Help debug my authentication issue? (Part 1) (Logcat part 1)

Frank Rizzo thefrankrizzo
Sun Oct 11 14:57:18 PDT 2015


root at manta:/ # dmesg
<6>[14124.047632] CFG80211-ERROR) wl_cfg80211_disconnect : Reason 3
<6>[14124.056079] CFG80211-ERROR) wl_is_linkdown : Link down Reason :  
WLC_E_LINK

<4>[14124.056809] link down if wlan0 may call cfg80211_disconnected. event  
: 16, reason=2 from <Computer MAC>
<6>[14124.058344] CFG80211-ERROR) wl_is_linkdown : Link down Reason :  
WLC_E_DEAUTH
<6>[14124.066140] cfg80211: Calling CRDA to update world regulatory domain
<4>[14144.104468] wl_bss_connect_done succeeded with <Computer MAC>
<4>[14144.150468] wl_bss_connect_done succeeded with <Computer MAC>
<6>[14214.113525] CFG80211-ERROR) wl_cfg80211_disconnect : Reason 3
<6>[14214.121806] CFG80211-ERROR) wl_is_linkdown : Link down Reason :  
WLC_E_LINK

<4>[14214.122737] link down if wlan0 may call cfg80211_disconnected. event  
: 16, reason=2 from <Computer MAC>
<6>[14214.129411] cfg80211: Calling CRDA to update world regulatory domain
<4>[14224.195690] wl_bss_connect_done succeeded with <Computer MAC>
<4>[14224.228248] wl_bss_connect_done succeeded with <Computer MAC>






root at manta:/ # logcat



D/wpa_supplicant( 1287): wlan0: Selecting BSS from priority group 53
D/wpa_supplicant( 1287): wlan0: 0: <Computer MAC> ssid='EAP-TEST'  
wpa_ie_len=0 rsn_ie_len=20 caps=0x411 level=-32
I/wpa_supplicant( 1287): wlan0: CTRL-EVENT-SSID-REENABLED id=2  
ssid="EAP-TEST"
D/wpa_supplicant( 1287): CTRL_IFACE monitor send - hexdump(len=40): 2f 64  
61 74 61 2f 6d 69 73 63 2f 77 69 66 69 2f 73 6f 63 6b 65 74 73 2f 77 70 61  
5f 63 74 72 6c ...
D/wpa_supplicant( 1287): wlan0:    selected based on RSN IE
D/wpa_supplicant( 1287): wlan0:    selected BSS <Computer MAC>  
ssid='EAP-TEST'
D/wpa_supplicant( 1287): wlan0: Considering connect request: reassociate:  
1  selected: <Computer MAC>  bssid: 00:00:00:00:00:00  pending:  
00:00:00:00:00:00  wpa_state: SCANNING  ssid=0xb8df59b8  current_ssid=0x0
D/wpa_supplicant( 1287): wlan0: Request association with <Computer MAC>
D/wpa_supplicant( 1287): WPA: Unrecognized EAPOL-Key Key Data IE -  
hexdump(len=10): 00 08 42 61 72 2d 54 65 73 74
D/wpa_supplicant( 1287): WPA: Unrecognized EAPOL-Key Key Data IE -  
hexdump(len=3): 03 01 01
D/wpa_supplicant( 1287): WPA: Unrecognized EAPOL-Key Key Data IE -  
hexdump(len=6): 05 04 00 02 00 00
D/wpa_supplicant( 1287): WPA: Unrecognized EAPOL-Key Key Data IE -  
hexdump(len=3): 2a 01 04
D/wpa_supplicant( 1287): WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14  
01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
D/wpa_supplicant( 1287): TDLS: TDLS is allowed in the target BSS
I/wpa_supplicant( 1287): wlan0: Trying to associate with <Computer MAC>  
(SSID='EAP-TEST' freq=2412 MHz)
D/wpa_supplicant( 1287): CTRL_IFACE monitor send - hexdump(len=40): 2f 64  
61 74 61 2f 6d 69 73 63 2f 77 69 66 69 2f 73 6f 63 6b 65 74 73 2f 77 70 61  
5f 63 74 72 6c ...
D/wpa_supplicant( 1287): FT: Stored MDIE and FTIE from (Re)Association  
Response - hexdump(len=0):
D/wpa_supplicant( 1287): wlan0: Cancelling scan request
D/wpa_supplicant( 1287): wlan0: P2P: Station mode scan operation not  
pending anymore (sta_scan_pending=0 p2p_cb_on_scan_complete=0)
D/wpa_supplicant( 1287): wlan0: WPA: clearing own WPA/RSN IE
D/wpa_supplicant( 1287): wlan0: Automatic auth_alg selection: 0x1
D/wpa_supplicant( 1287): RSN: PMKSA cache search - network_ctx=0xb8df59b8  
try_opportunistic=1
D/wpa_supplicant( 1287): RSN: Search for BSSID <Computer MAC>
D/wpa_supplicant( 1287): RSN: Consider <Computer MAC> for OKC
D/wpa_supplicant( 1287): RSN: No PMKSA cache entry found
D/wpa_supplicant( 1287): wlan0: RSN: using IEEE 802.11i/D9.0
D/wpa_supplicant( 1287): wlan0: WPA: Selected cipher suites: group 16  
pairwise 16 key_mgmt 1 proto 2
D/wpa_supplicant( 1287): wlan0: WPA: Selected mgmt group cipher 32
D/wpa_supplicant( 1287): wlan0: WPA: clearing AP WPA IE
D/wpa_supplicant( 1287): WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00  
00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
D/wpa_supplicant( 1287): wlan0: WPA: using GTK CCMP
D/wpa_supplicant( 1287): wlan0: WPA: using PTK CCMP
D/wpa_supplicant( 1287): wlan0: WPA: using KEY_MGMT 802.1X
D/wpa_supplicant( 1287): wlan0: WPA: not using MGMT group cipher
D/wpa_supplicant( 1287): WPA: Set own WPA IE default - hexdump(len=22): 30  
14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
D/wpa_supplicant( 1287): wlan0: No keys have been configured - skip key  
clearing
D/wpa_supplicant( 1287): wlan0: State: SCANNING -> ASSOCIATING
D/wpa_supplicant( 1287): wpa_driver_nl80211_set_operstate: operstate 0->0  
(DORMANT)
D/wpa_supplicant( 1287): netlink: Operstate: linkmode=-1, operstate=5
D/wpa_supplicant( 1287): CTRL_IFACE monitor send - hexdump(len=40): 2f 64  
61 74 61 2f 6d 69 73 63 2f 77 69 66 69 2f 73 6f 63 6b 65 74 73 2f 77 70 61  
5f 63 74 72 6c ...
D/wpa_supplicant( 1287): Limit connection to BSSID <Computer MAC>  
freq=2412 MHz based on scan results (bssid_set=0)
D/wpa_supplicant( 1287): nl80211: Set mode ifindex 5 iftype 2 (STATION)
D/wpa_supplicant( 1287): nl80211: Unsubscribe mgmt frames handle  
0xb8df4520 (mode change)
D/wpa_supplicant( 1287): nl80211: Subscribe to mgmt frames with non-AP  
handle 0xb8df4520
D/wpa_supplicant( 1287): nl80211: Register frame type=0xd0  
nl_handle=0xb8df4520
D/wpa_supplicant( 1287): nl80211: Register frame match - hexdump(len=2):  
04 0a
D/wpa_supplicant( 1287): nl80211: Register frame type=0xd0  
nl_handle=0xb8df4520
D/wpa_supplicant( 1287): nl80211: Register frame match - hexdump(len=2):  
04 0b
D/wpa_supplicant( 1287): nl80211: Register frame type=0xd0  
nl_handle=0xb8df4520
D/wpa_supplicant( 1287): nl80211: Register frame match - hexdump(len=2):  
04 0c
D/wpa_supplicant( 1287): nl80211: Register frame type=0xd0  
nl_handle=0xb8df4520
D/wpa_supplicant( 1287): nl80211: Register frame match - hexdump(len=2):  
04 0d
D/wpa_supplicant( 1287): nl80211: Register frame type=0xd0  
nl_handle=0xb8df4520
D/wpa_supplicant( 1287): nl80211: Register frame match - hexdump(len=6):  
04 09 50 6f 9a 09
D/wpa_supplicant( 1287): nl80211: Register frame type=0xd0  
nl_handle=0xb8df4520
D/wpa_supplicant( 1287): nl80211: Register frame match - hexdump(len=5):  
7f 50 6f 9a 09
D/wpa_supplicant( 1287): nl80211: Register frame type=0xd0  
nl_handle=0xb8df4520
D/wpa_supplicant( 1287): nl80211: Register frame match - hexdump(len=2):  
08 01
D/wpa_supplicant( 1287): nl80211: Register frame type=0xd0  
nl_handle=0xb8df4520
D/wpa_supplicant( 1287): nl80211: Register frame match - hexdump(len=2):  
04 0e
D/wpa_supplicant( 1287): nl80211: Register frame type=0xd0  
nl_handle=0xb8df4520
D/wpa_supplicant( 1287): nl80211: Register frame match - hexdump(len=1): 06
D/wpa_supplicant( 1287): nl80211: Register frame type=0xd0  
nl_handle=0xb8df4520
D/wpa_supplicant( 1287): nl80211: Register frame match - hexdump(len=2):  
0a 07
D/wpa_supplicant( 1287): nl80211: Register frame type=0xd0  
nl_handle=0xb8df4520
D/wpa_supplicant( 1287): nl80211: Register frame match - hexdump(len=2):  
0a 11
D/wpa_supplicant( 1287): nl80211: Connect (ifindex=5)
D/wpa_supplicant( 1287):   * bssid=<Computer MAC>
D/wpa_supplicant( 1287):   * freq=2412
D/wpa_supplicant( 1287):   * SSID - hexdump(len=8): <removed, because you  
don't care>
D/wpa_supplicant( 1287):   * IEs - hexdump(len=28): 30 14 01 00 00 0f ac  
04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 04 00 00 0a 02
D/wpa_supplicant( 1287):   * Auth Type 0
D/wpa_supplicant( 1287):   * WPA Versions 0x2
D/wpa_supplicant( 1287): nl80211: Connect request send successfully
D/wpa_supplicant( 1287): wlan0: Setting authentication timeout: 10 sec 0  
usec
D/wpa_supplicant( 1287): EAPOL: External notification - EAP success=0
D/wpa_supplicant( 1287): EAPOL: Supplicant port status: Unauthorized
D/wpa_supplicant( 1287): nl80211: Set supplicant port unauthorized for  
00:00:00:00:00:00
D/wpa_supplicant( 1287): EAPOL: External notification - EAP fail=0
D/wpa_supplicant( 1287): EAPOL: Supplicant port status: Unauthorized
D/wpa_supplicant( 1287): nl80211: Set supplicant port unauthorized for  
00:00:00:00:00:00
D/wpa_supplicant( 1287): EAPOL: External notification - portControl=Auto
D/wpa_supplicant( 1287): EAPOL: Supplicant port status: Unauthorized
D/wpa_supplicant( 1287): nl80211: Set supplicant port unauthorized for  
00:00:00:00:00:00
D/wpa_supplicant( 1287): RX ctrl_iface - hexdump(len=25): 42 53 53 20 52  
41 4e 47 45 3d 30 2d 20 4d 41 53 4b 3d 30 78 32 31 42 38 37
D/wpa_supplicant( 1287): wlan0: Control interface command 'BSS RANGE=0-  
MASK=0x21B87'
D/wpadebug( 1512): Received broadcast intent:  
action=android.net.wifi.SCAN_RESULTS
D/wpadebug( 1512): Received broadcast intent:  
action=android.net.wifi.supplicant.STATE_CHANGE
D/wpadebug( 1512):   newState: ASSOCIATING
D/wpa_supplicant( 1287): wlan0: RX EAPOL from <Computer MAC>
D/wpa_supplicant( 1287): RX EAPOL - hexdump(len=9): 01 00 00 05 01 83 00  
05 01
D/wpa_supplicant( 1287): wlan0: Not associated - Delay processing of  
received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00)
D/wpa_supplicant( 1287): nl80211: Event message available
D/wpa_supplicant( 1287): nl80211: Drv Event 46 (NL80211_CMD_CONNECT)  
received for wlan0
D/wpa_supplicant( 1287): nl80211: Connect event
D/wpa_supplicant( 1287): nl80211: Associated on 2412 MHz
D/wpa_supplicant( 1287): nl80211: Associated with <Computer MAC>
D/wpa_supplicant( 1287): nl80211: Operating frequency for the associated  
BSS from scan results: 2412 MHz
D/wpa_supplicant( 1287): wlan0: Event ASSOC (0) received
D/wpa_supplicant( 1287): wlan0: Association info event
D/wpa_supplicant( 1287): req_ies - hexdump(len=59): 00 08 42 61 72 2d 54  
65 73 74 01 08 82 84 8b 96 24 30 48 6c 30 14 01 00 00 0f ac 04 01 00 00 0f  
...
D/wpa_supplicant( 1287): resp_ies - hexdump(len=26): 01 08 82 84 8b 96 0c  
12 18 24 32 04 30 48 60 6c 7f 08 00 00 00 00 00 00 00 40
D/wpa_supplicant( 1287): wlan0: freq=2412 MHz
D/wpa_supplicant( 1287): WPA: set own WPA/RSN IE - hexdump(len=22): 30 14  
01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
D/wpa_supplicant( 1287): FT: Stored MDIE and FTIE from (Re)Association  
Response - hexdump(len=0):
D/wpa_supplicant( 1287): wlan0: State: ASSOCIATING -> ASSOCIATED
D/wpa_supplicant( 1287): wpa_driver_nl80211_set_operstate: operstate 0->0  
(DORMANT)
D/wpa_supplicant( 1287): netlink: Operstate: linkmode=-1, operstate=5
D/wpa_supplicant( 1287): CTRL_IFACE monitor send - hexdump(len=40): 2f 64  
61 74 61 2f 6d 69 73 63 2f 77 69 66 69 2f 73 6f 63 6b 65 74 73 2f 77 70 61  
5f 63 74 72 6c ...
D/wpa_supplicant( 1287): wlan0: Associated to a new BSS: BSSID=<Computer  
MAC>
D/wpa_supplicant( 1287): wlan0: No keys have been configured - skip key  
clearing
D/wpa_supplicant( 1287): wlan0: WPA: clearing AP WPA IE
D/wpa_supplicant( 1287): WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00  
00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
I/wpa_supplicant( 1287): wlan0: Associated with <Computer MAC>
D/wpa_supplicant( 1287): CTRL_IFACE monitor send - hexdump(len=40): 2f 64  
61 74 61 2f 6d 69 73 63 2f 77 69 66 69 2f 73 6f 63 6b 65 74 73 2f 77 70 61  
5f 63 74 72 6c ...
D/wpa_supplicant( 1287): wlan0: WPA: Association event - clear replay  
counter
D/wpa_supplicant( 1287): wlan0: WPA: Clear old PTK
D/wpa_supplicant( 1287): TDLS: Remove peers on association
D/wpa_supplicant( 1287): EAPOL: External notification - portEnabled=0
D/wpa_supplicant( 1287): EAPOL: Supplicant port status: Unauthorized
D/wpa_supplicant( 1287): nl80211: Set supplicant port unauthorized for  
<Computer MAC>
D/wpa_supplicant( 1287): EAPOL: External notification - portValid=0
D/wpa_supplicant( 1287): EAPOL: Supplicant port status: Unauthorized
D/wpa_supplicant( 1287): nl80211: Set supplicant port unauthorized for  
<Computer MAC>
D/wpa_supplicant( 1287): EAPOL: External notification - portEnabled=1
D/wpa_supplicant( 1287): EAPOL: SUPP_PAE entering state CONNECTING
D/wpa_supplicant( 1287): EAPOL: enable timer tick
D/wpa_supplicant( 1287): EAPOL: SUPP_BE entering state IDLE
D/wpa_supplicant( 1287): EAP: EAP entering state INITIALIZE
D/wpa_supplicant( 1287): EAP: EAP entering state IDLE
D/wpa_supplicant( 1287): wlan0: Setting authentication timeout: 10 sec 0  
usec
D/wpa_supplicant( 1287): wlan0: Cancelling scan request
D/wpa_supplicant( 1287): wlan0: P2P: Station mode scan operation not  
pending anymore (sta_scan_pending=0 p2p_cb_on_scan_complete=0)
D/wpa_supplicant( 1287): wlan0: Process pending EAPOL frame that was  
received just before association notification
D/wpa_supplicant( 1287): wlan0: RX EAPOL from <Computer MAC>
D/wpa_supplicant( 1287): RX EAPOL - hexdump(len=9): 01 00 00 05 01 83 00  
05 01
D/wpa_supplicant( 1287): wlan0: Setting authentication timeout: 70 sec 0  
usec
D/wpa_supplicant( 1287): EAPOL: Received EAP-Packet frame
D/wpa_supplicant( 1287): EAPOL: SUPP_PAE entering state RESTART
D/wpa_supplicant( 1287): EAP: EAP entering state INITIALIZE
D/wpa_supplicant( 1287): EAP: EAP entering state IDLE
D/wpa_supplicant( 1287): EAPOL: SUPP_PAE entering state AUTHENTICATING
D/wpa_supplicant( 1287): EAPOL: SUPP_BE entering state REQUEST
D/wpa_supplicant( 1287): EAPOL: getSuppRsp
D/wpa_supplicant( 1287): EAP: EAP entering state RECEIVED
D/wpa_supplicant( 1287): EAP: Received EAP-Request id=131 method=1  
vendor=0 vendorMethod=0
D/wpa_supplicant( 1287): EAP: EAP entering state IDENTITY
I/wpa_supplicant( 1287): wlan0: CTRL-EVENT-EAP-STARTED EAP authentication  
started
D/wpa_supplicant( 1287): CTRL_IFACE monitor send - hexdump(len=40): 2f 64  
61 74 61 2f 6d 69 73 63 2f 77 69 66 69 2f 73 6f 63 6b 65 74 73 2f 77 70 61  
5f 63 74 72 6c ...
D/wpa_supplicant( 1287): EAP: Status notification: started (param=)
D/wpa_supplicant( 1287): CTRL_IFACE monitor send - hexdump(len=40): 2f 64  
61 74 61 2f 6d 69 73 63 2f 77 69 66 69 2f 73 6f 63 6b 65 74 73 2f 77 70 61  
5f 63 74 72 6c ...
D/wpa_supplicant( 1287): EAP: EAP-Request Identity data - hexdump(len=0):
D/wpa_supplicant( 1287): EAP: using real identity - hexdump(len=6): 74 61  
62 6c 65 74
D/wpa_supplicant( 1287): EAP: EAP entering state SEND_RESPONSE
D/wpa_supplicant( 1287): EAP: EAP entering state IDLE
D/wpa_supplicant( 1287): EAPOL: SUPP_BE entering state RESPONSE
D/wpa_supplicant( 1287): EAPOL: txSuppRsp
D/wpa_supplicant( 1287): TX EAPOL: dst=<Computer MAC>
D/wpa_supplicant( 1287): TX EAPOL - hexdump(len=15): 01 00 00 0b 02 83 00  
0b 01 74 61 62 6c 65 74
D/wpa_supplicant( 1287): EAPOL: SUPP_BE entering state RECEIVE
D/wpadebug( 1512): Received broadcast intent:  
action=android.net.wifi.supplicant.STATE_CHANGE
D/wpadebug( 1512):   newState: ASSOCIATED
D/wpa_supplicant( 1287): EAPOL: startWhen --> 0
D/wpa_supplicant( 1287): wlan0: RX EAPOL from <Computer MAC>
D/wpa_supplicant( 1287): RX EAPOL - hexdump(len=9): 01 00 00 05 01 83 00  
05 01
D/wpa_supplicant( 1287): EAPOL: Received EAP-Packet frame



More information about the Hostap mailing list