Is it possible to force BSSID?
J Esta
est2one
Thu Feb 1 12:23:19 PST 2007
Hello,
First thank you for developing this wonderful software, as it allows
pain free way to connect to wireless connectivity.
I was wondering if it is possible to force wpa_supplicant to only use
a certain bssid?
Here's my configuration
Windows 2000 SP4 Celeron 466 128MB RAM
Senao NUB362 USB adapter
I've compiled the wpa_supplicant 0.5.7 with MINGW without
ctrl_interface and ndis/WMI events (these didn't seem to work). Also
turned off the blacklist as it was causing some problems. Here is the
conf file
#ctrl_interface=
#ap_scan=2
ap_scan=2
fast_reauth=1
network={
scan_ssid=0
ssid=""
#ssid=
#ssid="00:c0:02:d8:ca:b7"
bssid=00:c0:02:d8:ca:b7
key_mgmt=IEEE8021X
eap=PEAP
# phase1="include_tls_length=1 peaplabel=0"
phase2="auth=MSCHAPV2"
priority=0
}
Note that I'm using ap_scan=2 since ap_scan=1 creates problems with
the USB adapter.
I'm using the wpa_supplicant to connect to city wide Internet
provider. Now this provider has multiple APs with same ssid installed
usually they're too far away from each other. However, sometimes the
distant APs show up in the Atheros configuration utility. So during
these times wpa_supplicant gets confused and tries to associate with
the more distant APs. I entered the bssid option and it seemed to work
for two days however today I again saw in the log the same problem.
Below is the portion of the log. At around 08:53 it receives a new WEP
key from the AP and starts the authentication process. After finishing
it, however, it shows that it has associated with the more distant AP,
whose signal is too weak for authentication.
I looked into events.c wpa_supplicant.c and driver_ndis.c but unsure
as to what to change as it seems to ask for bssid from the driver,
even though the bssid is specified in the conf file. Perhaps it's
possible to feed the driver the bssid and tell it to connect only to
AP with that MAC address?
This also doesn't seem to be a driver issue, since the Atheros
Configuration Utility worked for days without mixing the APs. Perhaps
though they know about this issue ( since they wrote the driver ) and
have made a workaround. So perhaps it's possible to add a check in the
code if wpa_s->bssid!=drv->bssid clean the WEP keys, and restart the
connection. Right now it goes into a loop so the program has to be
restarted.
TIA
----------------------
Feb 01 08:47:59 - RX EAPOL from 00:c0:02:d8:ca:b7
Feb 01 08:47:59 - RX EAPOL - hexdump(len=8): 01 00 00 04 03 06 00 04
Feb 01 08:47:59 - EAPOL: Received EAP-Packet frame
Feb 01 08:47:59 - EAPOL: SUPP_BE entering state REQUEST
Feb 01 08:47:59 - EAPOL: getSuppRsp
Feb 01 08:47:59 - EAP: EAP entering state RECEIVED
Feb 01 08:47:59 - EAP: Received EAP-Success
Feb 01 08:47:59 - EAP: Workaround for unexpected identifier field in
EAP Success: reqId=6 lastId=5 (these are supposed to be same)
Feb 01 08:47:59 - EAP: EAP entering state SUCCESS
Feb 01 08:47:59 - CTRL-EVENT-EAP-SUCCESS EAP authentication completed
successfully
Feb 01 08:47:59 - EAPOL: SUPP_PAE entering state AUTHENTICATED
Feb 01 08:47:59 - EAPOL: SUPP_BE entering state RECEIVE
Feb 01 08:47:59 - EAPOL: SUPP_BE entering state SUCCESS
Feb 01 08:47:59 - EAPOL: SUPP_BE entering state IDLE
Feb 01 08:47:59 - RX EAPOL from 00:c0:02:d8:ca:b7
Feb 01 08:47:59 - RX EAPOL - hexdump(len=61): 01 03 00 39 01 00 0d 00
00 00 00 c3 12 43 d2 65 2d d5 4b 38 db 0c 17 97 d4 2c c9 06 58 55 57
01 3c 93 1e ad d7 e6 1d 16 99 c7 10 30 44 45 d6 bc 32 27 a1 af 1d d2
ab 02 97 68 52 ad df
Feb 01 08:47:59 - EAPOL: Received EAPOL-Key frame
Feb 01 08:47:59 - EAPOL: KEY_RX entering state KEY_RECEIVE
Feb 01 08:47:59 - EAPOL: processKey
Feb 01 08:47:59 - EAPOL: RX IEEE 802.1X ver=1 type=3 len=57 EAPOL-Key:
type=1 key_length=13 key_index=0x1
Feb 01 08:47:59 - EAPOL: EAPOL-Key key signature verified
Feb 01 08:47:59 - EAPOL: Decrypted(RC4) key - hexdump(len=13): [REMOVED]
Feb 01 08:47:59 - EAPOL: Setting dynamic WEP key: broadcast keyidx 1 len 13
Feb 01 08:47:59 - NDIS: OID_802_11_ADD_WEP - hexdump(len=25): [REMOVED]
Feb 01 08:47:59 - NDIS: Set OID 0d010113 - hexdump(len=25): [REMOVED]
Feb 01 08:47:59 - EAPOL: all required EAPOL-Key frames received
Feb 01 08:47:59 - WPA: EAPOL processing complete
Feb 01 08:47:59 - Cancelling authentication timeout
Feb 01 08:47:59 - State: COMPLETED -> COMPLETED
Feb 01 08:47:59 - RX EAPOL from 00:c0:02:d8:ca:b7
Feb 01 08:47:59 - RX EAPOL - hexdump(len=61): 01 03 00 39 01 00 0d 00
00 00 00 c3 12 43 d3 6f 4d 20 08 21 21 07 99 ff e1 1c 26 e6 67 53 34
80 2e 3f 11 75 ca 58 d8 6a 81 e3 94 95 8d 19 40 78 82 93 3c 3e 35 93
6a ff 30 f1 2b 7f 54
Feb 01 08:47:59 - EAPOL: Received EAPOL-Key frame
Feb 01 08:47:59 - EAPOL: KEY_RX entering state KEY_RECEIVE
Feb 01 08:47:59 - EAPOL: processKey
Feb 01 08:47:59 - EAPOL: RX IEEE 802.1X ver=1 type=3 len=57 EAPOL-Key:
type=1 key_length=13 key_index=0x80
Feb 01 08:47:59 - EAPOL: EAPOL-Key key signature verified
Feb 01 08:47:59 - EAPOL: Decrypted(RC4) key - hexdump(len=13): [REMOVED]
Feb 01 08:47:59 - EAPOL: Setting dynamic WEP key: unicast keyidx 0 len 13
Feb 01 08:47:59 - NDIS: OID_802_11_ADD_WEP - hexdump(len=25): [REMOVED]
Feb 01 08:47:59 - NDIS: Set OID 0d010113 - hexdump(len=25): [REMOVED]
Feb 01 08:47:59 - EAPOL: all required EAPOL-Key frames received
Feb 01 08:47:59 - WPA: EAPOL processing complete
Feb 01 08:47:59 - Cancelling authentication timeout
Feb 01 08:47:59 - State: COMPLETED -> COMPLETED
Feb 01 08:48:29 - EAPOL: authWhile --> 0
Feb 01 08:48:59 - EAPOL: idleWhile --> 0
Feb 01 08:53:04 - RX EAPOL from 00:c0:02:d8:ca:b7
Feb 01 08:53:04 - RX EAPOL - hexdump(len=9): 01 00 00 05 01 00 00 05 01
Feb 01 08:53:04 - EAPOL: Received EAP-Packet frame
Feb 01 08:53:04 - EAPOL: SUPP_PAE entering state RESTART
Feb 01 08:53:04 - EAP: EAP entering state INITIALIZE
Feb 01 08:53:04 - EAP: maintaining EAP method data for fast reauthentication
Feb 01 08:53:04 - EAP: EAP entering state IDLE
Feb 01 08:53:04 - EAPOL: SUPP_PAE entering state AUTHENTICATING
Feb 01 08:53:04 - EAPOL: SUPP_BE entering state REQUEST
Feb 01 08:53:04 - EAPOL: getSuppRsp
Feb 01 08:53:04 - EAP: EAP entering state RECEIVED
Feb 01 08:53:04 - EAP: Received EAP-Request id=0 method=1 vendor=0
vendorMethod=0
Feb 01 08:53:04 - EAP: EAP entering state IDENTITY
Feb 01 08:53:04 - CTRL-EVENT-EAP-STARTED EAP authentication started
Feb 01 08:53:04 - EAP: EAP-Request Identity data - hexdump_ascii(len=0):
Feb 01 08:53:04 - EAP: using real identity - hexdump_ascii(len=8):
6f 6c 6b 30 30 38 39 33 [removed]
Feb 01 08:53:04 - EAP: EAP entering state SEND_RESPONSE
Feb 01 08:53:04 - EAP: EAP entering state IDLE
Feb 01 08:53:04 - EAPOL: SUPP_BE entering state RESPONSE
Feb 01 08:53:04 - EAPOL: txSuppRsp
Feb 01 08:53:04 - TX EAPOL - hexdump(len=17): 01 00 00 0d 02 00 00 0d
01 6f 6c 6b 30 30 38 39 33
Feb 01 08:53:04 - EAPOL: SUPP_BE entering state RECEIVE
Feb 01 08:53:04 - RX EAPOL from 00:c0:02:d8:ca:b7
Feb 01 08:53:04 - RX EAPOL - hexdump(len=10): 01 00 00 06 01 01 00 06 19 20
Feb 01 08:53:04 - EAPOL: Received EAP-Packet frame
Feb 01 08:53:04 - EAPOL: SUPP_BE entering state REQUEST
Feb 01 08:53:04 - EAPOL: getSuppRsp
Feb 01 08:53:04 - EAP: EAP entering state RECEIVED
Feb 01 08:53:04 - EAP: Received EAP-Request id=1 method=25 vendor=0
vendorMethod=0
Feb 01 08:53:04 - EAP: EAP entering state GET_METHOD
Feb 01 08:53:04 - EAP: Using previous method data for fast re-authentication
Feb 01 08:53:04 - EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
Feb 01 08:53:04 - CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
Feb 01 08:53:04 - EAP: EAP entering state METHOD
Feb 01 08:53:04 - SSL: Received packet(len=6) - Flags 0x20
Feb 01 08:53:04 - EAP-PEAP: Start (server ver=0, own ver=0)
Feb 01 08:53:04 - EAP-PEAP: Using PEAP version 0
Feb 01 08:53:04 - SSL: (where=0x10 ret=0x1)
Feb 01 08:53:04 - SSL: (where=0x1001 ret=0x1)
Feb 01 08:53:04 - SSL: SSL_connect:before/connect initialization
Feb 01 08:53:04 - SSL: (where=0x1001 ret=0x1)
Feb 01 08:53:04 - SSL: SSL_connect:SSLv3 write client hello A
Feb 01 08:53:04 - SSL: (where=0x1002 ret=0xffffffff)
Feb 01 08:53:04 - SSL: SSL_connect:error in SSLv3 read server hello A
Feb 01 08:53:04 - SSL: SSL_connect - want more data
Feb 01 08:53:04 - SSL: 120 bytes pending from ssl_out
Feb 01 08:53:04 - SSL: 120 bytes left to be sent out (of total 120 bytes)
Feb 01 08:53:04 - EAP: method process -> ignore=FALSE
methodState=MAY_CONT decision=FAIL
Feb 01 08:53:04 - EAP: EAP entering state SEND_RESPONSE
Feb 01 08:53:04 - EAP: EAP entering state IDLE
Feb 01 08:53:04 - EAPOL: SUPP_BE entering state RESPONSE
Feb 01 08:53:04 - EAPOL: txSuppRsp
Feb 01 08:53:04 - TX EAPOL - hexdump(len=130): 01 00 00 7e 02 01 00 7e
19 00 16 03 01 00 73 01 00 00 6f 03 01 45 c1 72 30 a2 9e 34 d7 64 fb
f0 7a 3e 2e d2 b9 d8 66 d5 92 a0 f2 01 4f 5b d6 53 df 80 05 b5 ed 20
a9 08 00 00 ec e6 b1 72 ec d2 e6 18 73 07 42 73 8d 73 70 2d 4a 3f 97
36 eb 5b 99 bb 34 92 01 e8 00 28 00 39 00 38 00 35 00 16 00 13 00 0a
00 33 00 32 00 2f 00 07 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00
08 00 06 00 03 01 00
Feb 01 08:53:04 - EAPOL: SUPP_BE entering state RECEIVE
Feb 01 08:53:04 - RX EAPOL from 00:c0:02:d8:ca:b7
Feb 01 08:53:04 - RX EAPOL - hexdump(len=136): 01 00 00 84 01 02 00 84
19 80 00 00 00 7a 16 03 01 00 4a 02 00 00 46 03 01 45 c1 70 b5 c0 18
5a f8 01 d0 6b b0 53 db bd 38 62 22 13 fb bc a5 0a a6 ef a8 30 1f 50
19 30 39 20 a9 08 00 00 ec e6 b1 72 ec d2 e6 18 73 07 42 73 8d 73 70
2d 4a 3f 97 36 eb 5b 99 bb 34 92 01 e8 00 04 00 14 03 01 00 01 01 16
03 01 00 20 ce cc 68 39 fd 52 60 41 b0 fa 70 62 5e 22 7b 34 6c 0e f6
f8 78 df 39 4b 30 da 9f e6 68 04 b0 11
Feb 01 08:53:04 - EAPOL: Received EAP-Packet frame
Feb 01 08:53:04 - EAPOL: SUPP_BE entering state REQUEST
Feb 01 08:53:04 - EAPOL: getSuppRsp
Feb 01 08:53:04 - EAP: EAP entering state RECEIVED
Feb 01 08:53:04 - EAP: Received EAP-Request id=2 method=25 vendor=0
vendorMethod=0
Feb 01 08:53:04 - EAP: EAP entering state METHOD
Feb 01 08:53:04 - SSL: Received packet(len=132) - Flags 0x80
Feb 01 08:53:04 - SSL: TLS Message Length: 122
Feb 01 08:53:04 - SSL: (where=0x1001 ret=0x1)
Feb 01 08:53:04 - SSL: SSL_connect:SSLv3 read server hello A
Feb 01 08:53:04 - SSL: (where=0x1001 ret=0x1)
Feb 01 08:53:04 - SSL: SSL_connect:SSLv3 read finished A
Feb 01 08:53:04 - SSL: (where=0x1001 ret=0x1)
Feb 01 08:53:04 - SSL: SSL_connect:SSLv3 write change cipher spec A
Feb 01 08:53:04 - SSL: (where=0x1001 ret=0x1)
Feb 01 08:53:04 - SSL: SSL_connect:SSLv3 write finished A
Feb 01 08:53:04 - SSL: (where=0x1001 ret=0x1)
Feb 01 08:53:04 - SSL: SSL_connect:SSLv3 flush data
Feb 01 08:53:04 - SSL: (where=0x20 ret=0x1)
Feb 01 08:53:04 - SSL: (where=0x1002 ret=0x1)
Feb 01 08:53:04 - SSL: 43 bytes pending from ssl_out
Feb 01 08:53:04 - OpenSSL: tls_connection_handshake - Failed to read
possible Application Data error:00000000:lib(0):func(0):reason(0)
Feb 01 08:53:04 - SSL: 43 bytes left to be sent out (of total 43 bytes)
Feb 01 08:53:04 - EAP-PEAP: TLS done, proceed to Phase 2
Feb 01 08:53:04 - EAP-PEAP: using label 'client EAP encryption' in key
derivation
Feb 01 08:53:04 - EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
Feb 01 08:53:04 - EAP-PEAP: Workaround - allow outer EAP-Success to
terminate PEAP resumption
Feb 01 08:53:04 - EAP: method process -> ignore=FALSE
methodState=MAY_CONT decision=COND_SUCC
Feb 01 08:53:04 - EAP: EAP entering state SEND_RESPONSE
Feb 01 08:53:04 - EAP: EAP entering state IDLE
Feb 01 08:53:04 - EAPOL: SUPP_BE entering state RESPONSE
Feb 01 08:53:04 - EAPOL: txSuppRsp
Feb 01 08:53:04 - TX EAPOL - hexdump(len=53): 01 00 00 31 02 02 00 31
19 00 14 03 01 00 01 01 16 03 01 00 20 df 42 02 8e 95 0a 1d 37 02 45
2b ed 85 b7 b1 2e 5c 57 a5 75 dd 48 9b e1 6b 2d ac af 24 2b f0 2f
Feb 01 08:53:04 - EAPOL: SUPP_BE entering state RECEIVE
Feb 01 08:53:04 - RX EAPOL from 00:c0:02:d8:ca:b7
Feb 01 08:53:04 - RX EAPOL - hexdump(len=42): 01 00 00 26 01 05 00 26
19 00 17 03 01 00 1b d2 b6 93 3d ad a3 9c c4 3e 46 7f a5 ed 83 9e 8a
e9 17 3a ca 05 3a b1 ac 8f c4 39
Feb 01 08:53:04 - EAPOL: Received EAP-Packet frame
Feb 01 08:53:04 - EAPOL: SUPP_BE entering state REQUEST
Feb 01 08:53:04 - EAPOL: getSuppRsp
Feb 01 08:53:04 - EAP: EAP entering state RECEIVED
Feb 01 08:53:04 - EAP: Received EAP-Request id=5 method=25 vendor=0
vendorMethod=0
Feb 01 08:53:04 - EAP: EAP entering state METHOD
Feb 01 08:53:04 - SSL: Received packet(len=38) - Flags 0x00
Feb 01 08:53:04 - EAP-PEAP: received 32 bytes encrypted data for Phase 2
Feb 01 08:53:04 - EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11):
01 05 00 0b 21 80 03 00 02 00 01
Feb 01 08:53:04 - EAP-PEAP: received Phase 2: code=1 identifier=5 length=11
Feb 01 08:53:04 - EAP-PEAP: Phase 2 Request: type=33
Feb 01 08:53:04 - EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01
Feb 01 08:53:04 - EAP-TLV: Result TLV - hexdump(len=2): 00 01
Feb 01 08:53:04 - EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed
Feb 01 08:53:04 - EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED]
Feb 01 08:53:04 - EAP: method process -> ignore=FALSE methodState=DONE
decision=UNCOND_SUCC
Feb 01 08:53:04 - EAP: EAP entering state SEND_RESPONSE
Feb 01 08:53:04 - EAP: EAP entering state IDLE
Feb 01 08:53:04 - EAPOL: SUPP_BE entering state RESPONSE
Feb 01 08:53:04 - EAPOL: txSuppRsp
Feb 01 08:53:04 - TX EAPOL - hexdump(len=42): 01 00 00 26 02 05 00 26
19 00 17 03 01 00 1b 4e 69 13 7d 0f 30 e7 38 46 a5 0a ec a1 a2 bf a4
ee 26 be 7a 8d ee 91 78 3e 6f 3a
Feb 01 08:53:04 - EAPOL: SUPP_BE entering state RECEIVE
Feb 01 08:53:04 - RX EAPOL from 00:c0:02:d8:ca:b7
Feb 01 08:53:04 - RX EAPOL - hexdump(len=8): 01 00 00 04 03 06 00 04
Feb 01 08:53:04 - EAPOL: Received EAP-Packet frame
Feb 01 08:53:04 - EAPOL: SUPP_BE entering state REQUEST
Feb 01 08:53:04 - EAPOL: getSuppRsp
Feb 01 08:53:04 - EAP: EAP entering state RECEIVED
Feb 01 08:53:04 - EAP: Received EAP-Success
Feb 01 08:53:04 - EAP: Workaround for unexpected identifier field in
EAP Success: reqId=6 lastId=5 (these are supposed to be same)
Feb 01 08:53:04 - EAP: EAP entering state SUCCESS
Feb 01 08:53:04 - CTRL-EVENT-EAP-SUCCESS EAP authentication completed
successfully
Feb 01 08:53:04 - EAPOL: SUPP_PAE entering state AUTHENTICATED
Feb 01 08:53:04 - EAPOL: SUPP_BE entering state RECEIVE
Feb 01 08:53:04 - EAPOL: SUPP_BE entering state SUCCESS
Feb 01 08:53:04 - EAPOL: SUPP_BE entering state IDLE
Feb 01 08:53:04 - RX EAPOL from 00:c0:02:d8:ca:b7
Feb 01 08:53:04 - RX EAPOL - hexdump(len=61): 01 03 00 39 01 00 0d 00
00 00 00 c3 12 8b 3f 4d 33 50 68 a8 a0 72 72 24 c7 4c e7 3f 35 dd d5
01 2a 4d a8 8e d0 ea 71 48 dc a9 bd f1 6e db 4b 87 e7 d2 5c f2 8b 5e
39 86 2f 4e 82 8c 2b
Feb 01 08:53:04 - EAPOL: Received EAPOL-Key frame
Feb 01 08:53:04 - EAPOL: KEY_RX entering state KEY_RECEIVE
Feb 01 08:53:04 - EAPOL: processKey
Feb 01 08:53:04 - EAPOL: RX IEEE 802.1X ver=1 type=3 len=57 EAPOL-Key:
type=1 key_length=13 key_index=0x1
Feb 01 08:53:04 - EAPOL: EAPOL-Key key signature verified
Feb 01 08:53:04 - EAPOL: Decrypted(RC4) key - hexdump(len=13): [REMOVED]
Feb 01 08:53:04 - EAPOL: Setting dynamic WEP key: broadcast keyidx 1 len 13
Feb 01 08:53:04 - NDIS: OID_802_11_ADD_WEP - hexdump(len=25): [REMOVED]
Feb 01 08:53:04 - NDIS: Set OID 0d010113 - hexdump(len=25): [REMOVED]
Feb 01 08:53:04 - EAPOL: all required EAPOL-Key frames received
Feb 01 08:53:04 - WPA: EAPOL processing complete
Feb 01 08:53:04 - Cancelling authentication timeout
Feb 01 08:53:04 - State: COMPLETED -> COMPLETED
Feb 01 08:53:04 - RX EAPOL from 00:c0:02:d8:ca:b7
Feb 01 08:53:04 - RX EAPOL - hexdump(len=61): 01 03 00 39 01 00 0d 00
00 00 00 c3 12 8b 40 dd 17 17 ce aa f4 76 bc 13 29 28 09 13 b1 fd c9
80 57 1c 09 17 83 81 27 d9 e7 02 50 42 48 09 ef 9a 29 b2 a3 8b b5 b0
e2 ba ba 09 7e 0a ba
Feb 01 08:53:04 - EAPOL: Received EAPOL-Key frame
Feb 01 08:53:04 - EAPOL: KEY_RX entering state KEY_RECEIVE
Feb 01 08:53:04 - EAPOL: processKey
Feb 01 08:53:04 - EAPOL: RX IEEE 802.1X ver=1 type=3 len=57 EAPOL-Key:
type=1 key_length=13 key_index=0x80
Feb 01 08:53:04 - EAPOL: EAPOL-Key key signature verified
Feb 01 08:53:04 - EAPOL: Decrypted(RC4) key - hexdump(len=13): [REMOVED]
Feb 01 08:53:04 - EAPOL: Setting dynamic WEP key: unicast keyidx 0 len 13
Feb 01 08:53:04 - NDIS: OID_802_11_ADD_WEP - hexdump(len=25): [REMOVED]
Feb 01 08:53:04 - NDIS: Set OID 0d010113 - hexdump(len=25): [REMOVED]
Feb 01 08:53:04 - EAPOL: all required EAPOL-Key frames received
Feb 01 08:53:04 - WPA: EAPOL processing complete
Feb 01 08:53:04 - Cancelling authentication timeout
Feb 01 08:53:04 - State: COMPLETED -> COMPLETED
Feb 01 08:53:33 - EAPOL: authWhile --> 0
Feb 01 08:54:03 - EAPOL: idleWhile --> 0
Feb 01 08:58:14 - NDIS: association information - hexdump(len=0):
Feb 01 08:58:14 - NDIS: too short association information
Feb 01 08:58:14 - State: COMPLETED -> ASSOCIATED
Feb 01 08:58:14 - Associated to a new BSS: BSSID=00:c0:02:d8:ca:ac
Feb 01 08:58:14 - NDIS: Set OID 0d01011e - hexdump(len=16): [REMOVED]
Feb 01 08:58:14 - NDIS: Set OID 0d010114 - hexdump(len=4): [REMOVED]
Feb 01 08:58:14 - NDIS: Set OID 0d01011e - hexdump(len=16): [REMOVED]
Feb 01 08:58:14 - NDIS: Set OID 0d010114 - hexdump(len=4): [REMOVED]
Feb 01 08:58:14 - NDIS: Set OID 0d01011e - hexdump(len=16): [REMOVED]
Feb 01 08:58:14 - NDIS: Set OID 0d010114 - hexdump(len=4): [REMOVED]
Feb 01 08:58:14 - NDIS: Set OID 0d01011e - hexdump(len=16): [REMOVED]
Feb 01 08:58:14 - NDIS: Set OID 0d010114 - hexdump(len=4): [REMOVED]
Feb 01 08:58:14 - NDIS: Set OID 0d01011e - hexdump(len=16): [REMOVED]
Feb 01 08:58:14 - No network configuration found for the current AP
Feb 01 08:58:14 - State: ASSOCIATED -> DISCONNECTED
Feb 01 08:58:14 - NDIS: Set OID 0d010102 - hexdump(len=36): [REMOVED]
Feb 01 08:58:14 - No keys have been configured - skip key clearing
Feb 01 08:58:14 - EAPOL: External notification - portEnabled=0
Feb 01 08:58:14 - EAPOL: SUPP_PAE entering state DISCONNECTED
Feb 01 08:58:14 - EAPOL: KEY_RX entering state NO_KEY_RECEIVE
Feb 01 08:58:14 - EAPOL: SUPP_BE entering state INITIALIZE
Feb 01 08:58:14 - EAP: EAP entering state DISABLED
Feb 01 08:58:14 - EAPOL: External notification - portValid=0
Feb 01 08:58:15 - ndis_get_oid: oid=0xd010101 len (6) failed
Feb 01 08:58:20 - CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Feb 01 08:58:20 - ndis_get_oid: oid=0xd010101 len (6) failed
Feb 01 08:58:20 - NDIS: Set OID 0d01011e - hexdump(len=16): [REMOVED]
Feb 01 08:58:20 - NDIS: Set OID 0d010114 - hexdump(len=4): [REMOVED]
Feb 01 08:58:20 - ndis_get_oid: oid=0xd010101 len (6) failed
Feb 01 08:58:20 - NDIS: Set OID 0d01011e - hexdump(len=16): [REMOVED]
Feb 01 08:58:20 - NDIS: Set OID 0d010114 - hexdump(len=4): [REMOVED]
Feb 01 08:58:20 - ndis_get_oid: oid=0xd010101 len (6) failed
Feb 01 08:58:20 - NDIS: Set OID 0d01011e - hexdump(len=16): [REMOVED]
Feb 01 08:58:20 - NDIS: Set OID 0d010114 - hexdump(len=4): [REMOVED]
Feb 01 08:58:20 - ndis_get_oid: oid=0xd010101 len (6) failed
Feb 01 08:58:20 - NDIS: Set OID 0d01011e - hexdump(len=16): [REMOVED]
Feb 01 08:58:20 - NDIS: Set OID 0d010114 - hexdump(len=4): [REMOVED]
Feb 01 08:58:20 - NDIS: Set OID 0d01011e - hexdump(len=16): [REMOVED]
Feb 01 08:58:20 - State: DISCONNECTED -> DISCONNECTED
Feb 01 08:58:20 - EAPOL: External notification - portEnabled=0
Feb 01 08:58:20 - EAPOL: External notification - portValid=0
Feb 01 08:58:21 - ndis_get_oid: oid=0xd010101 len (6) failed
Feb 01 08:58:22 - ndis_get_oid: oid=0xd010101 len (6) failed
Feb 01 08:58:23 - ndis_get_oid: oid=0xd010101 len (6) failed
Feb 01 08:58:24 - ndis_get_oid: oid=0xd010101 len (6) failed
And the last message repeats till 10:00 when I restarted the program
------------------------------------------
More information about the Hostap
mailing list