len=24
  Wireless event: new AP: 78:a0:XX:XX:XX:XX
  enp10s0: Event ASSOC (0) received
  enp10s0: State: ASSOCIATING -> ASSOCIATED
  wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  enp10s0: Associated to a new BSS: BSSID=78:a0:XX:XX:XX:XX
  enp10s0: Associated with 78:a0:XX:XX:XX:XX
  enp10s0: WPA: Association event - clear replay counter
  enp10s0: WPA: Clear old PTK
  TDLS: Remove peers on association
  EAPOL: External notification - portEnabled=0
  EAPOL: External notification - portValid=0
  EAPOL: External notification - EAP success=0
  EAPOL: External notification - portEnabled=1
  EAPOL: SUPP_PAE entering state CONNECTING
  EAPOL: enable timer tick
  EAPOL: SUPP_BE entering state IDLE
  enp10s0: Setting authentication timeout: 10 sec 0 usec
  enp10s0: Cancelling scan request
  l2_packet_receive: src=78:a0:XX:XX:XX:XX len=121
  enp10s0: RX EAPOL from 78:a0:XX:XX:XX:XX
  enp10s0: Setting authentication timeout: 10 sec 0 usec
  enp10s0: IEEE 802.1X RX: version=2 type=3 length=117
  enp10s0:   EAPOL-Key type=2
  enp10s0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  enp10s0:   key_length=16 key_data_length=22
    replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
    key_nonce - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f3
    key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
    key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
    key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  enp10s0: State: ASSOCIATED -> 4WAY_HANDSHAKE
  enp10s0: WPA: RX message 1 of 4-Way Handshake from 78:a0:XX:XX:XX:XX (ver=2)
  RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
  WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
  RSN: PMKID from Authenticator - hexdump(len=16): 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
  enp10s0: RSN: no matching PMKID found
  WPA: Renewed SNonce - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77
  WPA: PTK derivation - A1=c4:e9:XX:XX:XX:XX A2=78:a0:XX:XX:XX:XX
  WPA: Nonce1 - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77
  WPA: Nonce2 - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f3
  WPA: PMK - hexdump(len=32): [REMOVED]
  WPA: PTK - hexdump(len=48): [REMOVED]
  WPA: KCK - hexdump(len=16): [REMOVED]
  WPA: KEK - hexdump(len=16): [REMOVED]
  WPA: TK - hexdump(len=16): [REMOVED]
  WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  enp10s0: WPA: Sending EAPOL-Key 2/4
  WPA: KCK - hexdump(len=16): [REMOVED]
  WPA: Derived Key MIC - hexdump(len=16): 9f 49 2f 79 22 44 57 d6 3f f8 29 2b 44 e4 3f a3
  l2_packet_receive: src=78:a0:XX:XX:XX:XX len=121
  enp10s0: RX EAPOL from 78:a0:XX:XX:XX:XX
  enp10s0: IEEE 802.1X RX: version=2 type=3 length=117
  enp10s0:   EAPOL-Key type=2
  enp10s0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  enp10s0:   key_length=16 key_data_length=22
    replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
    key_nonce - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f4
    key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
    key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
    key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  enp10s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  enp10s0: WPA: RX message 1 of 4-Way Handshake from 78:a0:XX:XX:XX:XX (ver=2)
  RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
  WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
  RSN: PMKID from Authenticator - hexdump(len=16): 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
  enp10s0: RSN: no matching PMKID found
  WPA: PTK derivation - A1=c4:e9:XX:XX:XX:XX A2=78:a0:XX:XX:XX:XX
  WPA: Nonce1 - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77
  WPA: Nonce2 - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f4
  WPA: PMK - hexdump(len=32): [REMOVED]
  WPA: PTK - hexdump(len=48): [REMOVED]
  WPA: KCK - hexdump(len=16): [REMOVED]
  WPA: KEK - hexdump(len=16): [REMOVED]
  WPA: TK - hexdump(len=16): [REMOVED]
  WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  enp10s0: WPA: Sending EAPOL-Key 2/4
  WPA: KCK - hexdump(len=16): [REMOVED]
  WPA: Derived Key MIC - hexdump(len=16): c5 c2 42 28 e0 a1 43 76 f5 13 a2 ec 31 37 55 65
  EAPOL: startWhen --> 0
  EAPOL: disable timer tick
  EAPOL: SUPP_PAE entering state CONNECTING
  EAPOL: enable timer tick
  EAPOL: txStart
  WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
  l2_packet_receive: src=78:a0:XX:XX:XX:XX len=121
  enp10s0: RX EAPOL from 78:a0:XX:XX:XX:XX
  enp10s0: IEEE 802.1X RX: version=2 type=3 length=117
  enp10s0:   EAPOL-Key type=2
  enp10s0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  enp10s0:   key_length=16 key_data_length=22
    replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
    key_nonce - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f5
    key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
    key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
    key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  enp10s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  enp10s0: WPA: RX message 1 of 4-Way Handshake from 78:a0:XX:XX:XX:XX (ver=2)
  RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
  WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
  RSN: PMKID from Authenticator - hexdump(len=16): 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
  enp10s0: RSN: no matching PMKID found
  WPA: PTK derivation - A1=c4:e9:XX:XX:XX:XX A2=78:a0:XX:XX:XX:XX
  WPA: Nonce1 - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77
  WPA: Nonce2 - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f5
  WPA: PMK - hexdump(len=32): [REMOVED]
  WPA: PTK - hexdump(len=48): [REMOVED]
  WPA: KCK - hexdump(len=16): [REMOVED]
  WPA: KEK - hexdump(len=16): [REMOVED]
  WPA: TK - hexdump(len=16): [REMOVED]
  WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  enp10s0: WPA: Sending EAPOL-Key 2/4
  WPA: KCK - hexdump(len=16): [REMOVED]
  WPA: Derived Key MIC - hexdump(len=16): f8 a0 b6 74 b9 d1 de cc 02 d9 cb 12 53 fc 2b 37
  l2_packet_receive: src=78:a0:XX:XX:XX:XX len=121
  enp10s0: RX EAPOL from 78:a0:XX:XX:XX:XX
  enp10s0: IEEE 802.1X RX: version=2 type=3 length=117
  enp10s0:   EAPOL-Key type=2
  enp10s0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  enp10s0:   key_length=16 key_data_length=22
    replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
    key_nonce - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f6
    key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
    key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
    key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  enp10s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  enp10s0: WPA: RX message 1 of 4-Way Handshake from 78:a0:XX:XX:XX:XX (ver=2)
  RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
  WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
  RSN: PMKID from Authenticator - hexdump(len=16): 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
  enp10s0: RSN: no matching PMKID found
  WPA: PTK derivation - A1=c4:e9:XX:XX:XX:XX A2=78:a0:XX:XX:XX:XX
  WPA: Nonce1 - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77
  WPA: Nonce2 - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f6
  WPA: PMK - hexdump(len=32): [REMOVED]
  WPA: PTK - hexdump(len=48): [REMOVED]
  WPA: KCK - hexdump(len=16): [REMOVED]
  WPA: KEK - hexdump(len=16): [REMOVED]
  WPA: TK - hexdump(len=16): [REMOVED]
  WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  enp10s0: WPA: Sending EAPOL-Key 2/4
  WPA: KCK - hexdump(len=16): [REMOVED]
  WPA: Derived Key MIC - hexdump(len=16): 70 6f 35 67 38 16 8b 15 82 d2 fa 5d 00 b2 31 45
  l2_packet_receive: src=78:a0:XX:XX:XX:XX len=121
  enp10s0: RX EAPOL from 78:a0:XX:XX:XX:XX
  enp10s0: IEEE 802.1X RX: version=2 type=3 length=117
  enp10s0:   EAPOL-Key type=2
  enp10s0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  enp10s0:   key_length=16 key_data_length=22
    replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
    key_nonce - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f7
    key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
    key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
    key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  enp10s0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  enp10s0: WPA: RX message 1 of 4-Way Handshake from 78:a0:XX:XX:XX:XX (ver=2)
  RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
  WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
  RSN: PMKID from Authenticator - hexdump(len=16): 26 e9 a8 97 ea 90 35 c4 02 a3 fd 5e a3 4c 88 7a
  enp10s0: RSN: no matching PMKID found
  WPA: PTK derivation - A1=c4:e9:XX:XX:XX:XX A2=78:a0:XX:XX:XX:XX
  WPA: Nonce1 - hexdump(len=32): 75 33 a1 3e 2d 72 a3 fe 17 7d 79 54 3e 05 a4 67 19 b1 81 90 25 85 0a f9 7f 77 37 2f e8 63 b4 77
  WPA: Nonce2 - hexdump(len=32): d2 07 b4 c3 46 ec 22 d6 c5 5f 5d 46 ff da 22 cf b4 3b c6 27 2c a8 7e 3d bc 37 b8 30 ea 0d de f7
  WPA: PMK - hexdump(len=32): [REMOVED]
  WPA: PTK - hexdump(len=48): [REMOVED]
  WPA: KCK - hexdump(len=16): [REMOVED]
  WPA: KEK - hexdump(len=16): [REMOVED]
  WPA: TK - hexdump(len=16): [REMOVED]
  WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  enp10s0: WPA: Sending EAPOL-Key 2/4
  WPA: KCK - hexdump(len=16): [REMOVED]
  WPA: Derived Key MIC - hexdump(len=16): 27 fa b4 f3 3b b5 16 9d ba 59 56 ed 47 ba e7 c4
  enp10s0: Authentication with 78:a0:XX:XX:XX:XX timed out.
  Added BSSID 78:a0:XX:XX:XX:XX into blacklist
  TDLS: Remove peers on disassociation
  enp10s0: WPA: Clear old PMK and PTK
  enp10s0: Request to deauthenticate - bssid=78:a0:XX:XX:XX:XX pending_bssid=00:00:00:00:00:00 reason=3 state=4WAY_HANDSHAKE
  TDLS: Tear down peers
  wpa_driver_wext_deauthenticate
  enp10s0: Event DEAUTH (12) received
  enp10s0: Deauthentication notification
  enp10s0:  * reason 3 (locally generated)
  Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  enp10s0: CTRL-EVENT-DISCONNECTED bssid=78:a0:XX:XX:XX:XX reason=3 locally_generated=1
  enp10s0: WPA: 4-Way Handshake failed - pre-shared key may be incorrect
  enp10s0: CTRL-EVENT-SSID-TEMP-DISABLED id=1 ssid="ChateauXXXXX" auth_failures=1 duration=10 reason=WRONG_KEY
  enp10s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=7)
  enp10s0: Setting scan request: 0.100000 sec
  enp10s0: Radio work 'connect'@0x55c37e2c9fe0 done in 10.591082 seconds
  BSSID 78:a0:XX:XX:XX:XX blacklist count incremented to 2
  enp10s0: Blacklist count 2 --> request scan in 500 ms
  enp10s0: Ignore new scan request for 0.500000 sec since an earlier request is scheduled to trigger sooner
  TDLS: Remove peers on disassociation
  enp10s0: WPA: Clear old PMK and PTK
  enp10s0: Disconnect event - remove keys
  enp10s0: State: 4WAY_HANDSHAKE -> DISCONNECTED
  wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  EAPOL: External notification - portEnabled=0
  EAPOL: SUPP_PAE entering state DISCONNECTED
  EAPOL: Supplicant port status: Unauthorized
  EAPOL: SUPP_BE entering state INITIALIZE
  EAPOL: External notification - portValid=0
  EAPOL: External notification - EAP success=0
  enp10s0: State: DISCONNECTED -> DISCONNECTED
  wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  EAPOL: External notification - portEnabled=0
  EAPOL: External notification - portValid=0
  enp10s0: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner
  RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
  WEXT: if_removed already cleared - ignore event
  Wireless event: cmd=0x8b1a len=48
  RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
  WEXT: if_removed already cleared - ignore event
  Wireless event: cmd=0x8b15 len=24
  Wireless event: new AP: 00:00:00:00:00:00
  enp10s0: Event DISASSOC (1) received
  enp10s0: Disassociation notification
  enp10s0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
  enp10s0: Do not request new immediate scan
  TDLS: Remove peers on disassociation
  enp10s0: WPA: Clear old PMK and PTK
  enp10s0: Disconnect event - remove keys
  enp10s0: State: DISCONNECTED -> DISCONNECTED
  wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  EAPOL: External notification - portEnabled=0
  EAPOL: External notification - portValid=0
  RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  RTM_NEWLINK, IFLA_IFNAME: Interface 'enp10s0' added
  WEXT: if_removed already cleared - ignore event
  enp10s0: State: DISCONNECTED -> SCANNING
  enp10s0: Starting AP scan for wildcard SSID
  enp10s0: Add radio work 'scan'@0x55c37e2c9fe0
  enp10s0: First radio work item in the queue - schedule start immediately
  enp10s0: Starting radio work 'scan'@0x55c37e2c9fe0 after 0.000081 second wait
  Scan requested (ret=0) - scan timeout 10 seconds
  enp10s0: Removing interface enp10s0
  enp10s0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=SCANNING
  TDLS: Tear down peers
  enp10s0: State: SCANNING -> DISCONNECTED
  wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  netlink: Operstate: ifindex=5 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  EAPOL: External notification - portEnabled=0
  EAPOL: External notification - portValid=0
  wpa_driver_wext_set_countermeasures
  enp10s0: WPA: Clear old PMK and PTK
  Removed BSSID 78:a0:XX:XX:XX:XX from blacklist (clear)
  enp10s0: BSS: Remove id 0 BSSID 78:a0:XX:XX:XX:XX SSID 'ChateauXXXXX' due to wpa_bss_flush
  enp10s0: BSS: Remove id 1 BSSID 90:e3:XX:XX:XX:XX SSID 'ChateauXXXXX' due to wpa_bss_flush
  enp10s0: BSS: Remove id 2 BSSID 04:bd:88:XX:XX:XX SSID 'XXXXXX' due to wpa_bss_flush
  enp10s0: BSS: Remove id 3 BSSID 04:bd:88:XX:XX:XX SSID 'XXXXXX' due to wpa_bss_flush
  enp10s0: Cancelling scan request
  enp10s0: Cancelling authentication timeout
  Remove interface enp10s0 from radio 
  enp10s0: Remove radio work 'scan'@0x55c37e2c9fe0 (started)
  Remove radio 
  netlink: Operstate: ifindex=5 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
  enp10s0: CTRL-EVENT-TERMINATING

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: bcmwl-kernel-source 6.30.223.248+bdcom-0ubuntu8
  ProcVersionSignature: Ubuntu 4.4.0-18.34-generic 4.4.6
  Uname: Linux 4.4.0-18-generic x86_64
  NonfreeKernelModules: nvidia_uvm nvidia_modeset nvidia wl
  ApportVersion: 2.20.1-0ubuntu2
  Architecture: amd64
  Date: Tue Apr 19 22:38:11 2016
  EcryptfsInUse: Yes
  InstallationDate: Installed on 2014-05-25 (694 days ago)
  InstallationMedia: Ubuntu 14.04 LTS "Trusty Tahr" - Release amd64 (20140417)
  ProcEnviron:
   LANGUAGE=en_AU:en
   TERM=xterm
   PATH=(custom, no user)
   LANG=en_AU.UTF-8
   SHELL=/bin/bash
  SourcePackage: bcmwl
  UpgradeStatus: Upgraded to xenial on 2016-04-10 (9 days ago)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bcmwl/+bug/1572131/+subscriptions


Follow ups