STA is not connecting to any ap with PIN from Access point
ashish kumar
ashish.kumar8292
Mon May 21 12:23:52 PDT 2012
Hi,
STA is sending M1 but receiving M2D. Any possible solution.
Regards,
Ashish
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.shmoo.com/pipermail/hostap/attachments/20120522/cbd99ee7/attachment.htm
-------------- next part --------------
D/wpa_supplicant( 584): EAPOL: startWhen --> 0
D/wpa_supplicant( 584): EAPOL: SUPP_PAE entering state CONNECTING
D/wpa_supplicant( 584): EAPOL: txStart
D/wpa_supplicant( 584): TX EAPOL: dst=00:26:0b:dc:17:8d
D/wpa_supplicant( 584): EAPOL: Received EAP-Packet frame
D/wpa_supplicant( 584): EAPOL: SUPP_PAE entering state RESTART
D/wpa_supplicant( 584): EAP: EAP entering state INITIALIZE
D/wpa_supplicant( 584): EAP: EAP entering state IDLE
D/wpa_supplicant( 584): EAPOL: SUPP_PAE entering state AUTHENTICATING
D/wpa_supplicant( 584): EAPOL: SUPP_BE entering state REQUEST
D/wpa_supplicant( 584): EAPOL: getSuppRsp
D/wpa_supplicant( 584): EAP: EAP entering state RECEIVED
D/wpa_supplicant( 584): EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
D/wpa_supplicant( 584): EAP: EAP entering state IDENTITY
I/wpa_supplicant( 584): wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
D/wpa_supplicant( 584): EAP: EAP entering state SEND_RESPONSE
D/wpa_supplicant( 584): EAP: EAP entering state IDLE
D/wpa_supplicant( 584): EAPOL: SUPP_BE entering state RESPONSE
D/wpa_supplicant( 584): EAPOL: txSuppRsp
D/wpa_supplicant( 584): TX EAPOL: dst=00:26:0b:dc:17:8d
D/wpa_supplicant( 584): EAPOL: SUPP_BE entering state RECEIVE
D/wpa_supplicant( 584): EAPOL: Received EAP-Packet frame
D/wpa_supplicant( 584): EAPOL: SUPP_BE entering state REQUEST
D/wpa_supplicant( 584): EAPOL: getSuppRsp
D/wpa_supplicant( 584): EAP: EAP entering state RECEIVED
D/wpa_supplicant( 584): EAP: Received EAP-Request id=2 method=254 vendor=14122 vendorMethod=1
D/wpa_supplicant( 584): EAP: EAP entering state GET_METHOD
I/wpa_supplicant( 584): wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=14122 method=1
D/wpa_supplicant( 584): EAP: Initialize selected EAP method: vendor 14122 method 1 (WSC)
D/wpa_supplicant( 584): EAP-WSC: Fragment size limit 1398
I/wpa_supplicant( 584): wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 14122 method 1 (WSC) selected
D/wpa_supplicant( 584): EAP: EAP entering state METHOD
D/wpa_supplicant( 584): EAP-WSC: Received packet: Op-Code 1 Flags 0x0 Message Length 0
D/wpa_supplicant( 584): EAP-WSC: Received start
D/wpa_supplicant( 584): EAP-WSC: WAIT_START -> MESG
D/wpa_supplicant( 584): Get randomness: len=16 entropy=182
D/wpa_supplicant( 584): WPS: Building Message M1
D/wpa_supplicant( 584): WPS: * Version (hardcoded 0x10)
D/wpa_supplicant( 584): WPS: * Message Type (4)
D/wpa_supplicant( 584): WPS: * UUID-E
D/wpa_supplicant( 584): WPS: * MAC Address
D/wpa_supplicant( 584): WPS: * Enrollee Nonce
D/wpa_supplicant( 584): WPS: * Public Key
D/wpa_supplicant( 584): WPS: Generate new DH keys
D/wpa_supplicant( 584): WPS: * Authentication Type Flags
D/wpa_supplicant( 584): WPS: * Encryption Type Flags
D/wpa_supplicant( 584): WPS: * Connection Type Flags
D/wpa_supplicant( 584): WPS: * Config Methods (2108)
D/wpa_supplicant( 584): WPS: * Wi-Fi Protected Setup State (1)
D/wpa_supplicant( 584): WPS: * Manufacturer
D/wpa_supplicant( 584): WPS: * Model Name
D/wpa_supplicant( 584): WPS: * Model Number
D/wpa_supplicant( 584): WPS: * Serial Number
D/wpa_supplicant( 584): WPS: * Primary Device Type
D/wpa_supplicant( 584): WPS: * Device Name
D/wpa_supplicant( 584): WPS: * RF Bands (1)
D/wpa_supplicant( 584): WPS: * Association State
D/wpa_supplicant( 584): WPS: * Device Password ID (0)
D/wpa_supplicant( 584): WPS: * Configuration Error (0)
D/wpa_supplicant( 584): WPS: * OS Version
D/wpa_supplicant( 584): WPS: * Version2 (0x20)
D/wpa_supplicant( 584): EAP-WSC: MESG -> MESG
D/wpa_supplicant( 584): EAP-WSC: Generating Response
D/wpa_supplicant( 584): EAP-WSC: Sending out 362 bytes (message sent completely)
D/wpa_supplicant( 584): EAP-WSC: MESG -> MESG
D/wpa_supplicant( 584): EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
D/wpa_supplicant( 584): EAP: EAP entering state SEND_RESPONSE
D/wpa_supplicant( 584): EAP: EAP entering state IDLE
D/wpa_supplicant( 584): EAPOL: SUPP_BE entering state RESPONSE
D/wpa_supplicant( 584): EAPOL: txSuppRsp
D/wpa_supplicant( 584): TX EAPOL: dst=00:26:0b:dc:17:8d
D/wpa_supplicant( 584): EAPOL: SUPP_BE entering state RECEIVE
D/wpa_supplicant( 584): EAPOL: Received EAP-Packet frame
D/wpa_supplicant( 584): EAPOL: SUPP_BE entering state REQUEST
D/wpa_supplicant( 584): EAPOL: getSuppRsp
D/wpa_supplicant( 584): EAP: EAP entering state RECEIVED
D/wpa_supplicant( 584): EAP: Received EAP-Request id=3 method=254 vendor=14122 vendorMethod=1
D/wpa_supplicant( 584): EAP: EAP entering state METHOD
D/wpa_supplicant( 584): EAP-WSC: Received packet: Op-Code 4 Flags 0x0 Message Length 0
D/wpa_supplicant( 584): WPS: Processing received message (len=310 op_code=4)
D/wpa_supplicant( 584): WPS: Received WSC_MSG
D/wpa_supplicant( 584): WPS: attr type=0x104a len=1
D/wpa_supplicant( 584): WPS: attr type=0x1022 len=1
D/wpa_supplicant( 584): WPS: attr type=0x101a len=16
D/wpa_supplicant( 584): WPS: attr type=0x1039 len=16
D/wpa_supplicant( 584): WPS: attr type=0x1048 len=16
D/wpa_supplicant( 584): WPS: attr type=0x1004 len=2
D/wpa_supplicant( 584): WPS: attr type=0x1010 len=2
D/wpa_supplicant( 584): WPS: attr type=0x100d len=1
D/wpa_supplicant( 584): WPS: attr type=0x1008 len=2
D/wpa_supplicant( 584): WPS: attr type=0x1021 len=32
D/wpa_supplicant( 584): WPS: attr type=0x1023 len=32
D/wpa_supplicant( 584): WPS: attr type=0x1024 len=32
D/wpa_supplicant( 584): WPS: attr type=0x1042 len=32
D/wpa_supplicant( 584): WPS: attr type=0x1054 len=8
D/wpa_supplicant( 584): WPS: attr type=0x1011 len=32
D/wpa_supplicant( 584): WPS: attr type=0x103c len=1
D/wpa_supplicant( 584): WPS: attr type=0x1002 len=2
D/wpa_supplicant( 584): WPS: attr type=0x1009 len=2
D/wpa_supplicant( 584): WPS: attr type=0x102d len=4
D/wpa_supplicant( 584): WPS: Received M2D
I/wpa_supplicant( 584): wlan0: WPS-M2D dev_password_id=0 config_error=0
D/wpa_supplicant( 584): EAP-WSC: MESG -> MESG
D/wpa_supplicant( 584): WPS: Building Message WSC_ACK
D/wpa_supplicant( 584): WPS: * Version (hardcoded 0x10)
D/wpa_supplicant( 584): WPS: * Message Type (13)
D/wpa_supplicant( 584): WPS: * Enrollee Nonce
D/wpa_supplicant( 584): WPS: * Registrar Nonce
D/wpa_supplicant( 584): WPS: * Version2 (0x20)
D/wpa_supplicant( 584): EAP-WSC: MESG -> MESG
D/wpa_supplicant( 584): EAP-WSC: Generating Response
D/wpa_supplicant( 584): EAP-WSC: Sending out 60 bytes (message sent completely)
D/wpa_supplicant( 584): EAP-WSC: MESG -> MESG
D/wpa_supplicant( 584): EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
D/wpa_supplicant( 584): EAP: EAP entering state SEND_RESPONSE
D/wpa_supplicant( 584): EAP: EAP entering state IDLE
D/wpa_supplicant( 584): EAPOL: SUPP_BE entering state RESPONSE
D/wpa_supplicant( 584): EAPOL: txSuppRsp
D/wpa_supplicant( 584): TX EAPOL: dst=00:26:0b:dc:17:8d
D/wpa_supplicant( 584): EAPOL: SUPP_BE entering state RECEIVE
E/ ( 112): MSMFB_HISTOGRAM failed!
More information about the Hostap
mailing list