hostapd client constantly disconnects and reconnects
Drasko DRASKOVIC
drasko.draskovic
Wed Apr 30 09:36:54 PDT 2014
Hi all,
I have Android client connecting to hostapd on my embedded board.
I connect it via WPS, and it says that it is connected.
However, every few seconds it disconnectct and re-connects, having log
like pasted on hostapd.
What can be the source of this constant dosconnection/re-connection?
BR,
Drasko
nl80211: Event message available
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
nl80211: New station 08:60:6e:a1:4c:33
nl80211: Assoc Req IEs - hexdump(len=126): 00 06 41 4c 54 45 52 41 01
08 82 84 8b 96 24 30 48 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04
01 00 00 0f ac 02 00 0
wlan0: Event ASSOC (0) received
Add randomness: count=84 entropy=1
random pool - hexdump(len=128): [REMOVED]
random_mix_pool - hexdump(len=8): [REMOVED]
random_mix_pool - hexdump(len=6): [REMOVED]
random pool - hexdump(len=128): [REMOVED]
wlan0: STA 08:60:6e:a1:4c:33 IEEE 802.11: associated
unknown vendor specific information element ignored (vendor OUI 00:10:18 len=9)
STA included RSN IE in (Re)AssocReq
wlan0: STA 08:60:6e:a1:4c:33 WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=0 addr=0x18eb728
key_idx=0 set_tx=1 seq_len=0 key_len=0
addr=08:60:6e:a1:4c:33
IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
wlan0: STA 08:60:6e:a1:4c:33 WPA: event 4 notification
wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=0 addr=0x18eb728
key_idx=0 set_tx=1 seq_len=0 key_len=0
addr=08:60:6e:a1:4c:33
WPA: 08:60:6e:a1:4c:33 WPA_PTK entering state AUTHENTICATION2
Get randomness: len=32 entropy=2
random from os_get_random - hexdump(len=32): [REMOVED]
random_mix_pool - hexdump(len=20): [REMOVED]
random from internal pool - hexdump(len=16): [REMOVED]
random_mix_pool - hexdump(len=20): [REMOVED]
random from internal pool - hexdump(len=16): [REMOVED]
mixed random - hexdump(len=32): [REMOVED]
WPA: Assign ANonce - hexdump(len=32): 02 b5 d7 b1 90 70 a1 5c 69 2b 51
53 cb 62 eb cb 84 3c 81 8c 29 f4 83 6f 1c f4 f2 f8 d6 39 bb 72
WPA: 08:60:6e:a1:4c:33 WPA_PTK entering state INITPSK
Searching a PSK for 08:60:6e:a1:4c:33 p2p_dev_addr=00:00:00:00:00:00
prev_psk=(nil)
Searching a PSK for 08:60:6e:a1:4c:33 p2p_dev_addr=00:00:00:00:00:00
prev_psk=(nil)
WPA: 08:60:6e:a1:4c:33 WPA_PTK entering state PTKSTART
wlan0: STA 08:60:6e:a1:4c:33 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1
kde_len=0 keyidx=0 encr=0)
WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for
08:60:6e:a1:4c:33 (300 seconds - ap_max_inactivity)
wlan0: Event EAPOL_RX (26) received
IEEE 802.1X: 121 bytes from 08:60:6e:a1:4c:33
IEEE 802.1X: version=1 type=3 length=117
WPA: Received EAPOL-Key from 08:60:6e:a1:4c:33 key_info=0x10a type=2
key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): e0 68 98 4f 87 1c 62 da 0c
c7 07 ab b2 78 73 11 d1 f8 67 13 ce f3 90 fa ff bd 01 3e 15 1d 17 3b
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 0f
Add randomness: count=85 entropy=0
random pool - hexdump(len=128): [REMOVED]
random_mix_pool - hexdump(len=8): [REMOVED]
random_mix_pool - hexdump(len=32): [REMOVED]
random pool - hexdump(len=128): [REMOVED]
wlan0: STA 08:60:6e:a1:4c:33 WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 08:60:6e:a1:4c:33 WPA_PTK entering state PTKCALCNEGOTIATING
Searching a PSK for 08:60:6e:a1:4c:33 p2p_dev_addr=00:00:00:00:00:00
prev_psk=(nil)
WPA: PTK derivation - A1=80:1f:02:a7:98:25 A2=08:60:6e:a1:4c:33
WPA: Nonce1 - hexdump(len=32): 02 b5 d7 b1 90 70 a1 5c 69 2b 51 53 cb
62 eb cb 84 3c 81 8c 29 f4 83 6f 1c f4 f2 f8 d6 39 bb 72
WPA: Nonce2 - hexdump(len=32): e0 68 98 4f 87 1c 62 da 0c c7 07 ab b2
78 73 11 d1 f8 67 13 ce f3 90 fa ff bd 01 3e 15 1d 17 3b
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: 08:60:6e:a1:4c:33 WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 08:60:6e:a1:4c:33 WPA_PTK entering state PTKINITNEGOTIATING
wlan0: STA 08:60:6e:a1:4c:33 WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1
kde_len=86 keyidx=2 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=96): [REMOVED]
WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
wlan0: Event EAPOL_RX (26) received
IEEE 802.1X: 99 bytes from 08:60:6e:a1:4c:33
IEEE 802.1X: version=1 type=3 length=95
WPA: Received EAPOL-Key from 08:60:6e:a1:4c:33 key_info=0x30a type=2
key_data_length=0
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 10
wlan0: STA 08:60:6e:a1:4c:33 WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: 08:60:6e:a1:4c:33 WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=4 (wlan0) alg=3 addr=0x18eb728
key_idx=0 set_tx=1 seq_len=0 key_len=16
addr=08:60:6e:a1:4c:33
wlan0: STA 08:60:6e:a1:4c:33 IEEE 802.1X: authorizing port
wlan0: STA 08:60:6e:a1:4c:33 RADIUS: starting accounting session
0000183E-00000006
wlan0: STA 08:60:6e:a1:4c:33 WPA: pairwise key handshake completed (RSN)
More information about the Hostap
mailing list