Thank you for the reply, Stuart.

The logs from the openssl flavour (with -dd):

wpa_supplicant v2.9
Successfully initialized wpa_supplicant
Initializing interface 'iwx0' conf '/etc/wpa_supplicant.conf' driver 'default' 
ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group='wheel'
Line: 20 - start of a new network block
ssid - hexdump_ascii(len=16):
     4d 50 49 4c 48 4c 54 2d 56 49 53 49 54 4f 52 53   MPILHLT-VISITORS
key_mgmt: 0xb
eap methods - hexdump(len=32): 00 00 00 00 15 00 00 00 00 00 00 00 19 00 00 00 
00 00 00 00 0d 00 00 00 00 00 00 00 00 00 00 00
ca_cert - hexdump_ascii(len=17):
     2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 2e 70 65   /etc/ssl/cert.pe
     6d                                                m               
identity - hexdump_ascii(len=8):
     31 33 31 36 36 37 32 30                           13166720        
password - hexdump_ascii(len=6): [REMOVED]
Line: 38 - start of a new network block
ssid - hexdump_ascii(len=7):
     65 64 75 72 6f 61 6d                              eduroam         
key_mgmt: 0x1
eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
ca_cert - hexdump_ascii(len=17):
     2f 65 74 63 2f 73 73 6c 2f 63 65 72 74 2e 70 65   /etc/ssl/cert.pe
     6d                                                m               
anonymous_identity - hexdump_ascii(len=21):
     61 6e 6f 6e 79 6d 6f 75 73 40 6c 68 6c 74 2e 6d   anonymous@lhlt.m
     70 67 2e 64 65                                    pg.de           
identity - hexdump_ascii(len=19):
     67 61 73 74 39 35 30 40 6c 68 6c 74 2e 6d 70 67   gast...@lhlt.mpg
     2e 64 65                                          .de             
password - hexdump_ascii(len=12): [REMOVED]
openssl_ciphers - hexdump_ascii(len=18):
     44 45 46 41 55 4c 54 40 53 45 43 4c 45 56 45 4c   DEFAULT@SECLEVEL
     3d 30                                             =0              
phase1 - hexdump_ascii(len=29):
     61 6c 6c 6f 77 5f 75 6e 73 61 66 65 5f 72 65 6e   allow_unsafe_ren
     65 67 6f 74 69 61 74 69 6f 6e 73 3d 31            egotiations=1   
phase2 - hexdump_ascii(len=13):
     61 75 74 68 3d 4d 53 43 48 41 50 56 32            auth=MSCHAPV2   
Priority group 0
   id=0 ssid='MPILHLT-VISITORS'
   id=1 ssid='eduroam'
Add interface iwx0 to a new radio N/A
iwx0: Failed to attach pkt_type filter
iwx0: Own MAC address: b0:a4:60:2d:3b:b0
iwx0: RSN: flushing PMKID list in the driver
iwx0: Setting scan request: 0.100000 sec
ENGINE: Loading builtin engines
ENGINE: Loading builtin engines
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
ctrl_interface_group=0 (from group name 'wheel')
iwx0: Added interface iwx0
iwx0: State: DISCONNECTED -> DISCONNECTED
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
iwx0: Already associated with a configured network - generating associated event
iwx0: Event ASSOC (0) received
iwx0: Association info event
iwx0: State: DISCONNECTED -> ASSOCIATED
iwx0: Associated to a new BSS: BSSID=24:f2:7f:f5:ae:11
iwx0: Select network based on association information
iwx0: Network configuration found for the current AP
iwx0: WPA: No WPA/RSN IE available from association info
iwx0: WPA: Set cipher suites based on configuration
iwx0: WPA: Selected cipher suites: group 24 pairwise 24 key_mgmt 1 proto 2
iwx0: WPA: clearing AP WPA IE
iwx0: WPA: clearing AP RSN IE
iwx0: WPA: AP group 0x18 network profile group 0x18; available group 0x18
iwx0: WPA: using GTK CCMP
iwx0: WPA: AP pairwise 0x18 network profile pairwise 0x18; available pairwise 
0x18
iwx0: WPA: using PTK CCMP
iwx0: WPA: AP key_mgmt 0x1 network profile key_mgmt 0x1; available key_mgmt 0x1
iwx0: WPA: using KEY_MGMT 802.1X
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 
0f ac 04 01 00 00 0f ac 01 00 00
WPA: No current PMKSA - clear PMK
iwx0: Failed to get scan results
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
iwx0: Associated with 24:f2:7f:f5:ae:11
iwx0: WPA: Association event - clear replay counter
iwx0: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
iwx0: Setting authentication timeout: 10 sec 0 usec
iwx0: Cancelling scan request
EAPOL: External notification - portValid=1
iwx0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
TX EAPOL: dst=24:f2:7f:f5:ae:11
TX EAPOL - hexdump(len=4): 01 01 00 00
iwx0: RX EAPOL from 24:f2:7f:f5:ae:11
RX EAPOL - hexdump(len=46): 01 00 00 05 01 0f 00 05 01 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00
iwx0: Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=15 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
iwx0: CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: Status notification: started (param=)
EAP: EAP-Request Identity data - hexdump_ascii(len=0):
EAP: using anonymous identity - hexdump_ascii(len=21):
     61 6e 6f 6e 79 6d 6f 75 73 40 6c 68 6c 74 2e 6d   anonymous@lhlt.m
     70 67 2e 64 65                                    pg.de           
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=24:f2:7f:f5:ae:11
TX EAPOL - hexdump(len=30): 01 00 00 1a 02 0f 00 1a 01 61 6e 6f 6e 79 6d 6f 75 
73 40 6c 68 6c 74 2e 6d 70 67 2e 64 65
EAPOL: SUPP_BE entering state RECEIVE
iwx0: RX EAPOL from 24:f2:7f:f5:ae:11
RX EAPOL - hexdump(len=46): 01 00 00 06 01 10 00 06 19 20 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=16 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
iwx0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
EAP: Status notification: accept proposed method (param=PEAP)
EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
TLS: using phase1 config options
TLS: Trusted root certificate(s) loaded
iwx0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-PEAP: Start (server ver=0, own ver=1)
EAP-PEAP: Using PEAP version 0
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before SSL initialization
OpenSSL: TX ver=0x301 content_type=256 (TLS header info/)
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x303 content_type=22 (handshake/client hello)
OpenSSL: Message - hexdump(len=185): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3/TLS write client hello
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3/TLS write client hello
SSL: SSL_connect - want more data
SSL: 190 bytes pending from ssl_out
SSL: Using TLS version TLSv1.2
SSL: 190 bytes left to be sent out (of total 190 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 
eapRespData=0xb1280ffaa00
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=24:f2:7f:f5:ae:11
TX EAPOL - hexdump(len=204): 01 00 00 c8 02 10 00 c8 19 80 00 00 00 be 16 03 01 
00 b9 01 00 00 b5 03 03 2c 81 d2 45 64 b0 b3 16 26 31 2d 50 f0 51 2f 75 c8 42 
ba b7 b1 b6 ee 49 04 be a6 25 54 88 c5 cb 00 00 38 c0 2c c0 30 00 9f cc a9 cc 
a8 cc aa c0 2b c0 2f 00 9e c0 24 c0 28 00 6b c0 23 c0 27 00 67 c0 0a c0 14 00 
39 c0 09 c0 13 00 33 00 9d 00 9c 00 3d 00 3c 00 35 00 2f 00 ff 01 00 00 54 00 
0b 00 04 03 00 01 02 00 0a 00 0c 00 0a 00 1d 00 17 00 1e 00 19 00 18 00 16 00 
00 00 17 00 00 00 0d 00 30 00 2e 04 03 05 03 06 03 08 07 08 08 08 09 08 0a 08 
0b 08 04 08 05 08 06 04 01 05 01 06 01 03 03 02 03 03 01 02 01 03 02 02 02 04 
02 05 02 06 02
EAPOL: SUPP_BE entering state RECEIVE
iwx0: RX EAPOL from 24:f2:7f:f5:ae:11
RX EAPOL - hexdump(len=1008): 01 00 03 ec 01 11 03 ec 19 c0 00 00 11 82 16 03 
03 00 3d 02 00 00 39 03 03 6a 63 50 fd d5 f0 54 fd ad 05 54 48 ba 3c 15 a6 38 
63 7f 39 9f 8e fc df ec c7 da 0e bb 08 1e 46 00 c0 30 00 00 11 ff 01 00 01 00 
00 0b 00 04 03 00 01 02 00 17 00 00 16 03 03 0f 01 0b 00 0e fd 00 0e fa 00 09 
7b 30 82 09 77 30 82 07 df a0 03 02 01 02 02 10 2b 02 3f 7f 8d 82 2f 8b ad 7e 
fc fe 41 50 ad fc 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 68 31 0b 30 
09 06 03 55 04 06 13 02 44 45 31 27 30 25 06 03 55 04 0a 0c 1e 44 65 75 74 73 
63 68 65 20 54 65 6c 65 6b 6f 6d 20 53 65 63 75 72 69 74 79 20 47 6d 62 48 31 
30 30 2e 06 03 55 04 03 0c 27 54 65 6c 65 6b 6f 6d 20 53 65 63 75 72 69 74 79 
20 53 65 72 76 65 72 49 44 20 4f 56 20 43 6c 61 73 73 20 32 20 43 41 30 1e 17 
0d 32 34 30 31 30 33 31 33 31 35 31 33 5a 17 0d 32 35 30 31 30 37 32 33 35 39 
35 39 5a 30 81 9b 31 0b 30 09 06 03 55 04 06 13 02 44 45 31 16 30 14 06 03 55 
04 08 13 0d 4e 69 65 64 65 72 73 61 63 68 73 65 6e 31 13 30 11 06 03 55 04 07 
13 0a 47 6f 65 74 74 69 6e 67 65 6e 31 45 30 43 06 03 55 04 0a 13 3c 47 65 73 
65 6c 6c 73 63 68 61 66 74 20 66 2e 20 77 69 73 73 65 6e 73 63 68 2e 20 44 61 
74 65 6e 76 65 72 61 72 62 65 69 74 75 6e 67 20 6d 62 48 2c 20 47 6f 65 74 74 
69 6e 67 65 6e 31 18 30 16 06 03 55 04 03 13 0f 65 64 75 72 6f 61 6d 2e 67 77 
64 67 2e 64 65 30 82 02 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 
02 0f 00 30 82 02 0a 02 82 02 01 00 eb 11 87 76 17 1a 1c 50 12 7c bc c0 d5 ee 
b6 67 17 a7 c2 d1 87 8f 49 79 96 de df 22 81 c6 78 f8 11 cc e8 d5 5e 06 64 e9 
13 92 29 52 b6 67 03 83 4d 9c a6 32 fe e9 cd 35 8f 8b ca 6f 6c 56 59 3c 31 c7 
17 83 7d ab eb 4d fd 4c 69 54 8d 7e 65 38 3d b0 3f 13 25 58 b2 5f d9 a8 03 69 
e1 16 90 27 da 48 ce 2f f2 fa 72 7d e6 a2 0b 3c 6f 92 2f 67 8b 97 17 84 a0 2d 
eb 32 ee 63 e4 10 57 e1 c4 89 06 39 fd b5 b2 59 52 81 3b c1 b9 80 17 20 81 6a 
9f 88 c5 fa 54 cf 7a f0 b3 cf 6a 8d 09 36 da 58 c3 12 fc 52 d2 2f 54 56 c1 5b 
36 65 e0 d8 9b dc a2 2a 01 f4 5e 40 b1 e1 b6 ad 53 6e 74 3c dd 00 26 e5 b7 97 
44 db 92 d0 e0 3c f3 8f 86 17 b0 45 ac b4 ce 84 c1 75 b8 56 98 e3 71 e2 f9 17 
61 b4 75 a3 df 9f c2 39 ea c9 a9 11 69 ab e9 0a f8 8b dd 9f ed 9e c1 49 6e b1 
c6 91 ec 31 ad a4 ab f2 64 7f c6 31 ad 10 e0 ed 7e ab 67 d2 aa 23 f2 d0 d2 10 
2e ba cd 83 91 5f 65 47 d9 d4 b7 6c c9 d3 29 60 58 44 1b 4e f4 77 e0 66 ac 4c 
85 c8 37 61 a2 ee 19 b7 58 7f af 62 d1 cf 43 da 75 39 b5 66 a3 44 64 ca 8e ee 
36 bf bd 40 8d 96 96 17 66 49 19 60 63 3b 4b 96 15 ec 33 8f ef a5 5e 4e ca f8 
8b e8 20 92 71 dd 2c 67 d4 37 6e d6 4a b0 27 4a 82 fc 6d 5f b4 f2 dc 18 f4 e4 
d0 73 ad 94 31 fc f6 04 1f ca cf fc ed ca a5 2c 49 98 9c b5 0f 4f 2b 71 a3 1f 
54 96 9f 38 da a7 dd 22 b5 99 07 e9 da c1 02 d0 0a dd 78 97 53 e6 7c ca bb 37 
dc 17 db 1a 3c 2a fc d0 f3 39 55 79 de 33 4f ee 49 1d 52 a1 00 27 6e 63 12 0d 
27 dc 43 36 82 c2 b5 56 70 a3 10 16 6e ee 78 5a 0e c9 75 08 31 b8 4d 78 d1 22 
3f c8 87 fd 20 4f a7 37 75 2e b6 ec 06 b2 ab 6c 59 21 e8 d1 92 54 9f 03 7e fd 
ef 9f b0 e3 02 03 01 00 01 a3 82 04 67 30 82 04 63 30 1f 06 03 55 1d 23 04 18 
30 16 80 14
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=17 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1004) - Flags 0xc0
SSL: TLS Message Length: 4482
SSL: Need 3488 bytes more input data
SSL: Building ACK (type=25 id=17 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 
eapRespData=0xb1294af5660
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=24:f2:7f:f5:ae:11
TX EAPOL - hexdump(len=10): 01 00 00 06 02 11 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
iwx0: RX EAPOL from 24:f2:7f:f5:ae:11
RX EAPOL - hexdump(len=1004): 01 00 03 e8 01 12 03 e8 19 40 1c 05 93 b1 7f a8 
34 30 8c 52 e0 96 40 a0 72 a3 10 5d e0 ff 30 0e 06 03 55 1d 0f 01 01 ff 04 04 
03 02 05 a0 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05 05 07 03 02 06 
08 2b 06 01 05 05 07 03 01 30 1d 06 03 55 1d 0e 04 16 04 14 2c ca 7d f7 24 3b 
5d e6 60 72 71 70 5d 02 93 fc 35 12 c5 8b 30 53 06 03 55 1d 20 04 4c 30 4a 30 
48 06 06 67 81 0c 01 02 02 30 3e 30 3c 06 08 2b 06 01 05 05 07 02 01 16 30 68 
74 74 70 3a 2f 2f 64 6f 63 73 2e 73 65 72 76 65 72 69 64 2e 74 65 6c 65 73 65 
63 2e 64 65 2f 63 70 73 2f 73 65 72 76 65 72 69 64 2e 68 74 6d 30 5e 06 03 55 
1d 1f 04 57 30 55 30 53 a0 51 a0 4f 86 4d 68 74 74 70 3a 2f 2f 63 72 6c 2e 73 
65 72 76 65 72 69 64 2e 74 65 6c 65 73 65 63 2e 64 65 2f 72 6c 2f 54 65 6c 65 
6b 6f 6d 5f 53 65 63 75 72 69 74 79 5f 53 65 72 76 65 72 49 44 5f 4f 56 5f 43 
6c 61 73 73 5f 32 5f 43 41 2e 63 72 6c 30 81 9f 06 08 2b 06 01 05 05 07 01 01 
04 81 92 30 81 8f 30 31 06 08 2b 06 01 05 05 07 30 01 86 25 68 74 74 70 3a 2f 
2f 6f 63 73 70 2e 73 65 72 76 65 72 69 64 2e 74 65 6c 65 73 65 63 2e 64 65 2f 
6f 63 73 70 72 30 5a 06 08 2b 06 01 05 05 07 30 02 86 4e 68 74 74 70 3a 2f 2f 
63 72 74 2e 73 65 72 76 65 72 69 64 2e 74 65 6c 65 73 65 63 2e 64 65 2f 63 72 
74 2f 54 65 6c 65 6b 6f 6d 5f 53 65 63 75 72 69 74 79 5f 53 65 72 76 65 72 49 
44 5f 4f 56 5f 43 6c 61 73 73 5f 32 5f 43 41 2e 63 72 74 30 0c 06 03 55 1d 13 
01 01 ff 04 02 30 00 30 1a 06 03 55 1d 11 04 13 30 11 82 0f 65 64 75 72 6f 61 
6d 2e 67 77 64 67 2e 64 65 30 82 02 6f 06 0a 2b 06 01 04 01 d6 79 02 04 02 04 
82 02 5f 04 82 02 5b 02 59 00 76 00 55 81 d4 c2 16 90 36 01 4a ea 0b 9b 57 3c 
53 f0 c0 e4 38 78 70 25 08 17 2f a3 aa 1d 07 13 d3 0c 00 00 01 8c cf 76 be 16 
00 00 04 03 00 47 30 45 02 21 00 98 5a eb 07 96 89 c7 bb 4e b3 fa fd 4c 97 e8 
e7 9c 9d cb 38 9c 16 e7 b1 f5 ad e1 ed 06 a5 9a 0b 02 20 58 0f f1 0a 04 c3 54 
a6 12 9c d8 cd a0 95 7b 2f fd f3 a8 c3 c1 19 b5 58 c7 4a 8c d8 c4 58 ac 72 00 
77 00 cc fb 0f 6a 85 71 09 65 fe 95 9b 53 ce e9 b2 7c 22 e9 85 5c 0d 97 8d b6 
a9 7e 54 c0 fe 4c 0d b0 00 00 01 8c cf 76 bd 50 00 00 04 03 00 48 30 46 02 21 
00 a5 21 b4 ef fb 24 7e 61 b3 5b 20 50 d4 9a 7e 07 38 9e b0 b0 8c c1 fe d5 be 
8e 6c 7b 19 e4 bf 08 02 21 00 e0 88 31 1c 0c 1e 59 e6 39 8e 28 76 01 cc 4b b3 
ea aa 54 01 ba 1f eb f7 ee c9 a7 91 5e 0e d2 b1 00 76 00 28 e2 81 38 fd 83 21 
45 e9 a9 d6 aa 75 37 6d 83 77 a8 85 12 b3 c0 7f 72 41 48 21 dc bd e9 8c 66 00 
00 01 8c cf 76 c1 e9 00 00 04 03 00 47 30 45 02 20 6e bd ed bf a8 c1 f4 2c 09 
dd 52 47 24 b6 05 9c bb 49 c3 cb 24 d2 53 48 44 bc c3 58 52 ef 2f dd 02 21 00 
d3 7b 53 00 42 fc 83 fe 84 00 75 11 75 15 0a c9 63 3e 36 52 af 60 ab ff d8 1a 
6c 5c 93 4c 29 38 00 75 00 cf 11 56 ee d5 2e 7c af f3 87 5b d9 69 2e 9b e9 1a 
71 67 4a b0 17 ec ac 01 d2 5b 77 ce cc 3b 08 00 00 01 8c cf 76 bc de 00 00 04 
03 00 46 30 44 02 20 58 63 4b b9 fa 9d 1d 1d 54 6c 23 a6 65 c8 5d 20 68 e8 de 
75 20 95 c9 53 95 78 db db 8f 38 33 75 02 20 12 bd f0 7f 9d 50 fe 15 0a a9 ff 
44 f0 47 bf de f9 71 25 2a dd 0a 18 eb df 2f ed d8 99 5b 0e 91 00 77 00 4e 75
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=18 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1000) - Flags 0x40
SSL: Need 2494 bytes more input data
SSL: Building ACK (type=25 id=18 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 
eapRespData=0xb1294af5690
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=24:f2:7f:f5:ae:11
TX EAPOL - hexdump(len=10): 01 00 00 06 02 12 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
iwx0: RX EAPOL from 24:f2:7f:f5:ae:11
RX EAPOL - hexdump(len=1004): 01 00 03 e8 01 13 03 e8 19 40 a3 27 5c 9a 10 c3 
38 5b 6c d4 df 3f 52 eb 1d f0 e0 8e 1b 8d 69 c0 b1 fa 64 b1 62 9a 39 df 00 00 
01 8c cf 76 bd 12 00 00 04 03 00 48 30 46 02 21 00 ac 91 76 d5 dc 31 72 0a 4f 
01 cf 75 7f 6d da 73 08 b7 b5 fe 16 5c d4 91 19 52 ed 22 a5 e9 38 c6 02 21 00 
f9 fe 3b 12 f6 54 91 fa 2a f2 b7 e6 0f 95 65 c9 a5 88 15 db f3 d5 8c 3e 06 e4 
a0 75 1b fa 65 4f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 81 00 
91 60 88 e9 23 97 7b 88 1b b9 8a fa 51 63 a2 c9 72 04 4a 94 aa 13 17 9a 4d e4 
63 7f 89 03 d2 89 ff e0 91 a4 dc 65 5d fb 66 c2 2a 89 f6 0e 49 cb 29 58 09 1d 
e6 7c 30 2d d6 5a f7 d6 89 fb 2d f3 10 b2 b5 6a 2a 09 c3 2a bb e7 f7 2a 9d 9d 
3a a3 62 93 fc 90 db 6c d9 c8 a3 c1 6c c2 27 a3 0d b9 45 75 da 1b 41 48 05 85 
f3 db 2a 48 53 47 09 9a d0 d2 6a c4 7e 78 d8 c3 9a 76 67 2e 15 05 d0 0e 3b 11 
2b 19 e9 dd 09 6d fd 9e e6 e5 95 f7 5e 92 cb 35 58 80 6f d0 81 2b d4 4a eb 74 
e0 4e 1c c2 42 48 7a 8b cb 9f 90 5f 13 0e a5 ba 5c 9d e7 da ca 82 0a 57 7b a7 
fd 3d fe d2 b7 be e3 51 af 6c 2e d8 42 ad f3 93 0b 11 dd f2 1b 3e 00 54 73 42 
0a 99 ee f0 1a 20 66 97 c0 dd cc 1c dd 03 c6 2e 8e 95 2b 16 75 5c 46 60 7d 02 
f4 c1 8a 9a 9b a4 83 87 99 0c 2c 9d c9 f3 0b 5a 54 72 96 bf 72 ae ff d7 57 20 
d4 f3 5f f4 10 bb 34 4a 91 67 82 84 7c e6 c9 8c 2f ca cf ec 5a 24 78 28 8d cb 
ee 97 38 0b 55 f2 2b 9d 8e 36 63 b6 a0 db ac 62 1f 15 0c 6f 93 37 e0 95 a0 55 
e2 cb ca b5 6b fb 64 af ec 35 d5 45 09 fc 89 4c a5 f7 90 e1 5d d2 fa db d5 a2 
1c 80 f4 9c b9 c4 b3 25 96 dd 69 50 47 93 29 d2 ea 4b 79 7a aa 6a c6 46 31 51 
c4 07 c1 c4 5b 90 24 66 6b c9 0c 5b 65 7b 7b 93 09 5c 83 72 00 05 79 30 82 05 
75 30 82 04 5d a0 03 02 01 02 02 10 0e 5d 29 89 15 c4 04 31 a4 e1 c4 ca 48 8b 
8e a3 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 81 82 31 0b 30 09 06 03 
55 04 06 13 02 44 45 31 2b 30 29 06 03 55 04 0a 0c 22 54 2d 53 79 73 74 65 6d 
73 20 45 6e 74 65 72 70 72 69 73 65 20 53 65 72 76 69 63 65 73 20 47 6d 62 48 
31 1f 30 1d 06 03 55 04 0b 0c 16 54 2d 53 79 73 74 65 6d 73 20 54 72 75 73 74 
20 43 65 6e 74 65 72 31 25 30 23 06 03 55 04 03 0c 1c 54 2d 54 65 6c 65 53 65 
63 20 47 6c 6f 62 61 6c 52 6f 6f 74 20 43 6c 61 73 73 20 32 30 1e 17 0d 32 32 
30 38 30 32 30 39 31 36 34 34 5a 17 0d 32 37 30 38 30 32 32 33 35 39 35 39 5a 
30 68 31 0b 30 09 06 03 55 04 06 13 02 44 45 31 27 30 25 06 03 55 04 0a 0c 1e 
44 65 75 74 73 63 68 65 20 54 65 6c 65 6b 6f 6d 20 53 65 63 75 72 69 74 79 20 
47 6d 62 48 31 30 30 2e 06 03 55 04 03 0c 27 54 65 6c 65 6b 6f 6d 20 53 65 63 
75 72 69 74 79 20 53 65 72 76 65 72 49 44 20 4f 56 20 43 6c 61 73 73 20 32 20 
43 41 30 82 01 a2 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 8f 00 
30 82 01 8a 02 82 01 81 00 c9 23 44 69 7f 17 3a b7 4a ea b9 28 75 8e 34 28 9a 
98 ae 49 fc 8d a6 61 a1 7a 5e 0d b7 70 fe d3 13 5a e9 58 f5 79 de 0f e5 ea ad 
51 9a 28 b4 83 fc f9 7d fa 56 0f 1c d5 3c 59 f7 25 f6 0a 85 1e 48 ce cc 49 9d 
83 6f 20 1b b6 76 f8 28 7d 6a 76 63 f6 b8 ee 78 b4 98 5b e9 64 48 4b 3a b6 ae 
39 4f b1 05 81 e6 cd c6 e1 9f a7 0f 70 cd b8 65 ed 96 cc c7 3c f4 c3 34 41 50
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=19 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1000) - Flags 0x40
SSL: Need 1500 bytes more input data
SSL: Building ACK (type=25 id=19 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 
eapRespData=0xb1249040960
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=24:f2:7f:f5:ae:11
TX EAPOL - hexdump(len=10): 01 00 00 06 02 13 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
iwx0: RX EAPOL from 24:f2:7f:f5:ae:11
RX EAPOL - hexdump(len=1004): 01 00 03 e8 01 14 03 e8 19 40 46 3d f2 af 5e f0 
5f 65 79 4b 3e 8a 98 7f 28 93 f1 ff a4 b2 a1 08 60 e4 b5 49 0f 79 e0 05 69 62 
ec 58 5e 1a 52 49 12 3d 8e 89 45 38 95 13 ac 48 2e ad d8 20 59 5c f2 f4 27 fc 
63 fc d9 6a 39 1f 9e 93 42 96 a9 61 d2 a2 99 09 72 82 3f 63 1b d5 e3 fa 8f f4 
4d 7b 93 50 ea 8f 3e 84 93 b0 a7 6f 8c 40 ee a9 a4 7a de 16 60 83 3b 1c 14 50 
f0 ea 0e 39 75 aa 5f 60 ae 5e d3 1c a2 13 88 64 0c 35 a4 2e 2d 55 6c b8 e6 d3 
e2 72 fb 11 91 9c f4 de c7 5b dd d8 f9 a4 f0 6c 8d 16 0d a7 a8 7f 43 2b ea 3f 
6a d9 9b d5 54 23 f8 03 f0 12 3e 88 bb 56 65 bd 8d 40 e9 3c 43 56 63 30 c0 62 
ef 8a 4e 7b 95 c4 92 42 27 2a 2d 00 af 0a 4f ab 24 20 39 46 75 3f 4a ae a2 03 
79 1e ff 31 2e d5 42 5a 55 c3 35 bc 19 ad bb 9f 7b 73 ce 7b 9e db 75 15 73 9b 
50 af 83 10 40 f4 fd 13 76 be ae a1 ae 8f 7d 86 5a ae a9 4a 15 db 8b 02 03 01 
00 01 a3 82 01 7e 30 82 01 7a 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 01 06 
30 1d 06 03 55 1d 0e 04 16 04 14 1c 05 93 b1 7f a8 34 30 8c 52 e0 96 40 a0 72 
a3 10 5d e0 ff 30 1f 06 03 55 1d 23 04 18 30 16 80 14 bf 59 20 36 00 79 a0 a0 
22 6b 8c d5 f2 61 d2 b8 2c cb 82 4a 30 12 06 03 55 1d 13 01 01 ff 04 08 30 06 
01 01 ff 02 01 00 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05 05 07 03 
02 06 08 2b 06 01 05 05 07 03 01 30 50 06 03 55 1d 1f 04 49 30 47 30 45 a0 43 
a0 41 86 3f 68 74 74 70 3a 2f 2f 67 72 63 6c 32 2e 63 72 6c 2e 74 65 6c 65 73 
65 63 2e 64 65 2f 72 6c 2f 54 2d 54 65 6c 65 53 65 63 5f 47 6c 6f 62 61 6c 52 
6f 6f 74 5f 43 6c 61 73 73 5f 32 2e 63 72 6c 30 81 8d 06 08 2b 06 01 05 05 07 
01 01 04 81 80 30 7e 30 2e 06 08 2b 06 01 05 05 07 30 01 86 22 68 74 74 70 3a 
2f 2f 67 72 63 6c 32 2e 6f 63 73 70 2e 74 65 6c 65 73 65 63 2e 64 65 2f 6f 63 
73 70 72 30 4c 06 08 2b 06 01 05 05 07 30 02 86 40 68 74 74 70 3a 2f 2f 67 72 
63 6c 32 2e 63 72 74 2e 74 65 6c 65 73 65 63 2e 64 65 2f 63 72 74 2f 54 2d 54 
65 6c 65 53 65 63 5f 47 6c 6f 62 61 6c 52 6f 6f 74 5f 43 6c 61 73 73 5f 32 2e 
63 72 74 30 13 06 03 55 1d 20 04 0c 30 0a 30 08 06 06 67 81 0c 01 02 02 30 0d 
06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 03 82 01 01 00 53 2c cc 55 fa 44 ec 22 
3e a4 b3 52 b7 58 e5 8c e4 cc 92 fc 80 ce 19 84 40 72 33 fd f4 3b 2a aa c6 f4 
f8 a9 6f fc 38 c3 a6 a1 be 7c d8 53 a1 99 0c 20 e2 f0 14 25 4e 44 6d a8 d2 5c 
77 38 b3 7c f7 25 31 b1 6b 22 f6 06 f1 9c 99 7c 58 c7 58 59 a6 e5 22 52 f8 48 
65 13 ef d1 ae ba 67 a6 b4 ab 39 dd 6c 44 3a 97 19 e7 02 9e 44 dc f8 91 7e 9d 
cc 3a 7d ff 5f 3a 67 ce c5 b2 ce 3b f0 1b 8e 2d 4b e9 79 1c aa ce f1 c1 34 73 
60 3d a8 2a c0 3f 03 2b 76 9b fc e8 da 23 cd 4f 47 80 21 e0 78 15 7f 42 1c 09 
48 48 a0 97 99 e4 48 2f eb 71 bf 22 89 ea c0 c9 a6 46 0c a5 bb 57 91 10 d2 78 
f4 fa 65 38 be f4 40 49 1f 57 09 d8 c8 b3 dc c6 dd 77 4c 4a 7c 23 01 f5 82 3a 
a6 c9 35 0e ea 1c 77 4f 3f e3 9a 4a df 8f 00 15 68 df 2c 04 14 44 5f 3c c2 7b 
18 f2 78 ce 54 51 02 3f 83 7a 2f 91 66 e0 16 03 03 02 2c 0c 00 02 28 03 00 1d 
20 7b b0 2f 79 5c 21 86 be 1a a7 cb 43 db a2 42 85 af 9a 9c 81 2e ac 5c 00 2e 
d6 97 5e 2a 08 87 10 08 04 02 00 80 61 2c 87 99 71 c5 47 8c 42 30 4f b8 26 09
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=20 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=1000) - Flags 0x40
SSL: Need 506 bytes more input data
SSL: Building ACK (type=25 id=20 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 
eapRespData=0xb1294b13240
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=24:f2:7f:f5:ae:11
TX EAPOL - hexdump(len=10): 01 00 00 06 02 14 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
iwx0: RX EAPOL from 24:f2:7f:f5:ae:11
RX EAPOL - hexdump(len=516): 01 00 02 00 01 15 02 00 19 00 1a 99 de e2 24 56 56 
c1 d3 71 6e f9 23 52 db 0c f6 b1 83 d6 64 ed 68 29 41 35 f5 42 24 47 14 c0 59 
5b 55 46 00 4d d3 6e d2 bf 76 de aa 70 f7 d9 d7 3b ad cd 22 c9 cd 35 42 6a bc 
18 4d e0 db cc 3c 4e 66 3b d9 5c a5 84 04 25 0d 9e 0a d2 4d e4 4a 35 4d 37 9e 
aa a5 a5 fe 99 40 7a 9f 3c ba 76 f6 e3 ba ed c4 a9 d8 36 d4 de 62 b6 59 e0 c0 
20 18 c6 b0 47 8b b7 64 58 60 51 9c 71 aa af 3f 25 7c a9 d2 f6 91 a4 b7 a8 31 
ed 71 40 55 79 2d 0e 01 fb 63 7f 06 fc 13 f7 05 73 6e f8 17 74 12 23 13 c8 be 
08 61 24 de 33 4f 9c b6 46 c1 c1 bb 80 dc 8a 75 c3 03 ee 19 2a ea 18 46 43 bb 
33 fb 0e 82 9e 68 32 c2 4b 7a f6 a9 1b 19 10 24 ef 01 c2 81 1a b4 69 d0 81 bf 
f1 1f 69 74 3f 65 54 00 a0 c9 6c 29 01 1c d7 93 0b 93 8c 88 3a 95 0c 19 33 82 
8d ce 87 2d 81 74 5c 20 45 c4 c6 76 02 1d 96 48 28 c7 87 00 bd bc 29 ee 97 09 
0b 3c c8 2e c4 15 78 a5 ec 15 55 33 62 34 9f d3 97 4f 3f 59 0d 64 72 71 e5 e5 
5c fc 74 2a d6 91 26 5c f7 d8 1a f7 aa 20 6e e2 e6 2a aa ac 6a cb 61 5c 66 1f 
0a 1c 65 89 ee fa ae 38 41 6a ed dc 26 db 00 88 03 fa 75 3a c6 98 e0 45 dd 06 
15 df 65 bd f8 6c 80 06 da d3 20 9e ee a6 c3 eb 22 11 e6 ab 87 7a ac 6d 9c 57 
ad 1c c3 b5 00 7e d7 b9 7f b9 a1 87 49 53 ed 45 3c 22 a8 5b a2 c1 88 71 31 84 
e2 ba 56 9a d2 a8 90 22 a4 63 e3 84 5e d1 f6 df c1 35 a0 ca 65 ce 8f 19 e2 06 
dd 66 e6 ea 75 a2 8e 38 4d 53 aa 04 eb d8 b5 11 72 16 18 e0 70 c5 2b ea 7f e5 
58 6e cd e2 20 41 22 df 95 dc ad ad 49 46 60 3b af 7d f5 8d 84 e8 92 fd 28 3e 
32 e8 c8 a2 1e 9c 30 b9 b7 53 16 e0 3b 28 73 7c 0e f8 ec f8 56 05 16 03 03 00 
04 0e 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=21 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=512) - Flags 0x00
OpenSSL: RX ver=0x303 content_type=256 (TLS header info/)
OpenSSL: Message - hexdump(len=5): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3/TLS write client hello
OpenSSL: RX ver=0x303 content_type=22 (handshake/server hello)
OpenSSL: Message - hexdump(len=61): [REMOVED]
OpenSSL: RX ver=0x303 content_type=256 (TLS header info/)
OpenSSL: Message - hexdump(len=5): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3/TLS read server hello
OpenSSL: RX ver=0x303 content_type=22 (handshake/certificate)
OpenSSL: Message - hexdump(len=3841): [REMOVED]
iwx0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=DE/O=T-Systems Enterprise 
Services GmbH/OU=T-Systems Trust Center/CN=T-TeleSec GlobalRoot Class 2' 
hash=91e2f5788d5810eba7ba58737de1548a8ecacd014598bc0b143e041b17052552
TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=2 
buf='/C=DE/O=T-Systems Enterprise Services GmbH/OU=T-Systems Trust 
Center/CN=T-TeleSec GlobalRoot Class 2'
OpenSSL: Certificate Policy 2.23.140.1.2.2
iwx0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=DE/O=Deutsche Telekom 
Security GmbH/CN=Telekom Security ServerID OV Class 2 CA' 
hash=944ace961db316beb694e01c302c46fed40dc0291729e7daf58550c3cb55e791
TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=1 
buf='/C=DE/O=Deutsche Telekom Security GmbH/CN=Telekom Security ServerID OV 
Class 2 CA'
OpenSSL: Certificate Policy 2.23.140.1.2.2
iwx0: CTRL-EVENT-EAP-PEER-CERT depth=0 
subject='/C=DE/ST=Niedersachsen/L=Goettingen/O=Gesellschaft f. wissensch. 
Datenverarbeitung mbH, Goettingen/CN=eduroam.gwdg.de' 
hash=124afd6b1b6d6f551f24f2fd7faa29d746b5049c7ad02a8c49f323a6c342f342
iwx0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:eduroam.gwdg.de
TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=0 
buf='/C=DE/ST=Niedersachsen/L=Goettingen/O=Gesellschaft f. wissensch. 
Datenverarbeitung mbH, Goettingen/CN=eduroam.gwdg.de'
EAP: Status notification: remote certificate verification (param=success)
OpenSSL: RX ver=0x303 content_type=256 (TLS header info/)
OpenSSL: Message - hexdump(len=5): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3/TLS read server certificate
OpenSSL: RX ver=0x303 content_type=22 (handshake/server key exchange)
OpenSSL: Message - hexdump(len=556): [REMOVED]
OpenSSL: RX ver=0x303 content_type=256 (TLS header info/)
OpenSSL: Message - hexdump(len=5): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3/TLS read server key exchange
OpenSSL: RX ver=0x303 content_type=22 (handshake/server hello done)
OpenSSL: Message - hexdump(len=4): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3/TLS read server done
OpenSSL: TX ver=0x303 content_type=256 (TLS header info/)
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x303 content_type=22 (handshake/client key exchange)
OpenSSL: Message - hexdump(len=37): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3/TLS write client key exchange
OpenSSL: TX ver=0x303 content_type=256 (TLS header info/)
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x303 content_type=20 (change cipher spec/)
OpenSSL: Message - hexdump(len=1): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3/TLS write change cipher spec
OpenSSL: TX ver=0x303 content_type=256 (TLS header info/)
OpenSSL: Message - hexdump(len=5): [REMOVED]
OpenSSL: TX ver=0x303 content_type=22 (handshake/finished)
OpenSSL: Message - hexdump(len=16): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3/TLS write finished
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3/TLS write finished
SSL: SSL_connect - want more data
SSL: 93 bytes pending from ssl_out
SSL: Using TLS version TLSv1.2
SSL: 93 bytes left to be sent out (of total 93 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 
eapRespData=0xb1294b220a0
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=24:f2:7f:f5:ae:11
TX EAPOL - hexdump(len=107): 01 00 00 67 02 15 00 67 19 80 00 00 00 5d 16 03 03 
00 25 10 00 00 21 20 39 b2 98 cf 84 23 77 e0 f1 d4 f7 46 f1 b4 23 d4 a2 ef 86 
9e be 0c ef 31 4b 68 18 bd 59 4c 6c 6d 14 03 03 00 01 01 16 03 03 00 28 a8 36 
77 e2 f6 68 fe cb 20 52 18 70 fe 14 6d 63 a7 6c 8c 29 8c 9e 55 3a 05 89 ae ff 
c8 3d ef 3e a5 3a a6 1c 4e fc 7c 32
EAPOL: SUPP_BE entering state RECEIVE
iwx0: RX EAPOL from 24:f2:7f:f5:ae:11
RX EAPOL - hexdump(len=61): 01 00 00 39 01 16 00 39 19 00 14 03 03 00 01 01 16 
03 03 00 28 aa d4 36 dc 7e 86 4e 16 71 3b e1 89 65 ee 89 e0 af bf ed 6d 8c f0 
52 ce 8d 57 4b eb 00 fe 27 4d 33 10 15 37 da 9d cc 0f
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=22 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=57) - Flags 0x00
OpenSSL: RX ver=0x303 content_type=256 (TLS header info/)
OpenSSL: Message - hexdump(len=5): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3/TLS write finished
OpenSSL: RX ver=0x303 content_type=256 (TLS header info/)
OpenSSL: Message - hexdump(len=5): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3/TLS read change cipher spec
OpenSSL: RX ver=0x303 content_type=22 (handshake/finished)
OpenSSL: Message - hexdump(len=16): [REMOVED]
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3/TLS read finished
SSL: (where=0x20 ret=0x1)
SSL: (where=0x1002 ret=0x1)
SSL: 0 bytes pending from ssl_out
OpenSSL: Handshake finished - resumed=0
SSL: No Application Data included
SSL: Using TLS version TLSv1.2
SSL: No data to be sent out
EAP-PEAP: TLS done, proceed to Phase 2
EAP-PEAP: using label 'client EAP encryption' in key derivation
EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
EAP-PEAP: Derived EMSK - hexdump(len=64): [REMOVED]
EAP-PEAP: Derived Session-Id - hexdump(len=65): 19 2c 81 d2 45 64 b0 b3 16 26 
31 2d 50 f0 51 2f 75 c8 42 ba b7 b1 b6 ee 49 04 be a6 25 54 88 c5 cb 6a 63 50 
fd d5 f0 54 fd ad 05 54 48 ba 3c 15 a6 38 63 7f 39 9f 8e fc df ec c7 da 0e bb 
08 1e 46
SSL: Building ACK (type=25 id=22 ver=0)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 
eapRespData=0xb1294b16f90
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=24:f2:7f:f5:ae:11
TX EAPOL - hexdump(len=10): 01 00 00 06 02 16 00 06 19 00
EAPOL: SUPP_BE entering state RECEIVE
iwx0: RX EAPOL from 24:f2:7f:f5:ae:11
RX EAPOL - hexdump(len=46): 01 00 00 28 01 17 00 28 19 00 17 03 03 00 1d aa d4 
36 dc 7e 86 4e 17 a3 a6 06 5e da 87 bb 8b f4 4d a9 b2 85 10 1c af aa 7c 78 6c 
0c 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=23 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=40) - Flags 0x00
EAP-PEAP: received 34 bytes encrypted data for Phase 2
OpenSSL: RX ver=0x303 content_type=256 (TLS header info/)
OpenSSL: Message - hexdump(len=5): [REMOVED]
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 17 00 05 01
EAP-PEAP: received Phase 2: code=1 identifier=23 length=5
EAP-PEAP: Phase 2 Request: type=1
EAP: using real identity - hexdump_ascii(len=19):
     67 61 73 74 39 35 30 40 6c 68 6c 74 2e 6d 70 67   gast...@lhlt.mpg
     2e 64 65                                          .de             
EAP-PEAP: Encrypting Phase 2 data - hexdump(len=24): [REMOVED]
OpenSSL: TX ver=0x303 content_type=256 (TLS header info/)
OpenSSL: Message - hexdump(len=5): [REMOVED]
SSL: 49 bytes left to be sent out (of total 49 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 
eapRespData=0xb124905c900
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=24:f2:7f:f5:ae:11
TX EAPOL - hexdump(len=59): 01 00 00 37 02 17 00 37 19 00 17 03 03 00 2c a8 36 
77 e2 f6 68 fe cc 53 c5 88 9c 2d 06 f0 ca d2 1d c3 a6 43 4a 29 3b a8 75 23 95 
65 3e 34 8d 72 65 64 19 a9 46 68 4d c2 9c c6 ac
EAPOL: SUPP_BE entering state RECEIVE
iwx0: RX EAPOL from 24:f2:7f:f5:ae:11
RX EAPOL - hexdump(len=77): 01 00 00 49 01 18 00 49 19 00 17 03 03 00 3e aa d4 
36 dc 7e 86 4e 18 ed 97 3e a8 db 50 da 2e 5f 38 9b 05 6e fe 31 35 a4 22 09 06 
c7 a5 dc a1 25 a1 c4 2b aa ee 62 ff 70 33 b4 31 5d 77 b1 78 4f a7 a7 21 24 cc 
de 14 2d 57 cb b6 0b 86
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=24 method=25 vendor=0 vendorMethod=0
EAP: EAP entering state METHOD
SSL: Received packet(len=73) - Flags 0x00
EAP-PEAP: received 67 bytes encrypted data for Phase 2
OpenSSL: RX ver=0x303 content_type=256 (TLS header info/)
OpenSSL: Message - hexdump(len=5): [REMOVED]
EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=38): 1a 01 18 00 25 10 16 10 44 
08 aa f5 aa f8 f6 58 70 c6 7b d1 1c af 66 72 65 65 72 61 64 69 75 73 2d 33 2e 
32 2e 33
EAP-PEAP: received Phase 2: code=1 identifier=24 length=42
EAP-PEAP: Phase 2 Request: type=26
EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26
EAP-MSCHAPV2: RX identifier 24 mschapv2_id 24
EAP-MSCHAPV2: Received challenge
EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=16):
     66 72 65 65 72 61 64 69 75 73 2d 33 2e 32 2e 33   freeradius-3.2.3
EAP-MSCHAPV2: Generating Challenge Response
MSCHAPV2: Identity - hexdump_ascii(len=19):
     67 61 73 74 39 35 30 40 6c 68 6c 74 2e 6d 70 67   gast...@lhlt.mpg
     2e 64 65                                          .de             
MSCHAPV2: Username - hexdump_ascii(len=19):
     67 61 73 74 39 35 30 40 6c 68 6c 74 2e 6d 70 67   gast...@lhlt.mpg
     2e 64 65                                          .de             
MSCHAPV2: auth_challenge - hexdump(len=16): 16 10 44 08 aa f5 aa f8 f6 58 70 c6 
7b d1 1c af
MSCHAPV2: peer_challenge - hexdump(len=16): 5b e7 88 cb 04 42 00 ef e9 d3 b0 1e 
fc 4a f0 80
MSCHAPV2: username - hexdump_ascii(len=19):
     67 61 73 74 39 35 30 40 6c 68 6c 74 2e 6d 70 67   gast...@lhlt.mpg
     2e 64 65                                          .de             
MSCHAPV2: password - hexdump_ascii(len=12): [REMOVED]
OpenSSL: EVP_DigestInit_ex failed: error:0308010C:digital envelope 
routines::unsupported
EAP-MSCHAPV2: Failed to derive response
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL 
eapRespData=0x0
EAP: EAP entering state SEND_RESPONSE
EAP: No eapRespData available
EAP: EAP entering state IDLE
iwx0: RX EAPOL from 24:f2:7f:f5:ae:11
RX EAPOL - hexdump(len=77): 01 00 00 49 01 18 00 49 19 00 17 03 03 00 3e aa d4 
36 dc 7e 86 4e 18 ed 97 3e a8 db 50 da 2e 5f 38 9b 05 6e fe 31 35 a4 22 09 06 
c7 a5 dc a1 25 a1 c4 2b aa ee 62 ff 70 33 b4 31 5d 77 b1 78 4f a7 a7 21 24 cc 
de 14 2d 57 cb b6 0b 86
EAPOL: Received EAP-Packet frame
iwx0: RX EAPOL from 24:f2:7f:f5:ae:11
RX EAPOL - hexdump(len=77): 01 00 00 49 01 18 00 49 19 00 17 03 03 00 3e aa d4 
36 dc 7e 86 4e 18 ed 97 3e a8 db 50 da 2e 5f 38 9b 05 6e fe 31 35 a4 22 09 06 
c7 a5 dc a1 25 a1 c4 2b aa ee 62 ff 70 33 b4 31 5d 77 b1 78 4f a7 a7 21 24 cc 
de 14 2d 57 cb b6 0b 86
EAPOL: Received EAP-Packet frame
iwx0: Removing interface iwx0
iwx0: Request to deauthenticate - bssid=24:f2:7f:f5:ae:11 
pending_bssid=00:00:00:00:00:00 reason=3 (DEAUTH_LEAVING) state=ASSOCIATED
iwx0: Event DEAUTH (11) received
iwx0: Deauthentication notification
iwx0:  * reason 3 (DEAUTH_LEAVING) locally_generated=1
Deauthentication frame IE(s) - hexdump(len=0): [NULL]
iwx0: CTRL-EVENT-DISCONNECTED bssid=24:f2:7f:f5:ae:11 reason=3 
locally_generated=1
iwx0: Auto connect disabled: do not try to re-connect
iwx0: Ignore connection failure indication since interface has been put into 
disconnected state
iwx0: WPA: Clear old PMK and PTK
iwx0: Disconnect event - remove keys
iwx0: State: ASSOCIATED -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
iwx0: State: DISCONNECTED -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAP: deinitialize previously used EAP method (25, PEAP) at EAP deinit
ENGINE: engine deinit
iwx0: WPA: Clear old PMK and PTK
iwx0: Cancelling scan request
iwx0: Cancelling authentication timeout
Remove interface iwx0 from radio 
Remove radio 
iwx0: CTRL-EVENT-TERMINATING 


Reply via email to