Debug UART Log for EAP-PEAPv0/TLS

(0)MAC:efuse
(0)MAC_ADDR  = F8:F0:05:F4:32:34
(0)Shr_buf static: 0, 5, 5, 22, 9, 10
(10)NMI M2M SW  VER 19.6.1 REV 16761
(10)NMI MIN DRV VER 19.3.0
(10)FW URL branches/rel_1500_19.6.1
(10)Built May 23 2018   14:39:16
(10)ROM VER_2
(10)__HW_AES__
(20)(M2M)LOAD SEC
(20)(TLS)TLS Sess Sz=1572
(40)PSM off
(60)(M2M)LOAD CON
(70)(M2M)Wifi Connect
(70)(M2M)SSID: ENT_TEST
(70)(M2M)BSSID: 00:00:00:00:00:00
(70)(M2M)AUTH: WPA-Enterprise
(70)(M2M)FastCh: 1
(80)(M2M)LOAD SEC
(80)Reset MAC
(90)(GP_REG)USE PMU
(90)AIC CORR (FW) = 17d1
(90)PIC CORR (FW) = fb9
(100)PSM on
(100)MAC State <3>
(100)Set Fast Ch 1
(160)MAC State <4>
(160)MAC State <3>
(300)MAC State <4>
(300)Fast conn, Rssi -31 Ch 13
(310)Join on 13 ENT_TEST Bss 94:10:3e:c6:d6:c1 Rssi -31
(310)MAC State <5>
(310)MAC State <6>
(310)MAC State <7>
(310)MAC State <9>
(310)MAC State <10>
(310)(EAP)Stop
(310)MAC State <1>
(310)(EAP)<- Start
(320)(M2M)LOAD TLS
(320)(EAP)-> Layer:0 Code:1 Type:1
(320)(EAP)<- Layer:0 Type:1
(330)(EAP)-> Layer:0 Code:1 Type:25
(330)(TLS)Creating EAP
(330)()<- ClientHello
(330)(EAP)<- Layer:0 Type:25
(340)(EAP)-> Layer:0 Code:1 Type:25
(340)()-> ServerHello
(340)>> TLS_RSA_WITH_AES_128_GCM_SHA256
(340)()-> Certificate
(350)(TLS)*=*=* X509 *=*=*
(350)(TLS)      Subject < >
(350)(TLS)      Issuer  < >
(350)(TLS)      <2017-04-20 12:11:52> to <2027-04-18 12:11:52>
(350)(TLS)Root Cert <RSA>
(350)(TLS)      <2017-04-20 12:11:52> to <2027-04-18 12:11:52>
(360)(TLS)Root Valid
(360)()-> ServerHelloDone
(410)Tsf join
(430)()<- ClientKeyExchange
(440)()<- ChangeCipherSpec
(440)()<- Finished
(440)(EAP)<- Layer:0 Type:25
(450)(EAP)-> Layer:0 Code:1 Type:25
(460)()-> ChangeCipherSpec
(460)()-> ServerFinished
(460)(TLS)Sess() Established==>TLSv1.2
(470)(EAP)<- Layer:0 Type:25
(470)(EAP)-> Layer:0 Code:1 Type:25
(470)(EAP)-> Layer:1 Code:1 Type:1
(480)(EAP)<- Layer:1 Type:1
(480)(EAP)<- Layer:0 Type:25
(480)(EAP)-> Layer:0 Code:1 Type:25
(490)(EAP)-> Layer:1 Code:13 Type:13
(490)(TLS)Creating EAP
(490)()<- ClientHello
(490)(EAP)<- Layer:1 Type:13
(500)(EAP)<- Layer:0 Type:25
(510)(EAP)-> Layer:0 Code:1 Type:25
(530)Tsf join Done
(530)(EAP)-> Layer:1 Code:13 Type:13
(530)()-> ServerHello
(530)>> TLS_RSA_WITH_AES_128_GCM_SHA256
(530)()-> Certificate
(540)(TLS)*=*=* X509 *=*=*
(540)(TLS)      Subject < >
(540)(TLS)      Issuer  < >
(540)(TLS)      <2017-04-20 12:11:52> to <2027-04-18 12:11:52>
(540)(TLS)Root Cert <RSA>
(540)(TLS)      <2017-04-20 12:11:52> to <2027-04-18 12:11:52>
(540)(TLS)Root Valid
(540)(EAP)<- Layer:1 Type:13
(550)(EAP)<- Layer:0 Type:25
(550)(EAP)-> Layer:0 Code:1 Type:25
(560)(EAP)-> Layer:1 Code:13 Type:13
(560)()-> CertificateRequest
(560)()-> ServerHelloDone
(640)()<- Certificate
(650)()<- ClientKeyExchange
(1660)()<- CertificateVerify
(1670)()<- ChangeCipherSpec
(1670)()<- Finished
(1670)(EAP)<- Layer:1 Type:13
(1690)(EAP)<- Layer:0 Type:25
(1700)(EAP)-> Layer:0 Code:1 Type:25
(1700)(EAP)<- Layer:0 Type:25
(1710)(EAP)-> Layer:0 Code:1 Type:25
(1710)(EAP)-> Layer:1 Code:13 Type:13
(1710)(EAP)<- Layer:1 Type:13
(1720)(EAP)<- Layer:0 Type:25
(1730)(EAP)-> Layer:0 Code:1 Type:25
(1730)(EAP)-> Layer:1 Code:13 Type:13
(1730)()-> ChangeCipherSpec
(1740)()-> ServerFinished
(1740)(TLS)Sess() Established==>TLSv1.2
(1740)(EAP)<- Layer:1 Type:13
(1750)(EAP)<- Layer:0 Type:25
(1750)(EAP)-> Layer:0 Code:1 Type:25
(1760)(EAP)-> Layer:1 Code:1 Type:1
(1760)(EAP)<- Layer:1 Type:33
(1760)(EAP)<- Layer:0 Type:25
(1760)(EAP)Success Ind
(1770)(EAP)Stop
(1770)(M2M)LOAD SEC
(1790)(M2M)LOAD CON
(1810)(M2M)WIFI Connected
(1810)(DHCP)<-REQ
(2310)(DHCP)<-REQ
(3310)(DHCP)<-REQ
(3830)(DHCP)->ACK
(3830)(DHCP)Self IP     : "10.100.1.101"
(11100)S HT 0 HR 5 R 22 T 0 AT 0 F 24 B 0 NPA 22 D 300 ST 0
(11330)(DHCP)DHCP REN
(11330)(DHCP)<-REQ
(11340)(DHCP)->ACK
(11340)(DHCP)Self IP     : "10.100.1.101"