Help debug my authentication issue? (Part 1) (Logcat part 2)

Frank Rizzo thefrankrizzo
Sun Oct 11 14:57:47 PDT 2015


D/wpa_supplicant( 1287): EAPOL: SUPP_BE entering state REQUEST
D/wpa_supplicant( 1287): EAPOL: getSuppRsp
D/wpa_supplicant( 1287): EAP: EAP entering state RECEIVED
D/wpa_supplicant( 1287): EAP: Received EAP-Request id=131 method=1  
vendor=0 vendorMethod=0
D/wpa_supplicant( 1287): EAP: EAP entering state RETRANSMIT
D/wpa_supplicant( 1287): EAP: EAP entering state SEND_RESPONSE
D/wpa_supplicant( 1287): EAP: EAP entering state IDLE
D/wpa_supplicant( 1287): EAPOL: SUPP_BE entering state RESPONSE
D/wpa_supplicant( 1287): EAPOL: txSuppRsp
D/wpa_supplicant( 1287): TX EAPOL: dst=<Computer MAC>
D/wpa_supplicant( 1287): TX EAPOL - hexdump(len=15): 01 00 00 0b 02 83 00  
0b 01 74 61 62 6c 65 74
D/wpa_supplicant( 1287): EAPOL: SUPP_BE entering state RECEIVE
D/wpa_supplicant( 1287): RX ctrl_iface - hexdump(len=4): 53 43 41 4e
D/wpa_supplicant( 1287): wlan0: Control interface command 'SCAN'
D/wpa_supplicant( 1287): Ongoing scan action - reject new request
D/wpa_supplicant( 1287): wlan0: RX EAPOL from <Computer MAC>
D/wpa_supplicant( 1287): RX EAPOL - hexdump(len=9): 01 00 00 05 01 83 00  
05 01
D/wpa_supplicant( 1287): EAPOL: Received EAP-Packet frame
D/wpa_supplicant( 1287): EAPOL: SUPP_BE entering state REQUEST
D/wpa_supplicant( 1287): EAPOL: getSuppRsp
D/wpa_supplicant( 1287): EAP: EAP entering state RECEIVED
D/wpa_supplicant( 1287): EAP: Received EAP-Request id=131 method=1  
vendor=0 vendorMethod=0
D/wpa_supplicant( 1287): EAP: EAP entering state RETRANSMIT
D/wpa_supplicant( 1287): EAP: EAP entering state SEND_RESPONSE
D/wpa_supplicant( 1287): EAP: EAP entering state IDLE
D/wpa_supplicant( 1287): EAPOL: SUPP_BE entering state RESPONSE
D/wpa_supplicant( 1287): EAPOL: txSuppRsp
D/wpa_supplicant( 1287): TX EAPOL: dst=<Computer MAC>
D/wpa_supplicant( 1287): TX EAPOL - hexdump(len=15): 01 00 00 0b 02 83 00  
0b 01 74 61 62 6c 65 74
D/wpa_supplicant( 1287): EAPOL: SUPP_BE entering state RECEIVE
D/wpa_supplicant( 1287): RX ctrl_iface - hexdump(len=4): 53 43 41 4e
D/wpa_supplicant( 1287): wlan0: Control interface command 'SCAN'
D/wpa_supplicant( 1287): Ongoing scan action - reject new request
D/wpa_supplicant( 1287): wlan0: RX EAPOL from <Computer MAC>
D/wpa_supplicant( 1287): RX EAPOL - hexdump(len=9): 01 00 00 05 01 83 00  
05 01
D/wpa_supplicant( 1287): EAPOL: Received EAP-Packet frame
D/wpa_supplicant( 1287): EAPOL: SUPP_BE entering state REQUEST
D/wpa_supplicant( 1287): EAPOL: getSuppRsp
D/wpa_supplicant( 1287): EAP: EAP entering state RECEIVED
D/wpa_supplicant( 1287): EAP: Received EAP-Request id=131 method=1  
vendor=0 vendorMethod=0
D/wpa_supplicant( 1287): EAP: EAP entering state RETRANSMIT
D/wpa_supplicant( 1287): EAP: EAP entering state SEND_RESPONSE
D/wpa_supplicant( 1287): EAP: EAP entering state IDLE
D/wpa_supplicant( 1287): EAPOL: SUPP_BE entering state RESPONSE
D/wpa_supplicant( 1287): EAPOL: txSuppRsp
D/wpa_supplicant( 1287): TX EAPOL: dst=<Computer MAC>
D/wpa_supplicant( 1287): TX EAPOL - hexdump(len=15): 01 00 00 0b 02 83 00  
0b 01 74 61 62 6c 65 74
D/wpa_supplicant( 1287): EAPOL: SUPP_BE entering state RECEIVE
D/wpa_supplicant( 1287): RX ctrl_iface - hexdump(len=4): 53 43 41 4e
D/wpa_supplicant( 1287): wlan0: Control interface command 'SCAN'
D/wpa_supplicant( 1287): Ongoing scan action - reject new request
D/wpa_supplicant( 1287): RX ctrl_iface - hexdump(len=4): 53 43 41 4e
D/wpa_supplicant( 1287): wlan0: Control interface command 'SCAN'
D/wpa_supplicant( 1287): Ongoing scan action - reject new request
D/wpa_supplicant( 1287): wlan0: RX EAPOL from <Computer MAC>
D/wpa_supplicant( 1287): RX EAPOL - hexdump(len=9): 01 00 00 05 01 83 00  
05 01
D/wpa_supplicant( 1287): EAPOL: Received EAP-Packet frame
D/wpa_supplicant( 1287): EAPOL: SUPP_BE entering state REQUEST
D/wpa_supplicant( 1287): EAPOL: getSuppRsp
D/wpa_supplicant( 1287): EAP: EAP entering state RECEIVED
D/wpa_supplicant( 1287): EAP: Received EAP-Request id=131 method=1  
vendor=0 vendorMethod=0
D/wpa_supplicant( 1287): EAP: EAP entering state RETRANSMIT
D/wpa_supplicant( 1287): EAP: EAP entering state SEND_RESPONSE
D/wpa_supplicant( 1287): EAP: EAP entering state IDLE
D/wpa_supplicant( 1287): EAPOL: SUPP_BE entering state RESPONSE
D/wpa_supplicant( 1287): EAPOL: txSuppRsp
D/wpa_supplicant( 1287): TX EAPOL: dst=<Computer MAC>
D/wpa_supplicant( 1287): TX EAPOL - hexdump(len=15): 01 00 00 0b 02 83 00  
0b 01 74 61 62 6c 65 74
D/wpa_supplicant( 1287): EAPOL: SUPP_BE entering state RECEIVE
D/wpa_supplicant( 1287): RX ctrl_iface - hexdump(len=4): 53 43 41 4e
D/wpa_supplicant( 1287): wlan0: Control interface command 'SCAN'
D/wpa_supplicant( 1287): Ongoing scan action - reject new request
D/wpa_supplicant( 1287): RX ctrl_iface - hexdump(len=4): 53 43 41 4e
D/wpa_supplicant( 1287): wlan0: Control interface command 'SCAN'
D/wpa_supplicant( 1287): Ongoing scan action - reject new request
D/wpa_supplicant( 1287): wlan0: RX EAPOL from <Computer MAC>
D/wpa_supplicant( 1287): RX EAPOL - hexdump(len=9): 01 00 00 05 01 83 00  
05 01
D/wpa_supplicant( 1287): EAPOL: Received EAP-Packet frame
D/wpa_supplicant( 1287): EAPOL: SUPP_BE entering state REQUEST
D/wpa_supplicant( 1287): EAPOL: getSuppRsp
D/wpa_supplicant( 1287): EAP: EAP entering state RECEIVED
D/wpa_supplicant( 1287): EAP: Received EAP-Request id=131 method=1  
vendor=0 vendorMethod=0
D/wpa_supplicant( 1287): EAP: EAP entering state RETRANSMIT
D/wpa_supplicant( 1287): EAP: EAP entering state SEND_RESPONSE
D/wpa_supplicant( 1287): EAP: EAP entering state IDLE
D/wpa_supplicant( 1287): EAPOL: SUPP_BE entering state RESPONSE
D/wpa_supplicant( 1287): EAPOL: txSuppRsp
D/wpa_supplicant( 1287): TX EAPOL: dst=<Computer MAC>
D/wpa_supplicant( 1287): TX EAPOL - hexdump(len=15): 01 00 00 0b 02 83 00  
0b 01 74 61 62 6c 65 74
D/wpa_supplicant( 1287): EAPOL: SUPP_BE entering state RECEIVE
D/wpa_supplicant( 1287): RX ctrl_iface - hexdump(len=4): 53 43 41 4e
D/wpa_supplicant( 1287): wlan0: Control interface command 'SCAN'
D/wpa_supplicant( 1287): Ongoing scan action - reject new request
I/wpa_supplicant( 1287): wlan0: Authentication with <Computer MAC> timed  
out.
D/wpa_supplicant( 1287): CTRL_IFACE monitor send - hexdump(len=40): 2f 64  
61 74 61 2f 6d 69 73 63 2f 77 69 66 69 2f 73 6f 63 6b 65 74 73 2f 77 70 61  
5f 63 74 72 6c ...
D/wpa_supplicant( 1287): Added BSSID <Computer MAC> into blacklist
D/wpa_supplicant( 1287): TDLS: Remove peers on disassociation
D/wpa_supplicant( 1287): wlan0: Request to deauthenticate -  
bssid=<Computer MAC> pending_bssid=00:00:00:00:00:00 reason=3  
state=ASSOCIATED
D/wpa_supplicant( 1287): TDLS: Tear down peers
D/wpa_supplicant( 1287): wpa_driver_nl80211_disconnect(reason_code=3)
D/wpa_supplicant( 1287): wlan0: Event DEAUTH (12) received
D/wpa_supplicant( 1287): wlan0: Deauthentication notification
D/wpa_supplicant( 1287): wlan0:  * reason 3 (locally generated)
D/wpa_supplicant( 1287): Deauthentication frame IE(s) - hexdump(len=0):  
[NULL]
I/wpa_supplicant( 1287): wlan0: CTRL-EVENT-DISCONNECTED bssid=<Computer  
MAC> reason=3 locally_generated=1
D/wpa_supplicant( 1287): CTRL_IFACE monitor send - hexdump(len=40): 2f 64  
61 74 61 2f 6d 69 73 63 2f 77 69 66 69 2f 73 6f 63 6b 65 74 73 2f 77 70 61  
5f 63 74 72 6c ...
D/wpa_supplicant( 1287): wlan0: Auto connect enabled: try to reconnect  
(wps=0 wpa_state=6)
D/wpa_supplicant( 1287): wlan0: Setting scan request: 0 sec 500000 usec
D/wpa_supplicant( 1287): BSSID <Computer MAC> blacklist count incremented  
to 2
D/wpa_supplicant( 1287): Continuous association failures - consider  
temporary network disabling
I/wpa_supplicant( 1287): wlan0: CTRL-EVENT-SSID-TEMP-DISABLED id=2  
ssid="EAP-TEST" auth_failures=2 duration=20
D/wpa_supplicant( 1287): CTRL_IFACE monitor send - hexdump(len=40): 2f 64  
61 74 61 2f 6d 69 73 63 2f 77 69 66 69 2f 73 6f 63 6b 65 74 73 2f 77 70 61  
5f 63 74 72 6c ...
D/wpa_supplicant( 1287): wlan0: Blacklist count 150 --> request scan in  
10000 ms
D/wpa_supplicant( 1287): wlan0: Setting scan request: 10 sec 0 usec
D/wpa_supplicant( 1287): wlan0: P2P: Station mode scan operation not  
pending anymore (sta_scan_pending=0 p2p_cb_on_scan_complete=0)
D/wpa_supplicant( 1287): TDLS: Remove peers on disassociation
D/wpa_supplicant( 1287): wlan0: Disconnect event - remove keys
D/wpa_supplicant( 1287): wpa_driver_nl80211_set_key: ifindex=5 (wlan0)  
alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0
D/wpa_supplicant( 1287): wpa_driver_nl80211_set_key: ifindex=5 (wlan0)  
alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0
D/wpa_supplicant( 1287): wpa_driver_nl80211_set_key: ifindex=5 (wlan0)  
alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0
D/wpa_supplicant( 1287): wpa_driver_nl80211_set_key: ifindex=5 (wlan0)  
alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0
D/wpa_supplicant( 1287): wpa_driver_nl80211_set_key: ifindex=5 (wlan0)  
alg=0 addr=0x0 key_idx=4 set_tx=0 seq_len=0 key_len=0
D/wpa_supplicant( 1287): wpa_driver_nl80211_set_key: ifindex=5 (wlan0)  
alg=0 addr=0x0 key_idx=5 set_tx=0 seq_len=0 key_len=0
D/wpa_supplicant( 1287): wpa_driver_nl80211_set_key: ifindex=5 (wlan0)  
alg=0 addr=0xb8df3cd4 key_idx=0 set_tx=0 seq_len=0 key_len=0
D/wpa_supplicant( 1287):    addr=<Computer MAC>
D/wpa_supplicant( 1287): wlan0: State: ASSOCIATED -> DISCONNECTED
D/wpa_supplicant( 1287): wpa_driver_nl80211_set_operstate: operstate 0->0  
(DORMANT)
D/wpa_supplicant( 1287): netlink: Operstate: linkmode=-1, operstate=5
D/wpa_supplicant( 1287): CTRL_IFACE monitor send - hexdump(len=40): 2f 64  
61 74 61 2f 6d 69 73 63 2f 77 69 66 69 2f 73 6f 63 6b 65 74 73 2f 77 70 61  
5f 63 74 72 6c ...
D/wpa_supplicant( 1287): EAPOL: External notification - portEnabled=0
D/wpa_supplicant( 1287): EAPOL: SUPP_PAE entering state DISCONNECTED
D/wpa_supplicant( 1287): EAPOL: Supplicant port status: Unauthorized
D/wpa_supplicant( 1287): nl80211: Set supplicant port unauthorized for  
00:00:00:00:00:00
D/wpa_supplicant( 1287): EAPOL: SUPP_BE entering state INITIALIZE
D/wpa_supplicant( 1287): EAP: EAP entering state DISABLED
D/wpa_supplicant( 1287): EAPOL: Supplicant port status: Unauthorized
D/wpa_supplicant( 1287): nl80211: Set supplicant port unauthorized for  
00:00:00:00:00:00
D/wpa_supplicant( 1287): EAPOL: External notification - portValid=0
D/wpa_supplicant( 1287): EAPOL: Supplicant port status: Unauthorized
D/wpa_supplicant( 1287): nl80211: Set supplicant port unauthorized for  
00:00:00:00:00:00
D/wpa_supplicant( 1287): wlan0: No keys have been configured - skip key  
clearing
D/wpa_supplicant( 1287): wlan0: State: DISCONNECTED -> DISCONNECTED
D/wpa_supplicant( 1287): wpa_driver_nl80211_set_operstate: operstate 0->0  
(DORMANT)
D/wpa_supplicant( 1287): netlink: Operstate: linkmode=-1, operstate=5
D/wpa_supplicant( 1287): EAPOL: External notification - portEnabled=0
D/wpa_supplicant( 1287): EAPOL: Supplicant port status: Unauthorized
D/wpa_supplicant( 1287): nl80211: Set supplicant port unauthorized for  
00:00:00:00:00:00
D/wpa_supplicant( 1287): EAPOL: External notification - portValid=0
D/wpa_supplicant( 1287): EAPOL: Supplicant port status: Unauthorized
D/wpa_supplicant( 1287): nl80211: Set supplicant port unauthorized for  
00:00:00:00:00:00
D/wpa_supplicant( 1287): wlan0: Setting scan request: 1 sec 0 usec
D/wpa_supplicant( 1287): wlan0: P2P: Station mode scan operation not  
pending anymore (sta_scan_pending=0 p2p_cb_on_scan_complete=0)
D/wpa_supplicant( 1287): nl80211: Event message available
D/wpa_supplicant( 1287): nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT)  
received for wlan0
D/wpa_supplicant( 1287): nl80211: Ignore disconnect event triggered during  
reassociation
D/wpadebug( 1512): Received broadcast intent:  
action=android.net.wifi.supplicant.STATE_CHANGE
D/wpadebug( 1512):   newState: DISCONNECTED
D/wpa_supplicant( 1287): EAPOL: disable timer tick
D/wpa_supplicant( 1287): EAPOL: Supplicant port status: Unauthorized
D/wpa_supplicant( 1287): nl80211: Set supplicant port unauthorized for  
00:00:00:00:00:00
D/wpa_supplicant( 1287): wlan0: State: DISCONNECTED -> SCANNING
D/wpa_supplicant( 1287): CTRL_IFACE monitor send - hexdump(len=40): 2f 64  
61 74 61 2f 6d 69 73 63 2f 77 69 66 69 2f 73 6f 63 6b 65 74 73 2f 77 70 61  
5f 63 74 72 6c ...
D/wpa_supplicant( 1287): wlan0: Starting AP scan for wildcard SSID
D/wpa_supplicant( 1287): wlan0: nl80211: scan request
D/wpa_supplicant( 1287): nl80211: Scan SSID - hexdump(len=0): [NULL]
D/wpadebug( 1512): Received broadcast intent:  
action=android.net.wifi.supplicant.STATE_CHANGE
D/wpadebug( 1512):   newState: SCANNING



More information about the Hostap mailing list