Sdk 2.9.3 changes from 2.6.6

James - first, the 2 boards are on the way.

I just tried dpp. It worked the first 2 times, then failed. The last little bit of those logs for each AP and STA is below. I then ran those 2 commands to add extra logging. On the AP, I ran “hostapd_cli_s1g log_level debug” and on the station I ran “wpa_cli_s1g log_level debug”. The dpp failed, so maybe you can glean something from those logs?

Sta dpp fail.txt (740.4 KB)

AP dpp fail.txt (302.8 KB)

AP:
Wed Feb 25 16:47:56 2026 daemon.notice hostapd_s1g: wlan0: DPP-RX src=40:d6:3c:d9:48:1e freq=5510 type=10
Wed Feb 25 16:47:56 2026 daemon.notice hostapd_s1g: wlan0: DPP-TX dst=40:d6:3c:d9:48:1e freq=5510 type=0
Wed Feb 25 16:47:56 2026 daemon.notice hostapd_s1g: wlan0: DPP-RX src=40:d6:3c:d9:48:1e freq=5510 type=10
Wed Feb 25 16:47:56 2026 daemon.notice hostapd_s1g: wlan0: DPP-RX src=40:d6:3c:d9:48:1e freq=5510 type=10
Wed Feb 25 16:47:56 2026 daemon.notice hostapd_s1g: wlan0: DPP-RX src=40:d6:3c:d9:48:1e freq=5510 type=10
Wed Feb 25 16:47:56 2026 daemon.notice hostapd_s1g: wlan0: DPP-TX-STATUS dst=40:d6:3c:d9:48:1e result=SUCCESSWed Feb 25 16:48:01 2026 daemon.notice hostapd_s1g: DPP: Listen operation on non-operating channel (5510 MHz) is not yet supported (operating channel: 5560 MHz)
Wed Feb 25 16:48:01 2026 daemon.notice hostapd_s1g: DPP: No response received from responder - stopping initiation attempt
Wed Feb 25 16:48:01 2026 daemon.notice hostapd_s1g: wlan0: DPP-AUTH-INIT-FAILED
Wed Feb 25 16:49:07 2026 daemon.notice hostapd_s1g: wlan0: DPP-PB-RESULT failed

STA:
Wed Feb 25 16:47:55 2026 daemon.notice wpa_supplicant_s1g[15067]: wlan0: DPP-PB-STATUS start push button PKEX responder on the discovered channel (5510 MHz)
Wed Feb 25 16:47:55 2026 daemon.notice wpa_supplicant_s1g[15067]: wlan0: DPP-TX dst=ff:ff:ff:ff:ff:ff freq=5510 type=19
Wed Feb 25 16:47:55 2026 daemon.notice wpa_supplicant_s1g[15067]: wlan0: DPP-RX src=1c:bc:ec:21:64:3f freq=5510 type=20
Wed Feb 25 16:47:56 2026 daemon.notice wpa_supplicant_s1g[15067]: wlan0: DPP-RX src=1c:bc:ec:21:64:3f freq=5510 type=18
Wed Feb 25 16:47:56 2026 daemon.notice wpa_supplicant_s1g[15067]: wlan0: DPP-TX dst=1c:bc:ec:21:64:3f freq=5510 type=8
Wed Feb 25 16:47:56 2026 daemon.notice wpa_supplicant_s1g[15067]: wlan0: DPP-TX-STATUS dst=1c:bc:ec:21:64:3f freq=5510 result=no-ACK
Wed Feb 25 16:47:56 2026 daemon.notice wpa_supplicant_s1g[15067]: wlan0: DPP-RX src=1c:bc:ec:21:64:3f freq=5510 type=9
Wed Feb 25 16:47:56 2026 daemon.notice wpa_supplicant_s1g[15067]: wlan0: DPP-TX dst=1c:bc:ec:21:64:3f freq=5510 type=10
Wed Feb 25 16:47:56 2026 daemon.notice wpa_supplicant_s1g[15067]: wlan0: DPP-TX-STATUS dst=1c:bc:ec:21:64:3f freq=5510 result=no-ACK
Wed Feb 25 16:47:56 2026 daemon.notice wpa_supplicant_s1g[15067]: wlan0: DPP-RX src=1c:bc:ec:21:64:3f freq=5510 type=0
Wed Feb 25 16:47:56 2026 daemon.notice wpa_supplicant_s1g[15067]: wlan0: DPP-FAIL No matching peer bootstrapping key found for PKEX - ignore message
wpa_s1g_dpp_action.sh: state=failed
diag_override.sh: set_state dpp_failed

The relevant part of the failure on the STA side looks like this:

Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: Received DPP Public Action frame crypto suite 1 type 18 from 1c:bc:ec:21:64:3f freq=5510
Wed Feb 25 17:01:40 2026 daemon.notice wpa_supplicant_s1g[15067]: wlan0: DPP-RX src=1c:bc:ec:21:64:3f freq=5510 type=18
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: PKEX Exchange Request from 1c:bc:ec:21:64:3f
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: Peer protocol version 3
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: code identifier: PBPKEX
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: code - hexdump(len=16): [REMOVED]
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: H([MAC-Initiator |] [identifier |] code) - hexdump(len=32): [REMOVED]
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: EC_PUBKEY - hexdump(len=59): [REMOVED]
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: Qi (99129DBFDAD340DAF2D9BF3BD8A6AEBB705D05ABDF2E8C200F35C9C290E9BBF6,9BE52572A6433D8C2BDC84628A858A1282B7160D88CB57641E7FB57173F0B9B7)
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: M (3844DB52D0143C7BAD8CF2C926C30F221F0425BB612A73D757E398F33E809DF4,688026FFC9133C5BBD82C1EC6EE71F832FBDB6F5984EAD570098B3A44FC67896)
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: X' (314C6D478AE7437E08DA479B6CC93D69888F084C129D5C9E05F0C98B6173AB64,F2F9D3884C767A1A069B3C04E6508376B5C2570460B8DC42818A4137A9DDF67B)
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: code identifier: PBPKEX
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: code - hexdump(len=16): [REMOVED]
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: H([MAC-Responder |] [identifier |] code) - hexdump(len=32): [REMOVED]
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: EC_PUBKEY - hexdump(len=59): [REMOVED]
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: Qr (0D7ACAE2337559087FB0BBB4A553C1C3A7B32227F16C9E7B896CAC983663DBA9,799AC0602FB898DECD156FE54F364F561784AEF0F38460872F63281D7132E634)
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: Generating a keypair
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: Y (E3002FB17C64A1DF1174EA1BB2BBDFB5DD7F67942E17B03CD2438FDEA33D9438,D3E3353F535B5FA3F73534127498638F3906DB86C40A96D2892D0EF2F757D0A0)
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: N (80D39CAF33752B7B2D8CD9060542EE5C486752EA6237D52B830E27F24FF23B45,FAAB38D4CD1236820DE76E543A3DEDB5AC9532DCBD4E669AB276DCC911EEBA1B)
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: Status 0
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: ECDH shared secret (K.x) - hexdump(len=32): [REMOVED]
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: PRK = HKDF-Extract(<>, IKM) - hexdump(len=32): [REMOVED]
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: z = HKDF-Expand(PRK, info, L) - hexdump(len=32): [REMOVED]
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: Started PB PKEX (no more PB announcements)
Wed Feb 25 17:01:40 2026 daemon.notice wpa_supplicant_s1g[15067]: wlan0: DPP-TX dst=1c:bc:ec:21:64:3f freq=5510 type=8
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: Off-channel: Send action frame: freq=5510 dst=1c:bc:ec:21:64:3f src=40:d6:3c:d9:48:1e bssid=ff:ff:ff:ff:ff:ff len=96
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: Off-channel: Stored pending action frame (dst=1c:bc:ec:21:64:3f pending_action_tx=0x7786da40)
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: nl80211: Send Action frame (ifindex=16, freq=5510 MHz wait=2000 ms no_cck=0 offchanok=1 dst=1c:bc:ec:21:64:3f src=40:d6:3c:d9:48:1e bssid=ff:ff:ff:ff:ff:ff)
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan0
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: nl80211: Frame TX status event A1=1c:bc:ec:21:64:3f stype=13 cookie=0x729 ack=0
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: nl80211: Frame TX status: cookie=0x729 (match) (ack=0)
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: wlan0: Event TX_STATUS (16) received
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: wlan0: EVENT_TX_STATUS dst=1c:bc:ec:21:64:3f type=0 stype=13
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: Off-channel: Delete matching pending action frame (dst=1c:bc:ec:21:64:3f pending_action_tx=0x7786da40)
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: Off-channel: TX status result=1 cb=0x435e65
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: TX status: freq=5510 dst=1c:bc:ec:21:64:3f result=no-ACK (PKEX)
Wed Feb 25 17:01:40 2026 daemon.notice wpa_supplicant_s1g[15067]: wlan0: DPP-TX-STATUS dst=1c:bc:ec:21:64:3f freq=5510 result=no-ACK
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: nl80211: Drv Event 67 (NL80211_CMD_FRAME_WAIT_CANCEL) received for wlan0
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: nl80211: TX frame wait expired for cookie 0x727 (match)
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: wlan0: Event TX_WAIT_EXPIRE (62) received
Wed Feb 25 17:01:40 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: Push button announcements stopped
Wed Feb 25 17:01:41 2026 daemon.debug wpa_supplicant_s1g[15067]: nl80211: Drv Event 67 (NL80211_CMD_FRAME_WAIT_CANCEL) received for wlan0
Wed Feb 25 17:01:41 2026 daemon.debug wpa_supplicant_s1g[15067]: nl80211: TX frame wait expired for cookie 0x728 (match)
Wed Feb 25 17:01:41 2026 daemon.debug wpa_supplicant_s1g[15067]: wlan0: Event TX_WAIT_EXPIRE (62) received
Wed Feb 25 17:01:41 2026 daemon.debug wpa_supplicant_s1g[15067]: DPP: Push button announcements stopped

Note that the AP doesn’t ACK its response to the PKEX exchange request, and unfortunately the STA then gives up entirely.

I have raised this internally. What would help us prioritise this and investigate it further is:

  • if this is the same failure you see every time? i.e. once it’s started failing, does it keep failing this way?
  • notably when you say it succeeded twice, how are you resetting the STA state afterwards?
  • if you can get a packet capture (i.e. use another HaLow device in monitor mode) to see what’s going on over the air (i.e. is it that the STA never sent it or the AP just missed it)?
  • are there any other daemons/background processes running on the AP/STA?
  • what is your current /etc/config/wireless on the AP/STA?
  • if you have a cabled setup or less noisy environment, does it still occur?
  1. I think y’all will be able to have complete visibility into all these questions once you receive our boards.
  2. Per question about resetting sta… I factory reset sta and ap. On wizard, I set sta halow ssid to ‘test’ just to make it different so I could dpp initially. First dpp, pressed ap button, pressed sta button. Dpp worked. On the sta quick settings, changed the halow ssid, did dpp buttons again, it worked. Changed sta halow ssid, did dpp and it failed per the logs I sent
  3. attached file for some other questions. Was trying to see if fail sta log was what you showed, but after the 1st time of that extra logging info on the sta, it stopped showing all the extra stuff so it wasn’t there when it failed. In trying to collect data for that, dpp worked twice, failed twice, worked 3 times, failed again, using the above method to change halow ssid. In all failed situations, the sta showed this at the end of its trying: “daemon.notice wpa_supplicant_s1g[20910]: wlan0: DPP-TX-STATUS dst=1c:bc:ec:21:64:3f freq=5550 result=no-ACK”. Both sta and ap soon started the 2 min fast led.

2.9.3 ap-sta info and dpp log of good dpp.txt (1.0 MB)