FILS reassociation duplicate sequence number
James Prestwood
prestwoj at gmail.com
Wed Aug 25 12:46:43 PDT 2021
Hi Jouni,
On Wed, 2021-08-25 at 12:37 +0300, Jouni Malinen wrote:
> On Thu, Aug 05, 2021 at 08:01:04AM -0700, James Prestwood wrote:
> > I am running into a problem where the radius server thinks there
> > was a
> > duplicate access request during FILS reassocation. I have two
> > EAP/FILS
> > enabled APs. Here is the sequence of events:
> >
> > - Authenicate over EAP to AP1
> > - Disconnect from AP1 and authenticate using FILS to AP1
> > - Reassociate to AP2 using FILS
> >
> > Everything appears to be working fine initially (my identity is
> > found)
> > but then the radius server throws the message away claiming the
> > sequence number is a duplicate:
> ..
>
> Which station implementation are you using here and would you be able
> to
> provide debug logs from both the authentication server and station
> for
> all those authentication attempts?
I am using IWD, attached are debug logs for both IWD and hostapd, as
well as my hostapd/radius config. FWIW FT-FILS works just fine, its
only reassociation that behaves this way.
Note, these config files are used in our own testing so they contain
much more info (like FT IDs etc.) that shouldn't be taken into account
when the key_mgmt is just set to "WPA-EAP FILS-SHA256" (or correct me
if I'm wrong).
>
> > EAP: SEQ=0 replayed (already received SEQ=0)
> ..
> > And sure enough, if I remove the sequence number check it all works
> > as
> > expected and I am able to reassociate:
>
> Well, I don't think I'd call that "as expected" taken into account
> reuse
> of the same sequence number is incorrect and a potential security
> vulnerability..
Thanks,
James
-------------- next part --------------
random: Trying to read entropy from /dev/random
Configuration file: /tmp/ft-eap-ccmp-1.conf
Configuration file: /tmp/ft-eap-ccmp-2.conf
Configuration file: radius.conf
nl80211: TDLS supported
nl80211: TDLS external setup
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:10
nl80211: Supported cipher 00-0f-ac:8
nl80211: Supported cipher 00-0f-ac:9
nl80211: Supported cipher 00-0f-ac:6
nl80211: Supported cipher 00-0f-ac:13
nl80211: Supported cipher 00-0f-ac:11
nl80211: Supported cipher 00-0f-ac:12
nl80211: Using driver-based off-channel TX
nl80211: Driver-advertised extended capabilities (default) - hexdump(len=8): 04 00 40 00 00 00 00 40
nl80211: Driver-advertised extended capabilities mask (default) - hexdump(len=8): 04 00 40 00 00 00 00 40
nl80211: Supported vendor command: vendor_id=0x1374 subcmd=1
nl80211: Supported vendor event: vendor_id=0x1374 subcmd=1
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: use P2P_DEVICE support
nl80211: key_mgmt=0x1ff0f enc=0xfef auth=0x7 flags=0xe4000d30fb5bfbe0 rrm_flags=0x10 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=4
nl80211: interface wln0 in phy rad0
nl80211: Set mode ifindex 9 iftype 3 (AP)
nl80211: Setup AP(wln0) - device_ap_sme=0 use_monitor=0
nl80211: Subscribe to mgmt frames with AP handle 0x1196b30
nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x1196b30 match= multicast=0
nl80211: Register frame type=0x0 (WLAN_FC_STYPE_ASSOC_REQ) nl_handle=0x1196b30 match= multicast=0
nl80211: Register frame type=0x20 (WLAN_FC_STYPE_REASSOC_REQ) nl_handle=0x1196b30 match= multicast=0
nl80211: Register frame type=0xa0 (WLAN_FC_STYPE_DISASSOC) nl_handle=0x1196b30 match= multicast=0
nl80211: Register frame type=0xc0 (WLAN_FC_STYPE_DEAUTH) nl_handle=0x1196b30 match= multicast=0
nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x1196b30 match= multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1196b30 match=04 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1196b30 match=0501 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1196b30 match=0503 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1196b30 match=0504 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1196b30 match=06 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1196b30 match=08 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1196b30 match=09 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1196b30 match=0a multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1196b30 match=11 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1196b30 match=7f multicast=0
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
nl80211: Add own interface ifindex 9 (ifidx_reason -1)
nl80211: if_indices[16]: 9(-1)
nl80211: Do not open EAPOL RX socket - using control port for RX
phy: rad0
BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
nl80211: No channel number found for frequency 5900 MHz
nl80211: No channel number found for frequency 5905 MHz
nl80211: No channel number found for frequency 5910 MHz
nl80211: No channel number found for frequency 5915 MHz
nl80211: No channel number found for frequency 5920 MHz
nl80211: No channel number found for frequency 5925 MHz
nl80211: No channel number found for frequency 902 MHz
nl80211: No channel number found for frequency 903 MHz
nl80211: No channel number found for frequency 903 MHz
nl80211: No channel number found for frequency 904 MHz
nl80211: No channel number found for frequency 904 MHz
nl80211: No channel number found for frequency 905 MHz
nl80211: No channel number found for frequency 905 MHz
nl80211: No channel number found for frequency 906 MHz
nl80211: No channel number found for frequency 906 MHz
nl80211: No channel number found for frequency 907 MHz
nl80211: No channel number found for frequency 907 MHz
nl80211: No channel number found for frequency 908 MHz
nl80211: No channel number found for frequency 908 MHz
nl80211: No channel number found for frequency 909 MHz
nl80211: No channel number found for frequency 909 MHz
nl80211: No channel number found for frequency 910 MHz
nl80211: No channel number found for frequency 910 MHz
nl80211: No channel number found for frequency 911 MHz
nl80211: No channel number found for frequency 911 MHz
nl80211: No channel number found for frequency 912 MHz
nl80211: No channel number found for frequency 912 MHz
nl80211: No channel number found for frequency 913 MHz
nl80211: No channel number found for frequency 913 MHz
nl80211: No channel number found for frequency 914 MHz
nl80211: No channel number found for frequency 914 MHz
nl80211: No channel number found for frequency 915 MHz
nl80211: No channel number found for frequency 915 MHz
nl80211: No channel number found for frequency 916 MHz
nl80211: No channel number found for frequency 916 MHz
nl80211: No channel number found for frequency 917 MHz
nl80211: No channel number found for frequency 917 MHz
nl80211: No channel number found for frequency 918 MHz
nl80211: No channel number found for frequency 918 MHz
nl80211: No channel number found for frequency 919 MHz
nl80211: No channel number found for frequency 919 MHz
nl80211: No channel number found for frequency 920 MHz
nl80211: No channel number found for frequency 920 MHz
nl80211: No channel number found for frequency 921 MHz
nl80211: No channel number found for frequency 921 MHz
nl80211: No channel number found for frequency 922 MHz
nl80211: No channel number found for frequency 922 MHz
nl80211: No channel number found for frequency 923 MHz
nl80211: No channel number found for frequency 923 MHz
nl80211: No channel number found for frequency 924 MHz
nl80211: No channel number found for frequency 924 MHz
nl80211: No channel number found for frequency 925 MHz
nl80211: No channel number found for frequency 925 MHz
nl80211: No channel number found for frequency 926 MHz
nl80211: No channel number found for frequency 926 MHz
nl80211: No channel number found for frequency 927 MHz
nl80211: No channel number found for frequency 927 MHz
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Remove unsupported mode
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR]
nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR]
nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR]
Completing interface initialization
Mode: IEEE 802.11g Channel: 1 Frequency: 2412 MHz
DFS 0 channels required radar detection
nl80211: Set freq 2412 (ht_enabled=0, vht_enabled=0, he_enabled=0, bandwidth=20 MHz, cf1=2412 MHz, cf2=0 MHz)
* freq=2412
* he_enabled=0
* vht_enabled=0
* ht_enabled=0
* channel_type=0
RATE[0] rate=10 flags=0x1
RATE[1] rate=20 flags=0x1
RATE[2] rate=55 flags=0x1
RATE[3] rate=110 flags=0x1
RATE[4] rate=60 flags=0x0
RATE[5] rate=90 flags=0x0
RATE[6] rate=120 flags=0x0
RATE[7] rate=180 flags=0x0
RATE[8] rate=240 flags=0x0
RATE[9] rate=360 flags=0x0
RATE[10] rate=480 flags=0x0
RATE[11] rate=540 flags=0x0
hostapd_setup_bss(hapd=0x118e3a0 (wln0), first=1)
nl80211: flush -> DEL_STATION wln0 (all)
Using interface wln0 with hwaddr 42:00:00:00:00:00 and ssid "TestFT"
wln0: RADIUS Authentication server 127.0.0.1:1812
connect[radius]: Network is unreachable
random: Got 20/20 random bytes
GMK - hexdump(len=32): [REMOVED]
Key Counter - hexdump(len=32): [REMOVED]
WPA: Delay group state machine start until Beacon frames have been configured
nl80211: Set beacon (beacon_set=0)
nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 42 00 00 00 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 01
nl80211: Beacon tail - hexdump(len=75): 2a 01 04 32 04 30 48 60 6c 30 1c 01 00 00 0f ac 04 01 00 00 0f ac 04 03 00 00 0f ac 03 00 0f ac 0e 00 0f ac 10 80 00 46 05 02 00 00 00 00 36 03 12 34 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: ifindex=9
nl80211: beacon_int=100
nl80211: beacon_rate=0
nl80211: rate_type=0
nl80211: dtim_period=2
nl80211: ssid=TestFT
* beacon_int=100
* dtim_period=2
nl80211: hidden SSID not in use
nl80211: privacy=2
nl80211: auth_algs=0x1
nl80211: wpa_version=0x2
nl80211: key_mgmt_suites=0x140020
nl80211: Not enough room for all AKM suites (num_suites=3 > NL80211_MAX_NR_AKM_SUITES)
nl80211: pairwise_ciphers=0x10
nl80211: group_cipher=0x10
nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01
nl80211: multicast to unicast disabled on interface wln0
wln0: Deauthenticate all stations at BSS start
nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3
nl80211: send_mlme - Use bss->freq=2412
nl80211: send_mlme -> send_frame_cmd
WPA: Start group state machine to set initial keys
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
GTK - hexdump(len=16): [REMOVED]
IGTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
nl80211: Set wln0 operstate 0->1 (UP)
netlink: Operstate: ifindex=9 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
nl80211: TX queue param set: queue=0 aifs=1 cw_min=3 cw_max=7 burst_time=15 --> res=0
nl80211: TX queue param set: queue=1 aifs=1 cw_min=7 cw_max=15 burst_time=30 --> res=0
nl80211: TX queue param set: queue=2 aifs=3 cw_min=15 cw_max=63 burst_time=0 --> res=0
nl80211: TX queue param set: queue=3 aifs=7 cw_min=15 cw_max=1023 burst_time=0 --> res=0
wln0: interface state UNINITIALIZED->ENABLED
wln0: AP-ENABLED
wln0: Setup of interface done.
nl80211: TDLS supported
nl80211: TDLS external setup
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:10
nl80211: Supported cipher 00-0f-ac:8
nl80211: Supported cipher 00-0f-ac:9
nl80211: Supported cipher 00-0f-ac:6
nl80211: Supported cipher 00-0f-ac:13
nl80211: Supported cipher 00-0f-ac:11
nl80211: Supported cipher 00-0f-ac:12
nl80211: Using driver-based off-channel TX
nl80211: Driver-advertised extended capabilities (default) - hexdump(len=8): 04 00 40 00 00 00 00 40
nl80211: Driver-advertised extended capabilities mask (default) - hexdump(len=8): 04 00 40 00 00 00 00 40
nl80211: Supported vendor command: vendor_id=0x1374 subcmd=1
nl80211: Supported vendor event: vendor_id=0x1374 subcmd=1
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: use P2P_DEVICE support
nl80211: key_mgmt=0x1ff0f enc=0xfef auth=0x7 flags=0xe4000d30fb5bfbe0 rrm_flags=0x10 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=4
nl80211: interface wln1 in phy rad1
nl80211: Set mode ifindex 10 iftype 3 (AP)
nl80211: Setup AP(wln1) - device_ap_sme=0 use_monitor=0
nl80211: Subscribe to mgmt frames with AP handle 0x119df10
nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x119df10 match= multicast=0
nl80211: Register frame type=0x0 (WLAN_FC_STYPE_ASSOC_REQ) nl_handle=0x119df10 match= multicast=0
nl80211: Register frame type=0x20 (WLAN_FC_STYPE_REASSOC_REQ) nl_handle=0x119df10 match= multicast=0
nl80211: Register frame type=0xa0 (WLAN_FC_STYPE_DISASSOC) nl_handle=0x119df10 match= multicast=0
nl80211: Register frame type=0xc0 (WLAN_FC_STYPE_DEAUTH) nl_handle=0x119df10 match= multicast=0
nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x119df10 match= multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=04 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=0501 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=0503 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=0504 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=06 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=08 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=09 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=0a multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=11 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=7f multicast=0
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
nl80211: Add own interface ifindex 10 (ifidx_reason -1)
nl80211: if_indices[16]: 10(-1)
nl80211: Do not open EAPOL RX socket - using control port for RX
phy: rad1
BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
Using existing control interface directory.
nl80211: No channel number found for frequency 5900 MHz
nl80211: No channel number found for frequency 5905 MHz
nl80211: No channel number found for frequency 5910 MHz
nl80211: No channel number found for frequency 5915 MHz
nl80211: No channel number found for frequency 5920 MHz
nl80211: No channel number found for frequency 5925 MHz
nl80211: No channel number found for frequency 902 MHz
nl80211: No channel number found for frequency 903 MHz
nl80211: No channel number found for frequency 903 MHz
nl80211: No channel number found for frequency 904 MHz
nl80211: No channel number found for frequency 904 MHz
nl80211: No channel number found for frequency 905 MHz
nl80211: No channel number found for frequency 905 MHz
nl80211: No channel number found for frequency 906 MHz
nl80211: No channel number found for frequency 906 MHz
nl80211: No channel number found for frequency 907 MHz
nl80211: No channel number found for frequency 907 MHz
nl80211: No channel number found for frequency 908 MHz
nl80211: No channel number found for frequency 908 MHz
nl80211: No channel number found for frequency 909 MHz
nl80211: No channel number found for frequency 909 MHz
nl80211: No channel number found for frequency 910 MHz
nl80211: No channel number found for frequency 910 MHz
nl80211: No channel number found for frequency 911 MHz
nl80211: No channel number found for frequency 911 MHz
nl80211: No channel number found for frequency 912 MHz
nl80211: No channel number found for frequency 912 MHz
nl80211: No channel number found for frequency 913 MHz
nl80211: No channel number found for frequency 913 MHz
nl80211: No channel number found for frequency 914 MHz
nl80211: No channel number found for frequency 914 MHz
nl80211: No channel number found for frequency 915 MHz
nl80211: No channel number found for frequency 915 MHz
nl80211: No channel number found for frequency 916 MHz
nl80211: No channel number found for frequency 916 MHz
nl80211: No channel number found for frequency 917 MHz
nl80211: No channel number found for frequency 917 MHz
nl80211: No channel number found for frequency 918 MHz
nl80211: No channel number found for frequency 918 MHz
nl80211: No channel number found for frequency 919 MHz
nl80211: No channel number found for frequency 919 MHz
nl80211: No channel number found for frequency 920 MHz
nl80211: No channel number found for frequency 920 MHz
nl80211: No channel number found for frequency 921 MHz
nl80211: No channel number found for frequency 921 MHz
nl80211: No channel number found for frequency 922 MHz
nl80211: No channel number found for frequency 922 MHz
nl80211: No channel number found for frequency 923 MHz
nl80211: No channel number found for frequency 923 MHz
nl80211: No channel number found for frequency 924 MHz
nl80211: No channel number found for frequency 924 MHz
nl80211: No channel number found for frequency 925 MHz
nl80211: No channel number found for frequency 925 MHz
nl80211: No channel number found for frequency 926 MHz
nl80211: No channel number found for frequency 926 MHz
nl80211: No channel number found for frequency 927 MHz
nl80211: No channel number found for frequency 927 MHz
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Remove unsupported mode
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR]
nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR]
nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR]
Completing interface initialization
Mode: IEEE 802.11g Channel: 2 Frequency: 2417 MHz
DFS 0 channels required radar detection
nl80211: Set freq 2417 (ht_enabled=0, vht_enabled=0, he_enabled=0, bandwidth=20 MHz, cf1=2417 MHz, cf2=0 MHz)
* freq=2417
* he_enabled=0
* vht_enabled=0
* ht_enabled=0
* channel_type=0
RATE[0] rate=10 flags=0x1
RATE[1] rate=20 flags=0x1
RATE[2] rate=55 flags=0x1
RATE[3] rate=110 flags=0x1
RATE[4] rate=60 flags=0x0
RATE[5] rate=90 flags=0x0
RATE[6] rate=120 flags=0x0
RATE[7] rate=180 flags=0x0
RATE[8] rate=240 flags=0x0
RATE[9] rate=360 flags=0x0
RATE[10] rate=480 flags=0x0
RATE[11] rate=540 flags=0x0
hostapd_setup_bss(hapd=0x1191060 (wln1), first=1)
nl80211: flush -> DEL_STATION wln1 (all)
Using interface wln1 with hwaddr 42:00:00:00:01:00 and ssid "TestFT"
wln1: RADIUS Authentication server 127.0.0.1:1812
connect[radius]: Network is unreachable
GMK - hexdump(len=32): [REMOVED]
Key Counter - hexdump(len=32): [REMOVED]
WPA: Delay group state machine start until Beacon frames have been configured
nl80211: Set beacon (beacon_set=0)
nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 42 00 00 00 01 00 42 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 02
nl80211: Beacon tail - hexdump(len=71): 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 01 00 0f ac 10 80 00 46 05 02 00 00 00 00 36 03 12 34 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: ifindex=10
nl80211: beacon_int=100
nl80211: beacon_rate=0
nl80211: rate_type=0
nl80211: dtim_period=2
nl80211: ssid=TestFT
* beacon_int=100
* dtim_period=2
nl80211: hidden SSID not in use
nl80211: privacy=2
nl80211: auth_algs=0x1
nl80211: wpa_version=0x2
nl80211: key_mgmt_suites=0x100001
nl80211: pairwise_ciphers=0x10
nl80211: group_cipher=0x10
nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01
nl80211: multicast to unicast disabled on interface wln1
wln1: Deauthenticate all stations at BSS start
nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3
nl80211: send_mlme - Use bss->freq=2417
nl80211: send_mlme -> send_frame_cmd
WPA: Start group state machine to set initial keys
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
GTK - hexdump(len=16): [REMOVED]
IGTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
nl80211: Set wln1 operstate 0->1 (UP)
netlink: Operstate: ifindex=10 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
nl80211: TX queue param set: queue=0 aifs=1 cw_min=3 cw_max=7 burst_time=15 --> res=0
nl80211: TX queue param set: queue=1 aifs=1 cw_min=7 cw_max=15 burst_time=30 --> res=0
nl80211: TX queue param set: queue=2 aifs=3 cw_min=15 cw_max=63 burst_time=0 --> res=0
nl80211: TX queue param set: queue=3 aifs=7 cw_min=15 cw_max=1023 burst_time=0 --> res=0
wln1: interface state UNINITIALIZED->ENABLED
wln1: AP-ENABLED
wln1: Setup of interface done.
Completing interface initialization
hostapd_setup_bss(hapd=0x1195c10 (), first=1)
: Deauthenticate all stations at BSS start
: interface state UNINITIALIZED->ENABLED
: AP-ENABLED
: Setup of interface done.
Using existing control interface directory.
RTM_NEWLINK: ifi_index=9 ifname=wln0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0)
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln0
nl80211: Frame TX status event A1=ff:ff:ff:ff:ff:ff stype=12 cookie=0x1 ack=0
wln0: Event TX_STATUS (16) received
mgmt::deauth cb
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln1
nl80211: Frame TX status event A1=ff:ff:ff:ff:ff:ff stype=12 cookie=0x1 ack=0
wln1: Event TX_STATUS (16) received
mgmt::deauth cb
RX ctrl_iface - hexdump_ascii(len=6):
41 54 54 41 43 48 ATTACH
CTRL_IFACE monitor attached /tmp/hostapd_1_0\x00
RX ctrl_iface - hexdump_ascii(len=6):
41 54 54 41 43 48 ATTACH
CTRL_IFACE monitor attached /tmp/hostapd_1_1\x00
RTM_NEWLINK: ifi_index=11 ifname=nlmon operstate=0 linkmode=0 ifi_family=0 ifi_flags=0x102c1 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK: ifi_index=1 ifname=lo operstate=0 linkmode=0 ifi_family=0 ifi_flags=0x10049 ([UP][RUNNING][LOWER_UP])
nl80211: Ignored event 16 (NL80211_CMD_STOP_AP) for foreign interface (ifindex 9 wdev 0x0)
nl80211: Drv Event 16 (NL80211_CMD_STOP_AP) received for wln0
wln0: Event INTERFACE_UNAVAILABLE (28) received
Interface wln0 is unavailable -- stopped
RTM_NEWLINK: ifi_index=9 ifname=wln0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1002 ()
nl80211: Interface down (wln0/wln0)
wln0: Event INTERFACE_DISABLED (26) received
wln0: INTERFACE-DISABLED
CTRL_IFACE monitor send /tmp/hostapd_1_0\x00
RTM_NEWLINK: ifi_index=9 ifname=wln0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1002 ()
l2_packet_receive - recvfrom: Network is down
l2_packet_receive - recvfrom: Network is down
RTM_NEWLINK: ifi_index=9 ifname=wln0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Interface up (wln0/wln0)
nl80211: Own MAC address on ifindex 9 (wln0) changed from 42:00:00:00:00:00 to 12:00:00:00:00:01
wln0: Event INTERFACE_ENABLED (25) received
wln0: INTERFACE-ENABLED
CTRL_IFACE monitor send /tmp/hostapd_1_0\x00
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
nl80211: Set beacon (beacon_set=0)
nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 42 00 00 00 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 01
nl80211: Beacon tail - hexdump(len=75): 2a 01 04 32 04 30 48 60 6c 30 1c 01 00 00 0f ac 04 01 00 00 0f ac 04 03 00 00 0f ac 03 00 0f ac 0e 00 0f ac 10 80 00 46 05 02 00 00 00 00 36 03 12 34 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: ifindex=9
nl80211: beacon_int=100
nl80211: beacon_rate=0
nl80211: rate_type=0
nl80211: dtim_period=2
nl80211: ssid=TestFT
* beacon_int=100
* dtim_period=2
nl80211: hidden SSID not in use
nl80211: privacy=2
nl80211: auth_algs=0x1
nl80211: wpa_version=0x2
nl80211: key_mgmt_suites=0x140020
nl80211: Not enough room for all AKM suites (num_suites=3 > NL80211_MAX_NR_AKM_SUITES)
nl80211: pairwise_ciphers=0x10
nl80211: group_cipher=0x10
nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01
nl80211: multicast to unicast disabled on interface wln0
RTM_NEWLINK: ifi_index=9 ifname=wln0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
nl80211: Drv Event 16 (NL80211_CMD_STOP_AP) received for wln1
wln1: Event INTERFACE_UNAVAILABLE (28) received
Interface wln1 is unavailable -- stopped
RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1002 ()
nl80211: Interface down (wln1/wln1)
wln1: Event INTERFACE_DISABLED (26) received
wln1: INTERFACE-DISABLED
CTRL_IFACE monitor send /tmp/hostapd_1_1\x00
l2_packet_receive - recvfrom: Network is down
l2_packet_receive - recvfrom: Network is down
RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1002 ()
RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING])
nl80211: Interface up (wln1/wln1)
nl80211: Own MAC address on ifindex 10 (wln1) changed from 42:00:00:00:01:00 to 12:00:00:00:00:02
wln1: Event INTERFACE_ENABLED (25) received
wln1: INTERFACE-ENABLED
CTRL_IFACE monitor send /tmp/hostapd_1_1\x00
wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
nl80211: Set beacon (beacon_set=0)
nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 42 00 00 00 01 00 42 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 02
nl80211: Beacon tail - hexdump(len=71): 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 01 00 0f ac 10 80 00 46 05 02 00 00 00 00 36 03 12 34 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: ifindex=10
nl80211: beacon_int=100
nl80211: beacon_rate=0
nl80211: rate_type=0
nl80211: dtim_period=2
nl80211: ssid=TestFT
* beacon_int=100
* dtim_period=2
nl80211: hidden SSID not in use
nl80211: privacy=2
nl80211: auth_algs=0x1
nl80211: wpa_version=0x2
nl80211: key_mgmt_suites=0x100001
nl80211: pairwise_ciphers=0x10
nl80211: group_cipher=0x10
nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01
nl80211: multicast to unicast disabled on interface wln1
RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RX ctrl_iface - hexdump_ascii(len=6):
52 45 4c 4f 41 44 RELOAD
Reload interface wln0
wln0: Flushing old station entries
nl80211: flush -> DEL_STATION wln0 (all)
wln0: Deauthenticate all stations
nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3
nl80211: send_mlme - Use bss->freq=2412
nl80211: send_mlme -> send_frame_cmd
nl80211: Frame command failed: ret=-22 (Invalid argument) (freq=2412 wait=0)
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
GTK - hexdump(len=16): [REMOVED]
IGTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
nl80211: Set beacon (beacon_set=1)
nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 42 00 00 00 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 01
nl80211: Beacon tail - hexdump(len=75): 2a 01 04 32 04 30 48 60 6c 30 1c 01 00 00 0f ac 04 01 00 00 0f ac 04 03 00 00 0f ac 03 00 0f ac 0e 00 0f ac 10 80 00 46 05 02 00 00 00 00 36 03 12 34 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: ifindex=9
nl80211: beacon_int=100
nl80211: beacon_rate=0
nl80211: rate_type=0
nl80211: dtim_period=2
nl80211: ssid=TestFT
* beacon_int=100
* dtim_period=2
nl80211: hidden SSID not in use
nl80211: privacy=2
nl80211: auth_algs=0x1
nl80211: wpa_version=0x2
nl80211: key_mgmt_suites=0x140020
nl80211: Not enough room for all AKM suites (num_suites=3 > NL80211_MAX_NR_AKM_SUITES)
nl80211: pairwise_ciphers=0x10
nl80211: group_cipher=0x10
nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01
nl80211: multicast to unicast disabled on interface wln0
Reconfigured interface wln0
RX ctrl_iface - hexdump_ascii(len=7):
44 49 53 41 42 4c 45 DISABLE
wln0: AP-DISABLED
CTRL_IFACE monitor send /tmp/hostapd_1_0\x00
wln0: Deauthenticate all stations
nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3
nl80211: send_mlme - Use bss->freq=2412
nl80211: send_mlme -> send_frame_cmd
nl80211: Frame command failed: ret=-22 (Invalid argument) (freq=2412 wait=0)
hostapd_free_hapd_data(wln0)
hostapd_deinit_driver: driver=0x521a80 drv_priv=0x11941d0 -> hapd_deinit
nl80211: deinit ifname=wln0 disabled_11b_rates=0
nl80211: Remove monitor interface: refcount=0
nl80211: Remove beacon (ifindex=9)
netlink: Operstate: ifindex=9 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
nl80211: Set mode ifindex 9 iftype 2 (STATION)
nl80211: Teardown AP(wln0) - device_ap_sme=0 use_monitor=0
nl80211: Unsubscribe mgmt frames handle 0x888888888991e3b9 (AP teardown)
hostapd_deinit_driver:bss[0]->drv_priv=0x11941d0
hostapd_cleanup_iface_partial(0x118cde0)
Interface wln0 disabled
wln0: interface state ENABLED->DISABLED
RX ctrl_iface - hexdump_ascii(len=6):
45 4e 41 42 4c 45 ENABLE
Enable interface wln0
nl80211: TDLS supported
nl80211: TDLS external setup
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:10
nl80211: Supported cipher 00-0f-ac:8
nl80211: Supported cipher 00-0f-ac:9
nl80211: Supported cipher 00-0f-ac:6
nl80211: Supported cipher 00-0f-ac:13
nl80211: Supported cipher 00-0f-ac:11
nl80211: Supported cipher 00-0f-ac:12
nl80211: Using driver-based off-channel TX
nl80211: Driver-advertised extended capabilities (default) - hexdump(len=8): 04 00 40 00 00 00 00 40
nl80211: Driver-advertised extended capabilities mask (default) - hexdump(len=8): 04 00 40 00 00 00 00 40
nl80211: Supported vendor command: vendor_id=0x1374 subcmd=1
nl80211: Supported vendor event: vendor_id=0x1374 subcmd=1
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: use P2P_DEVICE support
nl80211: key_mgmt=0x1ff0f enc=0xfef auth=0x7 flags=0xe4000d30fb5bfbe0 rrm_flags=0x10 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=4
nl80211: interface wln0 in phy rad0
nl80211: Set mode ifindex 9 iftype 3 (AP)
nl80211: Setup AP(wln0) - device_ap_sme=0 use_monitor=0
nl80211: Subscribe to mgmt frames with AP handle 0x11a7650
nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x11a7650 match= multicast=0
nl80211: Register frame type=0x0 (WLAN_FC_STYPE_ASSOC_REQ) nl_handle=0x11a7650 match= multicast=0
nl80211: Register frame type=0x20 (WLAN_FC_STYPE_REASSOC_REQ) nl_handle=0x11a7650 match= multicast=0
nl80211: Register frame type=0xa0 (WLAN_FC_STYPE_DISASSOC) nl_handle=0x11a7650 match= multicast=0
nl80211: Register frame type=0xc0 (WLAN_FC_STYPE_DEAUTH) nl_handle=0x11a7650 match= multicast=0
nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x11a7650 match= multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a7650 match=04 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a7650 match=0501 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a7650 match=0503 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a7650 match=0504 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a7650 match=06 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a7650 match=08 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a7650 match=09 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a7650 match=0a multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a7650 match=11 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a7650 match=7f multicast=0
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
nl80211: Add own interface ifindex 9 (ifidx_reason -1)
nl80211: if_indices[16]: 9(-1)
nl80211: Do not open EAPOL RX socket - using control port for RX
BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
ctrl_iface already exists!
nl80211: No channel number found for frequency 5900 MHz
nl80211: No channel number found for frequency 5905 MHz
nl80211: No channel number found for frequency 5910 MHz
nl80211: No channel number found for frequency 5915 MHz
nl80211: No channel number found for frequency 5920 MHz
nl80211: No channel number found for frequency 5925 MHz
nl80211: No channel number found for frequency 902 MHz
nl80211: No channel number found for frequency 903 MHz
nl80211: No channel number found for frequency 903 MHz
nl80211: No channel number found for frequency 904 MHz
nl80211: No channel number found for frequency 904 MHz
nl80211: No channel number found for frequency 905 MHz
nl80211: No channel number found for frequency 905 MHz
nl80211: No channel number found for frequency 906 MHz
nl80211: No channel number found for frequency 906 MHz
nl80211: No channel number found for frequency 907 MHz
nl80211: No channel number found for frequency 907 MHz
nl80211: No channel number found for frequency 908 MHz
nl80211: No channel number found for frequency 908 MHz
nl80211: No channel number found for frequency 909 MHz
nl80211: No channel number found for frequency 909 MHz
nl80211: No channel number found for frequency 910 MHz
nl80211: No channel number found for frequency 910 MHz
nl80211: No channel number found for frequency 911 MHz
nl80211: No channel number found for frequency 911 MHz
nl80211: No channel number found for frequency 912 MHz
nl80211: No channel number found for frequency 912 MHz
nl80211: No channel number found for frequency 913 MHz
nl80211: No channel number found for frequency 913 MHz
nl80211: No channel number found for frequency 914 MHz
nl80211: No channel number found for frequency 914 MHz
nl80211: No channel number found for frequency 915 MHz
nl80211: No channel number found for frequency 915 MHz
nl80211: No channel number found for frequency 916 MHz
nl80211: No channel number found for frequency 916 MHz
nl80211: No channel number found for frequency 917 MHz
nl80211: No channel number found for frequency 917 MHz
nl80211: No channel number found for frequency 918 MHz
nl80211: No channel number found for frequency 918 MHz
nl80211: No channel number found for frequency 919 MHz
nl80211: No channel number found for frequency 919 MHz
nl80211: No channel number found for frequency 920 MHz
nl80211: No channel number found for frequency 920 MHz
nl80211: No channel number found for frequency 921 MHz
nl80211: No channel number found for frequency 921 MHz
nl80211: No channel number found for frequency 922 MHz
nl80211: No channel number found for frequency 922 MHz
nl80211: No channel number found for frequency 923 MHz
nl80211: No channel number found for frequency 923 MHz
nl80211: No channel number found for frequency 924 MHz
nl80211: No channel number found for frequency 924 MHz
nl80211: No channel number found for frequency 925 MHz
nl80211: No channel number found for frequency 925 MHz
nl80211: No channel number found for frequency 926 MHz
nl80211: No channel number found for frequency 926 MHz
nl80211: No channel number found for frequency 927 MHz
nl80211: No channel number found for frequency 927 MHz
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Remove unsupported mode
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR]
nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR]
nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR]
Completing interface initialization
Mode: IEEE 802.11g Channel: 1 Frequency: 2412 MHz
DFS 0 channels required radar detection
nl80211: Set freq 2412 (ht_enabled=0, vht_enabled=0, he_enabled=0, bandwidth=20 MHz, cf1=2412 MHz, cf2=0 MHz)
* freq=2412
* he_enabled=0
* vht_enabled=0
* ht_enabled=0
* channel_type=0
RATE[0] rate=10 flags=0x1
RATE[1] rate=20 flags=0x1
RATE[2] rate=55 flags=0x1
RATE[3] rate=110 flags=0x1
RATE[4] rate=60 flags=0x0
RATE[5] rate=90 flags=0x0
RATE[6] rate=120 flags=0x0
RATE[7] rate=180 flags=0x0
RATE[8] rate=240 flags=0x0
RATE[9] rate=360 flags=0x0
RATE[10] rate=480 flags=0x0
RATE[11] rate=540 flags=0x0
hostapd_setup_bss(hapd=0x118e3a0 (wln0), first=1)
nl80211: flush -> DEL_STATION wln0 (all)
Using interface wln0 with hwaddr 12:00:00:00:00:01 and ssid "TestFT"
wln0: RADIUS Authentication server 127.0.0.1:1812
RADIUS local address: 127.0.0.1:52175
GMK - hexdump(len=32): [REMOVED]
Key Counter - hexdump(len=32): [REMOVED]
WPA: Delay group state machine start until Beacon frames have been configured
nl80211: Set beacon (beacon_set=0)
nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 12 00 00 00 00 01 12 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 01
nl80211: Beacon tail - hexdump(len=75): 2a 01 04 32 04 30 48 60 6c 30 1c 01 00 00 0f ac 04 01 00 00 0f ac 04 03 00 00 0f ac 03 00 0f ac 0e 00 0f ac 10 80 00 46 05 02 00 00 00 00 36 03 12 34 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: ifindex=9
nl80211: beacon_int=100
nl80211: beacon_rate=0
nl80211: rate_type=0
nl80211: dtim_period=2
nl80211: ssid=TestFT
* beacon_int=100
* dtim_period=2
nl80211: hidden SSID not in use
nl80211: privacy=2
nl80211: auth_algs=0x1
nl80211: wpa_version=0x2
nl80211: key_mgmt_suites=0x140020
nl80211: Not enough room for all AKM suites (num_suites=3 > NL80211_MAX_NR_AKM_SUITES)
nl80211: pairwise_ciphers=0x10
nl80211: group_cipher=0x10
nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01
nl80211: multicast to unicast disabled on interface wln0
wln0: Deauthenticate all stations at BSS start
nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3
nl80211: send_mlme - Use bss->freq=2412
nl80211: send_mlme -> send_frame_cmd
WPA: Start group state machine to set initial keys
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
GTK - hexdump(len=16): [REMOVED]
IGTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
nl80211: Set wln0 operstate 0->1 (UP)
netlink: Operstate: ifindex=9 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
nl80211: TX queue param set: queue=0 aifs=1 cw_min=3 cw_max=7 burst_time=15 --> res=0
nl80211: TX queue param set: queue=1 aifs=1 cw_min=7 cw_max=15 burst_time=30 --> res=0
nl80211: TX queue param set: queue=2 aifs=3 cw_min=15 cw_max=63 burst_time=0 --> res=0
nl80211: TX queue param set: queue=3 aifs=7 cw_min=15 cw_max=1023 burst_time=0 --> res=0
wln0: interface state DISABLED->ENABLED
wln0: AP-ENABLED
CTRL_IFACE monitor send /tmp/hostapd_1_0\x00
wln0: Setup of interface done.
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln0
nl80211: Frame TX status event A1=ff:ff:ff:ff:ff:ff stype=12 cookie=0x2 ack=0
wln0: Event TX_STATUS (16) received
mgmt::deauth cb
RTM_NEWLINK: ifi_index=9 ifname=wln0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RX ctrl_iface - hexdump_ascii(len=6):
52 45 4c 4f 41 44 RELOAD
Reload interface wln1
wln1: Flushing old station entries
nl80211: flush -> DEL_STATION wln1 (all)
wln1: Deauthenticate all stations
nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3
nl80211: send_mlme - Use bss->freq=2417
nl80211: send_mlme -> send_frame_cmd
nl80211: Frame command failed: ret=-22 (Invalid argument) (freq=2417 wait=0)
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
GTK - hexdump(len=16): [REMOVED]
IGTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
nl80211: Set beacon (beacon_set=1)
nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 42 00 00 00 01 00 42 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 02
nl80211: Beacon tail - hexdump(len=71): 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 01 00 0f ac 10 80 00 46 05 02 00 00 00 00 36 03 12 34 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: ifindex=10
nl80211: beacon_int=100
nl80211: beacon_rate=0
nl80211: rate_type=0
nl80211: dtim_period=2
nl80211: ssid=TestFT
* beacon_int=100
* dtim_period=2
nl80211: hidden SSID not in use
nl80211: privacy=2
nl80211: auth_algs=0x1
nl80211: wpa_version=0x2
nl80211: key_mgmt_suites=0x100001
nl80211: pairwise_ciphers=0x10
nl80211: group_cipher=0x10
nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01
nl80211: multicast to unicast disabled on interface wln1
Reconfigured interface wln1
RX ctrl_iface - hexdump_ascii(len=7):
44 49 53 41 42 4c 45 DISABLE
wln1: AP-DISABLED
CTRL_IFACE monitor send /tmp/hostapd_1_1\x00
wln1: Deauthenticate all stations
nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3
nl80211: send_mlme - Use bss->freq=2417
nl80211: send_mlme -> send_frame_cmd
nl80211: Frame command failed: ret=-22 (Invalid argument) (freq=2417 wait=0)
hostapd_free_hapd_data(wln1)
hostapd_deinit_driver: driver=0x521a80 drv_priv=0x119dd70 -> hapd_deinit
nl80211: deinit ifname=wln1 disabled_11b_rates=0
nl80211: Remove monitor interface: refcount=0
nl80211: Remove beacon (ifindex=10)
netlink: Operstate: ifindex=10 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
nl80211: Set mode ifindex 10 iftype 2 (STATION)
nl80211: Teardown AP(wln1) - device_ap_sme=0 use_monitor=0
nl80211: Unsubscribe mgmt frames handle 0x8888888889915799 (AP teardown)
hostapd_deinit_driver:bss[0]->drv_priv=0x119dd70
hostapd_cleanup_iface_partial(0x118fb60)
Interface wln1 disabled
wln1: interface state ENABLED->DISABLED
RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
wln1: Event INTERFACE_STATUS (5) received
Unknown event 5
RX ctrl_iface - hexdump_ascii(len=6):
45 4e 41 42 4c 45 ENABLE
Enable interface wln1
nl80211: TDLS supported
nl80211: TDLS external setup
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:10
nl80211: Supported cipher 00-0f-ac:8
nl80211: Supported cipher 00-0f-ac:9
nl80211: Supported cipher 00-0f-ac:6
nl80211: Supported cipher 00-0f-ac:13
nl80211: Supported cipher 00-0f-ac:11
nl80211: Supported cipher 00-0f-ac:12
nl80211: Using driver-based off-channel TX
nl80211: Driver-advertised extended capabilities (default) - hexdump(len=8): 04 00 40 00 00 00 00 40
nl80211: Driver-advertised extended capabilities mask (default) - hexdump(len=8): 04 00 40 00 00 00 00 40
nl80211: Supported vendor command: vendor_id=0x1374 subcmd=1
nl80211: Supported vendor event: vendor_id=0x1374 subcmd=1
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: use P2P_DEVICE support
nl80211: key_mgmt=0x1ff0f enc=0xfef auth=0x7 flags=0xe4000d30fb5bfbe0 rrm_flags=0x10 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=4
nl80211: interface wln1 in phy rad1
nl80211: Set mode ifindex 10 iftype 3 (AP)
nl80211: Setup AP(wln1) - device_ap_sme=0 use_monitor=0
nl80211: Subscribe to mgmt frames with AP handle 0x119df10
nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x119df10 match= multicast=0
nl80211: Register frame type=0x0 (WLAN_FC_STYPE_ASSOC_REQ) nl_handle=0x119df10 match= multicast=0
nl80211: Register frame type=0x20 (WLAN_FC_STYPE_REASSOC_REQ) nl_handle=0x119df10 match= multicast=0
nl80211: Register frame type=0xa0 (WLAN_FC_STYPE_DISASSOC) nl_handle=0x119df10 match= multicast=0
nl80211: Register frame type=0xc0 (WLAN_FC_STYPE_DEAUTH) nl_handle=0x119df10 match= multicast=0
nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x119df10 match= multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=04 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=0501 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=0503 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=0504 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=06 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=08 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=09 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=0a multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=11 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=7f multicast=0
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
nl80211: Add own interface ifindex 10 (ifidx_reason -1)
nl80211: if_indices[16]: 10(-1)
nl80211: Do not open EAPOL RX socket - using control port for RX
BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
ctrl_iface already exists!
nl80211: No channel number found for frequency 5900 MHz
nl80211: No channel number found for frequency 5905 MHz
nl80211: No channel number found for frequency 5910 MHz
nl80211: No channel number found for frequency 5915 MHz
nl80211: No channel number found for frequency 5920 MHz
nl80211: No channel number found for frequency 5925 MHz
nl80211: No channel number found for frequency 902 MHz
nl80211: No channel number found for frequency 903 MHz
nl80211: No channel number found for frequency 903 MHz
nl80211: No channel number found for frequency 904 MHz
nl80211: No channel number found for frequency 904 MHz
nl80211: No channel number found for frequency 905 MHz
nl80211: No channel number found for frequency 905 MHz
nl80211: No channel number found for frequency 906 MHz
nl80211: No channel number found for frequency 906 MHz
nl80211: No channel number found for frequency 907 MHz
nl80211: No channel number found for frequency 907 MHz
nl80211: No channel number found for frequency 908 MHz
nl80211: No channel number found for frequency 908 MHz
nl80211: No channel number found for frequency 909 MHz
nl80211: No channel number found for frequency 909 MHz
nl80211: No channel number found for frequency 910 MHz
nl80211: No channel number found for frequency 910 MHz
nl80211: No channel number found for frequency 911 MHz
nl80211: No channel number found for frequency 911 MHz
nl80211: No channel number found for frequency 912 MHz
nl80211: No channel number found for frequency 912 MHz
nl80211: No channel number found for frequency 913 MHz
nl80211: No channel number found for frequency 913 MHz
nl80211: No channel number found for frequency 914 MHz
nl80211: No channel number found for frequency 914 MHz
nl80211: No channel number found for frequency 915 MHz
nl80211: No channel number found for frequency 915 MHz
nl80211: No channel number found for frequency 916 MHz
nl80211: No channel number found for frequency 916 MHz
nl80211: No channel number found for frequency 917 MHz
nl80211: No channel number found for frequency 917 MHz
nl80211: No channel number found for frequency 918 MHz
nl80211: No channel number found for frequency 918 MHz
nl80211: No channel number found for frequency 919 MHz
nl80211: No channel number found for frequency 919 MHz
nl80211: No channel number found for frequency 920 MHz
nl80211: No channel number found for frequency 920 MHz
nl80211: No channel number found for frequency 921 MHz
nl80211: No channel number found for frequency 921 MHz
nl80211: No channel number found for frequency 922 MHz
nl80211: No channel number found for frequency 922 MHz
nl80211: No channel number found for frequency 923 MHz
nl80211: No channel number found for frequency 923 MHz
nl80211: No channel number found for frequency 924 MHz
nl80211: No channel number found for frequency 924 MHz
nl80211: No channel number found for frequency 925 MHz
nl80211: No channel number found for frequency 925 MHz
nl80211: No channel number found for frequency 926 MHz
nl80211: No channel number found for frequency 926 MHz
nl80211: No channel number found for frequency 927 MHz
nl80211: No channel number found for frequency 927 MHz
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Remove unsupported mode
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR]
nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR]
nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR]
Completing interface initialization
Mode: IEEE 802.11g Channel: 2 Frequency: 2417 MHz
DFS 0 channels required radar detection
nl80211: Set freq 2417 (ht_enabled=0, vht_enabled=0, he_enabled=0, bandwidth=20 MHz, cf1=2417 MHz, cf2=0 MHz)
* freq=2417
* he_enabled=0
* vht_enabled=0
* ht_enabled=0
* channel_type=0
RATE[0] rate=10 flags=0x1
RATE[1] rate=20 flags=0x1
RATE[2] rate=55 flags=0x1
RATE[3] rate=110 flags=0x1
RATE[4] rate=60 flags=0x0
RATE[5] rate=90 flags=0x0
RATE[6] rate=120 flags=0x0
RATE[7] rate=180 flags=0x0
RATE[8] rate=240 flags=0x0
RATE[9] rate=360 flags=0x0
RATE[10] rate=480 flags=0x0
RATE[11] rate=540 flags=0x0
hostapd_setup_bss(hapd=0x1191060 (wln1), first=1)
nl80211: flush -> DEL_STATION wln1 (all)
Using interface wln1 with hwaddr 12:00:00:00:00:02 and ssid "TestFT"
wln1: RADIUS Authentication server 127.0.0.1:1812
RADIUS local address: 127.0.0.1:57736
GMK - hexdump(len=32): [REMOVED]
Key Counter - hexdump(len=32): [REMOVED]
WPA: Delay group state machine start until Beacon frames have been configured
nl80211: Set beacon (beacon_set=0)
nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 12 00 00 00 00 02 12 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 02
nl80211: Beacon tail - hexdump(len=71): 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 01 00 0f ac 10 80 00 46 05 02 00 00 00 00 36 03 12 34 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: ifindex=10
nl80211: beacon_int=100
nl80211: beacon_rate=0
nl80211: rate_type=0
nl80211: dtim_period=2
nl80211: ssid=TestFT
* beacon_int=100
* dtim_period=2
nl80211: hidden SSID not in use
nl80211: privacy=2
nl80211: auth_algs=0x1
nl80211: wpa_version=0x2
nl80211: key_mgmt_suites=0x100001
nl80211: pairwise_ciphers=0x10
nl80211: group_cipher=0x10
nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01
nl80211: multicast to unicast disabled on interface wln1
wln1: Deauthenticate all stations at BSS start
nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3
nl80211: send_mlme - Use bss->freq=2417
nl80211: send_mlme -> send_frame_cmd
WPA: Start group state machine to set initial keys
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
GTK - hexdump(len=16): [REMOVED]
IGTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
nl80211: Set wln1 operstate 0->1 (UP)
netlink: Operstate: ifindex=10 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
nl80211: TX queue param set: queue=0 aifs=1 cw_min=3 cw_max=7 burst_time=15 --> res=0
nl80211: TX queue param set: queue=1 aifs=1 cw_min=7 cw_max=15 burst_time=30 --> res=0
nl80211: TX queue param set: queue=2 aifs=3 cw_min=15 cw_max=63 burst_time=0 --> res=0
nl80211: TX queue param set: queue=3 aifs=7 cw_min=15 cw_max=1023 burst_time=0 --> res=0
wln1: interface state DISABLED->ENABLED
wln1: AP-ENABLED
CTRL_IFACE monitor send /tmp/hostapd_1_1\x00
wln1: Setup of interface done.
RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln1
nl80211: Frame TX status event A1=ff:ff:ff:ff:ff:ff stype=12 cookie=0x2 ack=0
wln1: Event TX_STATUS (16) received
mgmt::deauth cb
RX ctrl_iface - hexdump_ascii(len=87):
53 45 54 5f 4e 45 49 47 48 42 4f 52 20 31 32 3a SET_NEIGHBOR 12:
30 30 3a 30 30 3a 30 30 3a 30 30 3a 30 32 20 73 00:00:00:00:02 s
73 69 64 3d 22 54 65 73 74 46 54 22 20 6e 72 3d sid="TestFT" nr=
31 32 30 30 30 30 30 30 30 30 30 32 38 66 30 30 1200000000028f00
30 30 30 30 35 31 30 32 30 36 30 36 30 33 30 30 0000510206060300
30 30 30 30 20 20 20 0000
RX ctrl_iface - hexdump_ascii(len=87):
53 45 54 5f 4e 45 49 47 48 42 4f 52 20 31 32 3a SET_NEIGHBOR 12:
30 30 3a 30 30 3a 30 30 3a 30 30 3a 30 31 20 73 00:00:00:00:01 s
73 69 64 3d 22 54 65 73 74 46 54 22 20 6e 72 3d sid="TestFT" nr=
31 32 30 30 30 30 30 30 30 30 30 31 38 66 30 30 1200000000018f00
30 30 30 30 35 31 30 31 30 36 30 36 30 33 30 30 0000510106060300
30 30 30 30 20 20 20 0000
RTM_DELLINK: ifi_index=8 ifname=wlan2 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1002 ()
RTM_DELLINK: Interface 'wlan2' removed
RTM_NEWLINK: ifi_index=12 ifname=wlan2 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1002 ()
RTM_NEWLINK: ifi_index=12 ifname=wlan2 operstate=0 linkmode=0 ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING])
RTM_NEWLINK: ifi_index=12 ifname=wlan2 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK: ifi_index=12 ifname=wlan2 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
RX ctrl_iface - hexdump_ascii(len=36):
53 45 54 20 77 70 61 5f 6b 65 79 5f 6d 67 6d 74 SET wpa_key_mgmt
20 57 50 41 2d 45 41 50 20 46 49 4c 53 2d 53 48 WPA-EAP FILS-SH
41 32 35 36 A256
CTRL_IFACE SET 'wpa_key_mgmt'='WPA-EAP FILS-SHA256'
RX ctrl_iface - hexdump_ascii(len=6):
52 45 4c 4f 41 44 RELOAD
Reload interface wln0
wln0: Flushing old station entries
nl80211: flush -> DEL_STATION wln0 (all)
wln0: Deauthenticate all stations
nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3
nl80211: send_mlme - Use bss->freq=2412
nl80211: send_mlme -> send_frame_cmd
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
GTK - hexdump(len=16): [REMOVED]
IGTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
nl80211: Set beacon (beacon_set=1)
nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 12 00 00 00 00 01 12 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 01
nl80211: Beacon tail - hexdump(len=66): 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 01 00 0f ac 0e 80 00 46 05 02 00 00 00 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: ifindex=9
nl80211: beacon_int=100
nl80211: beacon_rate=0
nl80211: rate_type=0
nl80211: dtim_period=2
nl80211: ssid=TestFT
* beacon_int=100
* dtim_period=2
nl80211: hidden SSID not in use
nl80211: privacy=2
nl80211: auth_algs=0x1
nl80211: wpa_version=0x2
nl80211: key_mgmt_suites=0x40001
nl80211: pairwise_ciphers=0x10
nl80211: group_cipher=0x10
nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01
nl80211: multicast to unicast disabled on interface wln0
Reconfigured interface wln0
nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0)
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln0
nl80211: Frame TX status event A1=ff:ff:ff:ff:ff:ff stype=12 cookie=0x3 ack=0
wln0: Event TX_STATUS (16) received
mgmt::deauth cb
RX ctrl_iface - hexdump_ascii(len=7):
44 49 53 41 42 4c 45 DISABLE
wln0: AP-DISABLED
CTRL_IFACE monitor send /tmp/hostapd_1_0\x00
wln0: Deauthenticate all stations
nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3
nl80211: send_mlme - Use bss->freq=2412
nl80211: send_mlme -> send_frame_cmd
hostapd_free_hapd_data(wln0)
hostapd_deinit_driver: driver=0x521a80 drv_priv=0x119d710 -> hapd_deinit
nl80211: deinit ifname=wln0 disabled_11b_rates=0
nl80211: Remove monitor interface: refcount=0
nl80211: Remove beacon (ifindex=9)
netlink: Operstate: ifindex=9 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
nl80211: Set mode ifindex 9 iftype 2 (STATION)
nl80211: Teardown AP(wln0) - device_ap_sme=0 use_monitor=0
nl80211: Unsubscribe mgmt frames handle 0x888888888992fed9 (AP teardown)
hostapd_deinit_driver:bss[0]->drv_priv=0x119d710
hostapd_cleanup_iface_partial(0x118cde0)
Interface wln0 disabled
wln0: interface state ENABLED->DISABLED
nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0)
RX ctrl_iface - hexdump_ascii(len=6):
45 4e 41 42 4c 45 ENABLE
Enable interface wln0
nl80211: TDLS supported
nl80211: TDLS external setup
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:10
nl80211: Supported cipher 00-0f-ac:8
nl80211: Supported cipher 00-0f-ac:9
nl80211: Supported cipher 00-0f-ac:6
nl80211: Supported cipher 00-0f-ac:13
nl80211: Supported cipher 00-0f-ac:11
nl80211: Supported cipher 00-0f-ac:12
nl80211: Using driver-based off-channel TX
nl80211: Driver-advertised extended capabilities (default) - hexdump(len=8): 04 00 40 00 00 00 00 40
nl80211: Driver-advertised extended capabilities mask (default) - hexdump(len=8): 04 00 40 00 00 00 00 40
nl80211: Supported vendor command: vendor_id=0x1374 subcmd=1
nl80211: Supported vendor event: vendor_id=0x1374 subcmd=1
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: use P2P_DEVICE support
nl80211: key_mgmt=0x1ff0f enc=0xfef auth=0x7 flags=0xe4000d30fb5bfbe0 rrm_flags=0x10 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=4
nl80211: interface wln0 in phy rad0
nl80211: Set mode ifindex 9 iftype 3 (AP)
nl80211: Setup AP(wln0) - device_ap_sme=0 use_monitor=0
nl80211: Subscribe to mgmt frames with AP handle 0x11a2510
nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x11a2510 match= multicast=0
nl80211: Register frame type=0x0 (WLAN_FC_STYPE_ASSOC_REQ) nl_handle=0x11a2510 match= multicast=0
nl80211: Register frame type=0x20 (WLAN_FC_STYPE_REASSOC_REQ) nl_handle=0x11a2510 match= multicast=0
nl80211: Register frame type=0xa0 (WLAN_FC_STYPE_DISASSOC) nl_handle=0x11a2510 match= multicast=0
nl80211: Register frame type=0xc0 (WLAN_FC_STYPE_DEAUTH) nl_handle=0x11a2510 match= multicast=0
nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x11a2510 match= multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a2510 match=04 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a2510 match=0501 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a2510 match=0503 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a2510 match=0504 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a2510 match=06 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a2510 match=08 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a2510 match=09 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a2510 match=0a multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a2510 match=11 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a2510 match=7f multicast=0
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
nl80211: Add own interface ifindex 9 (ifidx_reason -1)
nl80211: if_indices[16]: 9(-1)
nl80211: Do not open EAPOL RX socket - using control port for RX
BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
ctrl_iface already exists!
nl80211: No channel number found for frequency 5900 MHz
nl80211: No channel number found for frequency 5905 MHz
nl80211: No channel number found for frequency 5910 MHz
nl80211: No channel number found for frequency 5915 MHz
nl80211: No channel number found for frequency 5920 MHz
nl80211: No channel number found for frequency 5925 MHz
nl80211: No channel number found for frequency 902 MHz
nl80211: No channel number found for frequency 903 MHz
nl80211: No channel number found for frequency 903 MHz
nl80211: No channel number found for frequency 904 MHz
nl80211: No channel number found for frequency 904 MHz
nl80211: No channel number found for frequency 905 MHz
nl80211: No channel number found for frequency 905 MHz
nl80211: No channel number found for frequency 906 MHz
nl80211: No channel number found for frequency 906 MHz
nl80211: No channel number found for frequency 907 MHz
nl80211: No channel number found for frequency 907 MHz
nl80211: No channel number found for frequency 908 MHz
nl80211: No channel number found for frequency 908 MHz
nl80211: No channel number found for frequency 909 MHz
nl80211: No channel number found for frequency 909 MHz
nl80211: No channel number found for frequency 910 MHz
nl80211: No channel number found for frequency 910 MHz
nl80211: No channel number found for frequency 911 MHz
nl80211: No channel number found for frequency 911 MHz
nl80211: No channel number found for frequency 912 MHz
nl80211: No channel number found for frequency 912 MHz
nl80211: No channel number found for frequency 913 MHz
nl80211: No channel number found for frequency 913 MHz
nl80211: No channel number found for frequency 914 MHz
nl80211: No channel number found for frequency 914 MHz
nl80211: No channel number found for frequency 915 MHz
nl80211: No channel number found for frequency 915 MHz
nl80211: No channel number found for frequency 916 MHz
nl80211: No channel number found for frequency 916 MHz
nl80211: No channel number found for frequency 917 MHz
nl80211: No channel number found for frequency 917 MHz
nl80211: No channel number found for frequency 918 MHz
nl80211: No channel number found for frequency 918 MHz
nl80211: No channel number found for frequency 919 MHz
nl80211: No channel number found for frequency 919 MHz
nl80211: No channel number found for frequency 920 MHz
nl80211: No channel number found for frequency 920 MHz
nl80211: No channel number found for frequency 921 MHz
nl80211: No channel number found for frequency 921 MHz
nl80211: No channel number found for frequency 922 MHz
nl80211: No channel number found for frequency 922 MHz
nl80211: No channel number found for frequency 923 MHz
nl80211: No channel number found for frequency 923 MHz
nl80211: No channel number found for frequency 924 MHz
nl80211: No channel number found for frequency 924 MHz
nl80211: No channel number found for frequency 925 MHz
nl80211: No channel number found for frequency 925 MHz
nl80211: No channel number found for frequency 926 MHz
nl80211: No channel number found for frequency 926 MHz
nl80211: No channel number found for frequency 927 MHz
nl80211: No channel number found for frequency 927 MHz
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Remove unsupported mode
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR]
nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR]
nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR]
Completing interface initialization
Mode: IEEE 802.11g Channel: 1 Frequency: 2412 MHz
DFS 0 channels required radar detection
nl80211: Set freq 2412 (ht_enabled=0, vht_enabled=0, he_enabled=0, bandwidth=20 MHz, cf1=2412 MHz, cf2=0 MHz)
* freq=2412
* he_enabled=0
* vht_enabled=0
* ht_enabled=0
* channel_type=0
RATE[0] rate=10 flags=0x1
RATE[1] rate=20 flags=0x1
RATE[2] rate=55 flags=0x1
RATE[3] rate=110 flags=0x1
RATE[4] rate=60 flags=0x0
RATE[5] rate=90 flags=0x0
RATE[6] rate=120 flags=0x0
RATE[7] rate=180 flags=0x0
RATE[8] rate=240 flags=0x0
RATE[9] rate=360 flags=0x0
RATE[10] rate=480 flags=0x0
RATE[11] rate=540 flags=0x0
hostapd_setup_bss(hapd=0x118e3a0 (wln0), first=1)
nl80211: flush -> DEL_STATION wln0 (all)
Using interface wln0 with hwaddr 12:00:00:00:00:01 and ssid "TestFT"
wln0: RADIUS Authentication server 127.0.0.1:1812
RADIUS local address: 127.0.0.1:47133
GMK - hexdump(len=32): [REMOVED]
Key Counter - hexdump(len=32): [REMOVED]
WPA: Delay group state machine start until Beacon frames have been configured
nl80211: Set beacon (beacon_set=0)
nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 12 00 00 00 00 01 12 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 01
nl80211: Beacon tail - hexdump(len=66): 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 01 00 0f ac 0e 80 00 46 05 02 00 00 00 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: ifindex=9
nl80211: beacon_int=100
nl80211: beacon_rate=0
nl80211: rate_type=0
nl80211: dtim_period=2
nl80211: ssid=TestFT
* beacon_int=100
* dtim_period=2
nl80211: hidden SSID not in use
nl80211: privacy=2
nl80211: auth_algs=0x1
nl80211: wpa_version=0x2
nl80211: key_mgmt_suites=0x40001
nl80211: pairwise_ciphers=0x10
nl80211: group_cipher=0x10
nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01
nl80211: multicast to unicast disabled on interface wln0
wln0: Deauthenticate all stations at BSS start
nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3
nl80211: send_mlme - Use bss->freq=2412
nl80211: send_mlme -> send_frame_cmd
WPA: Start group state machine to set initial keys
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
GTK - hexdump(len=16): [REMOVED]
IGTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
nl80211: Set wln0 operstate 0->1 (UP)
netlink: Operstate: ifindex=9 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
nl80211: TX queue param set: queue=0 aifs=1 cw_min=3 cw_max=7 burst_time=15 --> res=0
nl80211: TX queue param set: queue=1 aifs=1 cw_min=7 cw_max=15 burst_time=30 --> res=0
nl80211: TX queue param set: queue=2 aifs=3 cw_min=15 cw_max=63 burst_time=0 --> res=0
nl80211: TX queue param set: queue=3 aifs=7 cw_min=15 cw_max=1023 burst_time=0 --> res=0
wln0: interface state DISABLED->ENABLED
wln0: AP-ENABLED
CTRL_IFACE monitor send /tmp/hostapd_1_0\x00
wln0: Setup of interface done.
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln0
nl80211: Frame TX status event A1=ff:ff:ff:ff:ff:ff stype=12 cookie=0x5 ack=0
wln0: Event TX_STATUS (16) received
mgmt::deauth cb
RTM_NEWLINK: ifi_index=9 ifname=wln0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RX ctrl_iface - hexdump_ascii(len=36):
53 45 54 20 77 70 61 5f 6b 65 79 5f 6d 67 6d 74 SET wpa_key_mgmt
20 57 50 41 2d 45 41 50 20 46 49 4c 53 2d 53 48 WPA-EAP FILS-SH
41 32 35 36 A256
CTRL_IFACE SET 'wpa_key_mgmt'='WPA-EAP FILS-SHA256'
RX ctrl_iface - hexdump_ascii(len=6):
52 45 4c 4f 41 44 RELOAD
Reload interface wln1
wln1: Flushing old station entries
nl80211: flush -> DEL_STATION wln1 (all)
wln1: Deauthenticate all stations
nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3
nl80211: send_mlme - Use bss->freq=2417
nl80211: send_mlme -> send_frame_cmd
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
GTK - hexdump(len=16): [REMOVED]
IGTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
nl80211: Set beacon (beacon_set=1)
nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 12 00 00 00 00 02 12 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 02
nl80211: Beacon tail - hexdump(len=66): 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 01 00 0f ac 0e 80 00 46 05 02 00 00 00 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: ifindex=10
nl80211: beacon_int=100
nl80211: beacon_rate=0
nl80211: rate_type=0
nl80211: dtim_period=2
nl80211: ssid=TestFT
* beacon_int=100
* dtim_period=2
nl80211: hidden SSID not in use
nl80211: privacy=2
nl80211: auth_algs=0x1
nl80211: wpa_version=0x2
nl80211: key_mgmt_suites=0x40001
nl80211: pairwise_ciphers=0x10
nl80211: group_cipher=0x10
nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01
nl80211: multicast to unicast disabled on interface wln1
Reconfigured interface wln1
nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 10 wdev 0x0)
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln1
nl80211: Frame TX status event A1=ff:ff:ff:ff:ff:ff stype=12 cookie=0x3 ack=0
wln1: Event TX_STATUS (16) received
mgmt::deauth cb
RX ctrl_iface - hexdump_ascii(len=7):
44 49 53 41 42 4c 45 DISABLE
wln1: AP-DISABLED
CTRL_IFACE monitor send /tmp/hostapd_1_1\x00
wln1: Deauthenticate all stations
nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3
nl80211: send_mlme - Use bss->freq=2417
nl80211: send_mlme -> send_frame_cmd
hostapd_free_hapd_data(wln1)
hostapd_deinit_driver: driver=0x521a80 drv_priv=0x11a92d0 -> hapd_deinit
nl80211: deinit ifname=wln1 disabled_11b_rates=0
nl80211: Remove monitor interface: refcount=0
nl80211: Remove beacon (ifindex=10)
netlink: Operstate: ifindex=10 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
nl80211: Set mode ifindex 10 iftype 2 (STATION)
nl80211: Teardown AP(wln1) - device_ap_sme=0 use_monitor=0
nl80211: Unsubscribe mgmt frames handle 0x8888888889915799 (AP teardown)
hostapd_deinit_driver:bss[0]->drv_priv=0x11a92d0
hostapd_cleanup_iface_partial(0x118fb60)
Interface wln1 disabled
wln1: interface state ENABLED->DISABLED
nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 10 wdev 0x0)
RX ctrl_iface - hexdump_ascii(len=6):
45 4e 41 42 4c 45 ENABLE
Enable interface wln1
nl80211: TDLS supported
nl80211: TDLS external setup
nl80211: Supported cipher 00-0f-ac:1
nl80211: Supported cipher 00-0f-ac:5
nl80211: Supported cipher 00-0f-ac:2
nl80211: Supported cipher 00-0f-ac:4
nl80211: Supported cipher 00-0f-ac:10
nl80211: Supported cipher 00-0f-ac:8
nl80211: Supported cipher 00-0f-ac:9
nl80211: Supported cipher 00-0f-ac:6
nl80211: Supported cipher 00-0f-ac:13
nl80211: Supported cipher 00-0f-ac:11
nl80211: Supported cipher 00-0f-ac:12
nl80211: Using driver-based off-channel TX
nl80211: Driver-advertised extended capabilities (default) - hexdump(len=8): 04 00 40 00 00 00 00 40
nl80211: Driver-advertised extended capabilities mask (default) - hexdump(len=8): 04 00 40 00 00 00 00 40
nl80211: Supported vendor command: vendor_id=0x1374 subcmd=1
nl80211: Supported vendor event: vendor_id=0x1374 subcmd=1
nl80211: Use separate P2P group interface (driver advertised support)
nl80211: use P2P_DEVICE support
nl80211: key_mgmt=0x1ff0f enc=0xfef auth=0x7 flags=0xe4000d30fb5bfbe0 rrm_flags=0x10 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=4
nl80211: interface wln1 in phy rad1
nl80211: Set mode ifindex 10 iftype 3 (AP)
nl80211: Setup AP(wln1) - device_ap_sme=0 use_monitor=0
nl80211: Subscribe to mgmt frames with AP handle 0x119ea50
nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x119ea50 match= multicast=0
nl80211: Register frame type=0x0 (WLAN_FC_STYPE_ASSOC_REQ) nl_handle=0x119ea50 match= multicast=0
nl80211: Register frame type=0x20 (WLAN_FC_STYPE_REASSOC_REQ) nl_handle=0x119ea50 match= multicast=0
nl80211: Register frame type=0xa0 (WLAN_FC_STYPE_DISASSOC) nl_handle=0x119ea50 match= multicast=0
nl80211: Register frame type=0xc0 (WLAN_FC_STYPE_DEAUTH) nl_handle=0x119ea50 match= multicast=0
nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x119ea50 match= multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119ea50 match=04 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119ea50 match=0501 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119ea50 match=0503 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119ea50 match=0504 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119ea50 match=06 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119ea50 match=08 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119ea50 match=09 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119ea50 match=0a multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119ea50 match=11 multicast=0
nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119ea50 match=7f multicast=0
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
nl80211: Add own interface ifindex 10 (ifidx_reason -1)
nl80211: if_indices[16]: 10(-1)
nl80211: Do not open EAPOL RX socket - using control port for RX
BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
ctrl_iface already exists!
nl80211: No channel number found for frequency 5900 MHz
nl80211: No channel number found for frequency 5905 MHz
nl80211: No channel number found for frequency 5910 MHz
nl80211: No channel number found for frequency 5915 MHz
nl80211: No channel number found for frequency 5920 MHz
nl80211: No channel number found for frequency 5925 MHz
nl80211: No channel number found for frequency 902 MHz
nl80211: No channel number found for frequency 903 MHz
nl80211: No channel number found for frequency 903 MHz
nl80211: No channel number found for frequency 904 MHz
nl80211: No channel number found for frequency 904 MHz
nl80211: No channel number found for frequency 905 MHz
nl80211: No channel number found for frequency 905 MHz
nl80211: No channel number found for frequency 906 MHz
nl80211: No channel number found for frequency 906 MHz
nl80211: No channel number found for frequency 907 MHz
nl80211: No channel number found for frequency 907 MHz
nl80211: No channel number found for frequency 908 MHz
nl80211: No channel number found for frequency 908 MHz
nl80211: No channel number found for frequency 909 MHz
nl80211: No channel number found for frequency 909 MHz
nl80211: No channel number found for frequency 910 MHz
nl80211: No channel number found for frequency 910 MHz
nl80211: No channel number found for frequency 911 MHz
nl80211: No channel number found for frequency 911 MHz
nl80211: No channel number found for frequency 912 MHz
nl80211: No channel number found for frequency 912 MHz
nl80211: No channel number found for frequency 913 MHz
nl80211: No channel number found for frequency 913 MHz
nl80211: No channel number found for frequency 914 MHz
nl80211: No channel number found for frequency 914 MHz
nl80211: No channel number found for frequency 915 MHz
nl80211: No channel number found for frequency 915 MHz
nl80211: No channel number found for frequency 916 MHz
nl80211: No channel number found for frequency 916 MHz
nl80211: No channel number found for frequency 917 MHz
nl80211: No channel number found for frequency 917 MHz
nl80211: No channel number found for frequency 918 MHz
nl80211: No channel number found for frequency 918 MHz
nl80211: No channel number found for frequency 919 MHz
nl80211: No channel number found for frequency 919 MHz
nl80211: No channel number found for frequency 920 MHz
nl80211: No channel number found for frequency 920 MHz
nl80211: No channel number found for frequency 921 MHz
nl80211: No channel number found for frequency 921 MHz
nl80211: No channel number found for frequency 922 MHz
nl80211: No channel number found for frequency 922 MHz
nl80211: No channel number found for frequency 923 MHz
nl80211: No channel number found for frequency 923 MHz
nl80211: No channel number found for frequency 924 MHz
nl80211: No channel number found for frequency 924 MHz
nl80211: No channel number found for frequency 925 MHz
nl80211: No channel number found for frequency 925 MHz
nl80211: No channel number found for frequency 926 MHz
nl80211: No channel number found for frequency 926 MHz
nl80211: No channel number found for frequency 927 MHz
nl80211: No channel number found for frequency 927 MHz
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz 20 mBm
nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR)
nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
nl80211: 57240-63720 @ 2160 MHz 0 mBm
nl80211: Remove unsupported mode
nl80211: Added 802.11b mode based on 802.11g information
nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR]
nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR]
nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR]
Completing interface initialization
Mode: IEEE 802.11g Channel: 2 Frequency: 2417 MHz
DFS 0 channels required radar detection
nl80211: Set freq 2417 (ht_enabled=0, vht_enabled=0, he_enabled=0, bandwidth=20 MHz, cf1=2417 MHz, cf2=0 MHz)
* freq=2417
* he_enabled=0
* vht_enabled=0
* ht_enabled=0
* channel_type=0
RATE[0] rate=10 flags=0x1
RATE[1] rate=20 flags=0x1
RATE[2] rate=55 flags=0x1
RATE[3] rate=110 flags=0x1
RATE[4] rate=60 flags=0x0
RATE[5] rate=90 flags=0x0
RATE[6] rate=120 flags=0x0
RATE[7] rate=180 flags=0x0
RATE[8] rate=240 flags=0x0
RATE[9] rate=360 flags=0x0
RATE[10] rate=480 flags=0x0
RATE[11] rate=540 flags=0x0
hostapd_setup_bss(hapd=0x1191060 (wln1), first=1)
nl80211: flush -> DEL_STATION wln1 (all)
Using interface wln1 with hwaddr 12:00:00:00:00:02 and ssid "TestFT"
wln1: RADIUS Authentication server 127.0.0.1:1812
RADIUS local address: 127.0.0.1:42289
GMK - hexdump(len=32): [REMOVED]
Key Counter - hexdump(len=32): [REMOVED]
WPA: Delay group state machine start until Beacon frames have been configured
nl80211: Set beacon (beacon_set=0)
nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 12 00 00 00 00 02 12 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 02
nl80211: Beacon tail - hexdump(len=66): 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 01 00 0f ac 0e 80 00 46 05 02 00 00 00 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: ifindex=10
nl80211: beacon_int=100
nl80211: beacon_rate=0
nl80211: rate_type=0
nl80211: dtim_period=2
nl80211: ssid=TestFT
* beacon_int=100
* dtim_period=2
nl80211: hidden SSID not in use
nl80211: privacy=2
nl80211: auth_algs=0x1
nl80211: wpa_version=0x2
nl80211: key_mgmt_suites=0x40001
nl80211: pairwise_ciphers=0x10
nl80211: group_cipher=0x10
nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01
nl80211: multicast to unicast disabled on interface wln1
wln1: Deauthenticate all stations at BSS start
nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3
nl80211: send_mlme - Use bss->freq=2417
nl80211: send_mlme -> send_frame_cmd
WPA: Start group state machine to set initial keys
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
GTK - hexdump(len=16): [REMOVED]
IGTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
nl80211: Set wln1 operstate 0->1 (UP)
netlink: Operstate: ifindex=10 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
nl80211: TX queue param set: queue=0 aifs=1 cw_min=3 cw_max=7 burst_time=15 --> res=0
nl80211: TX queue param set: queue=1 aifs=1 cw_min=7 cw_max=15 burst_time=30 --> res=0
nl80211: TX queue param set: queue=2 aifs=3 cw_min=15 cw_max=63 burst_time=0 --> res=0
nl80211: TX queue param set: queue=3 aifs=7 cw_min=15 cw_max=1023 burst_time=0 --> res=0
wln1: interface state DISABLED->ENABLED
wln1: AP-ENABLED
CTRL_IFACE monitor send /tmp/hostapd_1_1\x00
wln1: Setup of interface done.
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln1
nl80211: Frame TX status event A1=ff:ff:ff:ff:ff:ff stype=12 cookie=0x5 ack=0
wln1: Event TX_STATUS (16) received
mgmt::deauth cb
RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0)
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln0
nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=02:00:00:00:02:00 bssid=ff:ff:ff:ff:ff:ff freq=2412 ssi_signal=-30 fc=0x40 seq_ctrl=0x310 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=109
nl80211: send_mlme - da=02:00:00:00:02:00 noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
nl80211: send_mlme - Use bss->freq=2412
nl80211: send_mlme -> send_frame_cmd
nl80211: Ignored event 34 (NL80211_CMD_NEW_SCAN_RESULTS) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 34 (NL80211_CMD_NEW_SCAN_RESULTS) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 34 (NL80211_CMD_NEW_SCAN_RESULTS) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 34 (NL80211_CMD_NEW_SCAN_RESULTS) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0)
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln1
nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=02:00:00:00:02:00 bssid=ff:ff:ff:ff:ff:ff freq=2417 ssi_signal=-30 fc=0x40 seq_ctrl=0x8520 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=109
nl80211: send_mlme - da=02:00:00:00:02:00 noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
nl80211: send_mlme - Use bss->freq=2417
nl80211: send_mlme -> send_frame_cmd
nl80211: Ignored event 34 (NL80211_CMD_NEW_SCAN_RESULTS) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 34 (NL80211_CMD_NEW_SCAN_RESULTS) for foreign interface (ifindex 12 wdev 0x0)
RX ctrl_iface - hexdump_ascii(len=9):
53 54 41 2d 46 49 52 53 54 STA-FIRST
RX ctrl_iface - hexdump_ascii(len=9):
53 54 41 2d 4e 45 58 54 20 STA-NEXT
RX ctrl_iface - hexdump_ascii(len=9):
53 54 41 2d 46 49 52 53 54 STA-FIRST
RX ctrl_iface - hexdump_ascii(len=9):
53 54 41 2d 4e 45 58 54 20 STA-NEXT
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln0
nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=02:00:00:00:02:00 bssid=ff:ff:ff:ff:ff:ff freq=2412 ssi_signal=-30 fc=0x40 seq_ctrl=0x0 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=103
nl80211: send_mlme - da=02:00:00:00:02:00 noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
nl80211: send_mlme - Use bss->freq=2412
nl80211: send_mlme -> send_frame_cmd
nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0)
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln0
nl80211: Frame TX status event A1=02:00:00:00:02:00 stype=5 cookie=0x6 ack=1
wln0: Event TX_STATUS (16) received
nl80211: Ignored event 34 (NL80211_CMD_NEW_SCAN_RESULTS) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 34 (NL80211_CMD_NEW_SCAN_RESULTS) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 19 (NL80211_CMD_NEW_STATION) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 19 (NL80211_CMD_NEW_STATION) for foreign interface (ifindex 12 wdev 0x0)
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln0
nl80211: RX frame da=12:00:00:00:00:01 sa=02:00:00:00:02:00 bssid=12:00:00:00:00:01 freq=2412 ssi_signal=-30 fc=0xb0 seq_ctrl=0x10 stype=11 (WLAN_FC_STYPE_AUTH) len=30
wln0: Event RX_MGMT (18) received
mgmt::auth
authentication: STA=02:00:00:00:02:00 auth_alg=0 auth_transaction=1 status_code=0 wep=0 seq_ctrl=0x10
New STA
ap_sta_add: register ap_handle_timer timeout for 02:00:00:00:02:00 (300 seconds - ap_max_inactivity)
nl80211: sta_remove -> DEL_STATION wln0 02:00:00:00:02:00 --> -2 (No such file or directory)
nl80211: Add STA 02:00:00:00:02:00
* supported rates - hexdump(len=4): 02 04 0b 16
* capability=0x0
* aid=1 (UNASSOC_STA workaround)
* listen_interval=0
* flags set=0x0 mask=0xa0
wln0: STA 02:00:00:00:02:00 IEEE 802.11: authentication OK (open system)
wln0: STA 02:00:00:00:02:00 MLME: MLME-AUTHENTICATE.indication(02:00:00:00:02:00, OPEN_SYSTEM)
wln0: STA 02:00:00:00:02:00 MLME: MLME-DELETEKEYS.request(02:00:00:00:02:00)
authentication reply: STA=02:00:00:00:02:00 auth_alg=0 auth_transaction=2 resp=0 (IE len=0) (dbg=handle-auth)
nl80211: send_mlme - da=02:00:00:00:02:00 noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xb0 (WLAN_FC_STYPE_AUTH) nlmode=3
nl80211: send_mlme - Use bss->freq=2412
nl80211: send_mlme -> send_frame_cmd
nl80211: Ignored event 19 (NL80211_CMD_NEW_STATION) for foreign interface (ifindex 9 wdev 0x0)
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wln0
nl80211: New station 02:00:00:00:02:00
nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0)
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln0
nl80211: Frame TX status event A1=02:00:00:00:02:00 stype=11 cookie=0x7 ack=1
wln0: Event TX_STATUS (16) received
mgmt::auth cb
wln0: STA 02:00:00:00:02:00 IEEE 802.11: authenticated
nl80211: Set STA flags - ifname=wln0 addr=02:00:00:00:02:00 total_flags=0x20 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: Ignored event 37 (NL80211_CMD_AUTHENTICATE) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 37 (NL80211_CMD_AUTHENTICATE) for foreign interface (ifindex 12 wdev 0x0)
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln0
nl80211: RX frame da=12:00:00:00:00:01 sa=02:00:00:00:02:00 bssid=12:00:00:00:00:01 freq=2412 ssi_signal=-30 fc=0x0 seq_ctrl=0x20 stype=0 (WLAN_FC_STYPE_ASSOC_REQ) len=97
wln0: Event RX_MGMT (18) received
mgmt::assoc_req
association request: STA=02:00:00:00:02:00 capab_info=0x1431 listen_interval=5 seq_ctrl=0x20
new AID 1
wln0: STA 02:00:00:00:02:00 IEEE 802.11: association OK (aid 1)
Add associated STA 02:00:00:00:02:00 (added_unassoc=1 auth_alg=0 ft_over_ds=0 reassoc=0 authorized=0 ft_tk=0 fils_tk=0)
nl80211: Set STA 02:00:00:00:02:00
* supported rates - hexdump(len=12): 02 04 0b 16 0c 12 18 24 30 48 60 6c
* capability=0x1431
* aid=1
* listen_interval=5
* flags set=0xb4 mask=0xb4
nl80211: send_mlme - da=02:00:00:00:02:00 noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0x10 (WLAN_FC_STYPE_ASSOC_RESP) nlmode=3
nl80211: send_mlme - Use bss->freq=2412
nl80211: send_mlme -> send_frame_cmd
nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0)
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln0
nl80211: Frame TX status event A1=02:00:00:00:02:00 stype=1 cookie=0x8 ack=1
wln0: Event TX_STATUS (16) received
mgmt::assoc_resp cb
wln0: STA 02:00:00:00:02:00 IEEE 802.11: associated (aid 1)
wln0: STA 02:00:00:00:02:00 MLME: MLME-ASSOCIATE.indication(02:00:00:00:02:00)
wln0: STA 02:00:00:00:02:00 MLME: MLME-DELETEKEYS.request(02:00:00:00:02:00)
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=0 addr=0x11b3f30 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
addr=02:00:00:00:02:00
pairwise key
nl80211: Set STA flags - ifname=wln0 addr=02:00:00:00:02:00 total_flags=0x6c flags_or=0xc flags_and=0xfffffffd authorized=0
wln0: STA 02:00:00:00:02:00 WPA: event 1 notification
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=0 addr=0x11b3f30 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
addr=02:00:00:00:02:00
pairwise key
wln0: STA 02:00:00:00:02:00 IEEE 802.1X: start authentication
EAP: Server state machine created
IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state IDLE
IEEE 802.1X: 02:00:00:00:02:00 CTRL_DIR entering state FORCE_BOTH
wln0: STA 02:00:00:00:02:00 WPA: start authentication
WPA: 02:00:00:00:02:00 WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=0 addr=0x11b3f30 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
addr=02:00:00:00:02:00
pairwise key
WPA: 02:00:00:00:02:00 WPA_PTK_GROUP entering state IDLE
WPA: 02:00:00:00:02:00 WPA_PTK entering state AUTHENTICATION
WPA: 02:00:00:00:02:00 WPA_PTK entering state AUTHENTICATION2
WPA: Re-initialize GMK/Counter on first station
GMK - hexdump(len=32): [REMOVED]
Key Counter - hexdump(len=32): [REMOVED]
GTK - hexdump(len=16): [REMOVED]
IGTK - hexdump(len=16): [REMOVED]
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
WPA: Assign ANonce - hexdump(len=32): e9 3d 69 8e dc de 3c 99 77 00 92 d2 3a 5b 32 e9 7f dc b8 ff b8 6d b1 bc cc e7 1c 0e 6a 04 bc a8
wln0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 02:00:00:00:02:00 (300 seconds - ap_max_inactivity)
IEEE 802.1X: 02:00:00:00:02:00 AUTH_PAE entering state DISCONNECTED
nl80211: Set STA flags - ifname=wln0 addr=02:00:00:00:02:00 total_flags=0x6c flags_or=0x0 flags_and=0xfffffffe authorized=0
wln0: STA 02:00:00:00:02:00 IEEE 802.1X: unauthorizing port
IEEE 802.1X: 02:00:00:00:02:00 AUTH_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
wln0: CTRL-EVENT-EAP-STARTED 02:00:00:00:02:00
CTRL_IFACE monitor send /tmp/hostapd_1_0\x00
EAP: EAP entering state SELECT_ACTION
EAP: getDecision: no identity known yet -> CONTINUE
EAP: EAP entering state PROPOSE_METHOD
EAP: getNextMethod: vendor 0 type 1
wln0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
CTRL_IFACE monitor send /tmp/hostapd_1_0\x00
EAP: EAP entering state METHOD_REQUEST
EAP: building EAP-Request: Identifier 89
EAP: EAP entering state SEND_REQUEST
EAP: EAP entering state IDLE
EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
IEEE 802.1X: 02:00:00:00:02:00 AUTH_PAE entering state CONNECTING
IEEE 802.1X: 02:00:00:00:02:00 AUTH_PAE entering state AUTHENTICATING
IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state REQUEST
wln0: STA 02:00:00:00:02:00 IEEE 802.1X: Sending EAP Packet (identifier 89)
nl80211: Send over control port dest=02:00:00:00:02:00 proto=0x888e len=9 no_encrypt=1
nl80211: tx_control_port cookie=0x9
RTM_NEWLINK: ifi_index=12 ifname=wlan2 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Ignored event 38 (NL80211_CMD_ASSOCIATE) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 38 (NL80211_CMD_ASSOCIATE) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 46 (NL80211_CMD_CONNECT) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 46 (NL80211_CMD_CONNECT) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0)
nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) received for wln0
nl80211: Control port TX status (ack=1), cookie=9
wln0: Event EAPOL_TX_STATUS (37) received
IEEE 802.1X: 02:00:00:00:02:00 TX status - version=2 type=0 length=5 - ack=1
nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wln0
wln0: Event EAPOL_RX (23) received
IEEE 802.1X: 24 bytes from 02:00:00:00:02:00
IEEE 802.1X: version=2 type=0 length=20
EAP: code=2 (response) identifier=89 length=20
wln0: STA 02:00:00:00:02:00 IEEE 802.1X: received EAP packet (code=2 id=89 len=20) from STA: EAP Response-Identity (1)
IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state RESPONSE
EAP: EAP entering state RECEIVED
EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=89 respMethod=1 respVendor=0 respVendorMethod=0
EAP: EAP entering state INTEGRITY_CHECK
EAP: EAP entering state METHOD_RESPONSE
EAP-Identity: Peer identity - hexdump_ascii(len=15):
70 77 64 40 65 78 61 6d 70 6c 65 2e 63 6f 6d pwd at example.com
EAP: EAP entering state SELECT_ACTION
EAP: getDecision: -> PASSTHROUGH
EAP: EAP entering state INITIALIZE_PASSTHROUGH
EAP: EAP entering state AAA_REQUEST
EAP: EAP entering state AAA_IDLE
wln0: STA 02:00:00:00:02:00 IEEE 802.1X: STA identity 'pwd at example.com'
Encapsulating EAP message into a RADIUS packet
wln0: RADIUS Sending RADIUS message to authentication server
wln0: RADIUS Next RADIUS client retransmit in 3 seconds
nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0)
RADIUS SRV: Received 224 bytes from 127.0.0.1:47133
RADIUS SRV: Creating a new session
RADIUS SRV: Matching user entry found
RADIUS SRV: Calling-Station-Id: 02:00:00:00:02:00
RADIUS SRV: [0x0 127.0.0.1] New session created
EAP: Server state machine created
RADIUS SRV: New session 0x0 initialized
EAP: EAP entering state INITIALIZE
EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=89 respMethod=1 respVendor=0 respVendorMethod=0
: CTRL-EVENT-EAP-STARTED 00:00:00:00:00:00
EAP: EAP entering state PICK_UP_METHOD
: CTRL-EVENT-EAP-PROPOSED-METHOD method=1
EAP: EAP entering state METHOD_RESPONSE
EAP-Identity: Peer identity - hexdump_ascii(len=15):
70 77 64 40 65 78 61 6d 70 6c 65 2e 63 6f 6d pwd at example.com
RADIUS SRV: [0x0 127.0.0.1] EAP: EAP-Response/Identity 'pwd at example.com'
EAP: EAP entering state SELECT_ACTION
EAP: getDecision: another method available -> CONTINUE
EAP: EAP entering state PROPOSE_METHOD
EAP: getNextMethod: vendor 0 type 52
EAP-pwd: Selected group number 19
: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=52
RADIUS SRV: [0x0 127.0.0.1] EAP: Propose EAP method vendor=0 method=52
EAP: EAP entering state METHOD_REQUEST
EAP: building EAP-Request: Identifier 90
EAP-pwd: ID/Request
EAP-pwd (server): password - hexdump(len=8): [REMOVED]
EAP: EAP entering state SEND_REQUEST
EAP: EAP entering state IDLE
EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
RADIUS SRV: Reply to 127.0.0.1:47133
wln0: RADIUS Received 67 bytes from RADIUS server
wln0: RADIUS Received RADIUS message
wln0: STA 02:00:00:00:02:00 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
RADIUS packet matching with station 02:00:00:00:02:00
wln0: STA 02:00:00:00:02:00 IEEE 802.1X: decapsulated EAP packet (code=1 id=90 len=21) from RADIUS server: EAP-Request-PWD (52)
EAP: EAP entering state AAA_RESPONSE
EAP: getId: id=90
EAP: EAP entering state SEND_REQUEST2
EAP: EAP entering state IDLE2
EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state REQUEST
wln0: STA 02:00:00:00:02:00 IEEE 802.1X: Sending EAP Packet (identifier 90)
nl80211: Send over control port dest=02:00:00:00:02:00 proto=0x888e len=25 no_encrypt=1
nl80211: tx_control_port cookie=0xa
nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0)
nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) received for wln0
nl80211: Control port TX status (ack=1), cookie=10
wln0: Event EAPOL_TX_STATUS (37) received
IEEE 802.1X: 02:00:00:00:02:00 TX status - version=2 type=0 length=21 - ack=1
nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wln0
wln0: Event EAPOL_RX (23) received
IEEE 802.1X: 34 bytes from 02:00:00:00:02:00
IEEE 802.1X: version=2 type=0 length=30
EAP: code=2 (response) identifier=90 length=30
wln0: STA 02:00:00:00:02:00 IEEE 802.1X: received EAP packet (code=2 id=90 len=30) from STA: EAP Response-PWD (52)
IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state RESPONSE
EAP: EAP entering state RECEIVED2
EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=90 respMethod=52 respVendor=0 respVendorMethod=0
EAP: EAP entering state AAA_REQUEST
EAP: EAP entering state AAA_IDLE
Encapsulating EAP message into a RADIUS packet
Copied RADIUS State Attribute
wln0: RADIUS Sending RADIUS message to authentication server
wln0: RADIUS Next RADIUS client retransmit in 3 seconds
nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0)
RADIUS SRV: Received 240 bytes from 127.0.0.1:47133
RADIUS SRV: Request for session 0x0
EAP: EAP entering state RECEIVED
EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=90 respMethod=52 respVendor=0 respVendorMethod=0
EAP: EAP entering state INTEGRITY_CHECK
EAP-pwd: Received frame: exch = 1, len = 25
EAP: EAP entering state METHOD_RESPONSE
EAP-PWD (server): peer sent id of - hexdump_ascii(len=15):
70 77 64 40 65 78 61 6d 70 6c 65 2e 63 6f 6d pwd at example.com
EAP-pwd: provisioned group 19
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: x_candidate - hexdump(len=32): [REMOVED]
EAP-pwd: found a PWE in 01 tries
EAP-PWD (server): computed 256 bit PWE...
EAP-pwd: PWD-ID-Req -> PWD-Commit-Req
EAP: EAP entering state METHOD_REQUEST
EAP: building EAP-Request: Identifier 91
EAP-pwd: Commit/Request
EAP: EAP entering state SEND_REQUEST
EAP: EAP entering state IDLE
EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
RADIUS SRV: Reply to 127.0.0.1:47133
wln0: RADIUS Received 148 bytes from RADIUS server
wln0: RADIUS Received RADIUS message
wln0: STA 02:00:00:00:02:00 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.01 sec
RADIUS packet matching with station 02:00:00:00:02:00
wln0: STA 02:00:00:00:02:00 IEEE 802.1X: decapsulated EAP packet (code=1 id=91 len=102) from RADIUS server: EAP-Request-PWD (52)
EAP: EAP entering state AAA_RESPONSE
EAP: getId: id=91
EAP: EAP entering state SEND_REQUEST2
EAP: EAP entering state IDLE2
EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state REQUEST
wln0: STA 02:00:00:00:02:00 IEEE 802.1X: Sending EAP Packet (identifier 91)
nl80211: Send over control port dest=02:00:00:00:02:00 proto=0x888e len=106 no_encrypt=1
nl80211: tx_control_port cookie=0xb
nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0)
nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) received for wln0
nl80211: Control port TX status (ack=1), cookie=11
wln0: Event EAPOL_TX_STATUS (37) received
IEEE 802.1X: 02:00:00:00:02:00 TX status - version=2 type=0 length=102 - ack=1
nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0)
nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wln0
wln0: Event EAPOL_RX (23) received
IEEE 802.1X: 106 bytes from 02:00:00:00:02:00
IEEE 802.1X: version=2 type=0 length=102
EAP: code=2 (response) identifier=91 length=102
wln0: STA 02:00:00:00:02:00 IEEE 802.1X: received EAP packet (code=2 id=91 len=102) from STA: EAP Response-PWD (52)
IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state RESPONSE
EAP: EAP entering state RECEIVED2
EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=91 respMethod=52 respVendor=0 respVendorMethod=0
EAP: EAP entering state AAA_REQUEST
EAP: EAP entering state AAA_IDLE
Encapsulating EAP message into a RADIUS packet
Copied RADIUS State Attribute
wln0: RADIUS Sending RADIUS message to authentication server
wln0: RADIUS Next RADIUS client retransmit in 3 seconds
RADIUS SRV: Received 312 bytes from 127.0.0.1:47133
RADIUS SRV: Request for session 0x0
EAP: EAP entering state RECEIVED
EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=91 respMethod=52 respVendor=0 respVendorMethod=0
EAP: EAP entering state INTEGRITY_CHECK
EAP-pwd: Received frame: exch = 2, len = 97
EAP: EAP entering state METHOD_RESPONSE
EAP-pwd: Received commit response
EAP-pwd: PWD-Commit-Req -> PWD-Confirm-Req
EAP: EAP entering state METHOD_REQUEST
EAP: building EAP-Request: Identifier 92
EAP-pwd: Confirm/Request
EAP: EAP entering state SEND_REQUEST
EAP: EAP entering state IDLE
EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
RADIUS SRV: Reply to 127.0.0.1:47133
wln0: RADIUS Received 84 bytes from RADIUS server
wln0: RADIUS Received RADIUS message
wln0: STA 02:00:00:00:02:00 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
RADIUS packet matching with station 02:00:00:00:02:00
wln0: STA 02:00:00:00:02:00 IEEE 802.1X: decapsulated EAP packet (code=1 id=92 len=38) from RADIUS server: EAP-Request-PWD (52)
EAP: EAP entering state AAA_RESPONSE
EAP: getId: id=92
EAP: EAP entering state SEND_REQUEST2
EAP: EAP entering state IDLE2
EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state REQUEST
wln0: STA 02:00:00:00:02:00 IEEE 802.1X: Sending EAP Packet (identifier 92)
nl80211: Send over control port dest=02:00:00:00:02:00 proto=0x888e len=42 no_encrypt=1
nl80211: tx_control_port cookie=0xc
nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0)
nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) received for wln0
nl80211: Control port TX status (ack=1), cookie=12
wln0: Event EAPOL_TX_STATUS (37) received
IEEE 802.1X: 02:00:00:00:02:00 TX status - version=2 type=0 length=38 - ack=1
nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wln0
wln0: Event EAPOL_RX (23) received
IEEE 802.1X: 42 bytes from 02:00:00:00:02:00
IEEE 802.1X: version=2 type=0 length=38
EAP: code=2 (response) identifier=92 length=38
wln0: STA 02:00:00:00:02:00 IEEE 802.1X: received EAP packet (code=2 id=92 len=38) from STA: EAP Response-PWD (52)
IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state RESPONSE
EAP: EAP entering state RECEIVED2
EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=92 respMethod=52 respVendor=0 respVendorMethod=0
EAP: EAP entering state AAA_REQUEST
EAP: EAP entering state AAA_IDLE
Encapsulating EAP message into a RADIUS packet
Copied RADIUS State Attribute
wln0: RADIUS Sending RADIUS message to authentication server
wln0: RADIUS Next RADIUS client retransmit in 3 seconds
nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0)
RADIUS SRV: Received 248 bytes from 127.0.0.1:47133
RADIUS SRV: Request for session 0x0
EAP: EAP entering state RECEIVED
EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=92 respMethod=52 respVendor=0 respVendorMethod=0
EAP: EAP entering state INTEGRITY_CHECK
EAP-pwd: Received frame: exch = 3, len = 33
EAP: EAP entering state METHOD_RESPONSE
EAP-pwd (server): confirm verified
EAP-pwd: PWD-Confirm-Req -> SUCCESS
EAP: Session-Id - hexdump(len=33): 34 4d 7d c6 98 31 f0 51 65 c5 a6 90 c2 c6 6e 0e d6 b5 a0 ed 7f c0 bb 02 92 58 cd d3 3c 7c de a3 3b
EAP: EMSK - hexdump(len=64): [REMOVED]
EAP: EMSKname - hexdump(len=8): 8d 48 e6 37 1a 5b ad 7e
EAP: ERP rRK - hexdump(len=64): [REMOVED]
EAP: ERP rIK - hexdump(len=64): [REMOVED]
EAP: Stored ERP keys 8d48e6371a5bad7e at example.com
EAP: EAP entering state SELECT_ACTION
EAP: getDecision: method succeeded -> SUCCESS
EAP: EAP entering state SUCCESS
EAP: Building EAP-Success (id=92)
: CTRL-EVENT-EAP-SUCCESS 00:00:00:00:00:00
RADIUS SRV: [0x0 127.0.0.1] EAP authentication succeeded
RADIUS SRV: Reply to 127.0.0.1:47133
RADIUS SRV: [0x0 127.0.0.1] Sending Access-Accept
RADIUS SRV: Removing completed session 0x0 after timeout
wln0: RADIUS Received 195 bytes from RADIUS server
wln0: RADIUS Received RADIUS message
wln0: STA 02:00:00:00:02:00 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
RADIUS packet matching with station 02:00:00:00:02:00
MS-MPPE-Send-Key - hexdump(len=32): [REMOVED]
MS-MPPE-Recv-Key - hexdump(len=32): [REMOVED]
EAP-Key Name - hexdump(len=33): 34 4d 7d c6 98 31 f0 51 65 c5 a6 90 c2 c6 6e 0e d6 b5 a0 ed 7f c0 bb 02 92 58 cd d3 3c 7c de a3 3b
wln0: STA 02:00:00:00:02:00 IEEE 802.1X: decapsulated EAP packet (code=3 id=92 len=4) from RADIUS server: EAP Success
EAP: EAP entering state SUCCESS2
wln0: CTRL-EVENT-EAP-SUCCESS2 02:00:00:00:02:00
CTRL_IFACE monitor send /tmp/hostapd_1_0\x00
IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state SUCCESS
wln0: STA 02:00:00:00:02:00 IEEE 802.1X: Sending EAP Packet (identifier 92)
nl80211: Send over control port dest=02:00:00:00:02:00 proto=0x888e len=8 no_encrypt=1
nl80211: tx_control_port cookie=0xd
IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state IDLE
WPA: 02:00:00:00:02:00 WPA_PTK entering state INITPMK
WPA: PMK from EAPOL state machine (MSK len=64 PMK len=32)
WPA: 02:00:00:00:02:00 WPA_PTK entering state PTKSTART
wln0: STA 02:00:00:00:02:00 WPA: sending 1/4 msg of 4-Way Handshake
RSN: Derive PMKID using HMAC-SHA-1
RSN: Derived PMKID - hexdump(len=16): 6f e8 67 59 8c 89 16 02 4d a8 75 50 43 74 e8 9f
RSN: Message 1/4 PMKID derived from PMK - hexdump(len=16): 6f e8 67 59 8c 89 16 02 4d a8 75 50 43 74 e8 9f
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=22 keyidx=0 encr=0)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
nl80211: Send over control port dest=02:00:00:00:02:00 proto=0x888e len=121 no_encrypt=1
nl80211: tx_control_port cookie=0xe
WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0)
nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) received for wln0
nl80211: Control port TX status (ack=1), cookie=13
wln0: Event EAPOL_TX_STATUS (37) received
IEEE 802.1X: 02:00:00:00:02:00 TX status - version=2 type=0 length=4 - ack=1
nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0)
nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) received for wln0
nl80211: Control port TX status (ack=1), cookie=14
wln0: Event EAPOL_TX_STATUS (37) received
IEEE 802.1X: 02:00:00:00:02:00 TX status - version=2 type=3 length=117 - ack=1
WPA: EAPOL-Key TX status for STA 02:00:00:00:02:00 ack=1
WPA: Increase initial EAPOL-Key 1/4 timeout by 1000 ms because of acknowledged frame
nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wln0
wln0: Event EAPOL_RX (23) received
IEEE 802.1X: 121 bytes from 02:00:00:00:02:00
IEEE 802.1X: version=2 type=3 length=117
WPA: Received EAPOL-Key from 02:00:00:00:02:00 key_info=0x10a type=2 mic_len=16 key_data_length=22
WPA: Received Key Nonce - hexdump(len=32): 56 dc ba 09 76 53 29 45 6e 20 2d 2d fa 2b 1a fc a9 db 1b ad 27 37 5e 6a 23 24 c2 2d 1f 57 8d d2
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wln0: STA 02:00:00:00:02:00 WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 02:00:00:00:02:00 WPA_PTK entering state PTKCALCNEGOTIATING
WPA: PTK derivation using PRF(SHA1)
WPA: PTK derivation - A1=12:00:00:00:00:01 A2=02:00:00:00:02:00
WPA: Nonce1 - hexdump(len=32): e9 3d 69 8e dc de 3c 99 77 00 92 d2 3a 5b 32 e9 7f dc b8 ff b8 6d b1 bc cc e7 1c 0e 6a 04 bc a8
WPA: Nonce2 - hexdump(len=32): 56 dc ba 09 76 53 29 45 6e 20 2d 2d fa 2b 1a fc a9 db 1b ad 27 37 5e 6a 23 24 c2 2d 1f 57 8d d2
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 80 00
WPA: 02:00:00:00:02:00 WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 02:00:00:00:02:00 WPA_PTK entering state PTKINITNEGOTIATING
wln0: STA 02:00:00:00:02:00 WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=80 keyidx=0 encr=1)
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
Plaintext EAPOL-Key Key Data - hexdump(len=88): [REMOVED]
WPA: Encrypt Key Data using AES-WRAP (KEK length 16)
WPA: EAPOL-Key MIC using HMAC-SHA1
nl80211: Send over control port dest=02:00:00:00:02:00 proto=0x888e len=187 no_encrypt=1
nl80211: tx_control_port cookie=0xf
WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1)
nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0)
nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) received for wln0
nl80211: Control port TX status (ack=1), cookie=15
wln0: Event EAPOL_TX_STATUS (37) received
IEEE 802.1X: 02:00:00:00:02:00 TX status - version=2 type=3 length=183 - ack=1
WPA: EAPOL-Key TX status for STA 02:00:00:00:02:00 ack=1
nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wln0
wln0: Event EAPOL_RX (23) received
IEEE 802.1X: 99 bytes from 02:00:00:00:02:00
IEEE 802.1X: version=2 type=3 length=95
WPA: Received EAPOL-Key from 02:00:00:00:02:00 key_info=0x30a type=2 mic_len=16 key_data_length=0
WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wln0: STA 02:00:00:00:02:00 WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: EAPOL-Key MIC using HMAC-SHA1
WPA: 02:00:00:00:02:00 WPA_PTK entering state PTKINITDONE
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=3 addr=0x11b3f30 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
addr=02:00:00:00:02:00
pairwise key
WPA: Start PTK rekeying timer for 02:00:00:00:02:00 (30 seconds)
wln0: STA 02:00:00:00:02:00 WPA: pairwise key handshake completed (RSN)
wln0: EAPOL-4WAY-HS-COMPLETED 02:00:00:00:02:00
CTRL_IFACE monitor send /tmp/hostapd_1_0\x00
IEEE 802.1X: 02:00:00:00:02:00 AUTH_PAE entering state AUTHENTICATED
wln0: AP-STA-CONNECTED 02:00:00:00:02:00
CTRL_IFACE monitor send /tmp/hostapd_1_0\x00
nl80211: Set STA flags - ifname=wln0 addr=02:00:00:00:02:00 total_flags=0x6d flags_or=0x1 flags_and=0xffffffff authorized=1
wln0: STA 02:00:00:00:02:00 IEEE 802.1X: authorizing port
wln0: STA 02:00:00:00:02:00 RADIUS: starting accounting session 5B2949818BBBAD49
wln0: STA 02:00:00:00:02:00 IEEE 802.1X: authenticated - EAP type: 52 (PWD)
nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0)
RTM_NEWLINK: ifi_index=12 ifname=wlan2 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln0
nl80211: RX frame da=12:00:00:00:00:01 sa=02:00:00:00:02:00 bssid=12:00:00:00:00:01 freq=2412 ssi_signal=-30 fc=0x40d0 seq_ctrl=0x90 stype=13 (WLAN_FC_STYPE_ACTION) len=27
wln0: Event RX_MGMT (18) received
mgmt::action
RX_ACTION category 5 action 4 sa 02:00:00:00:02:00 da 12:00:00:00:00:01 len 27 freq 2412
Radio measurement frame, action 4 from 02:00:00:00:02:00
nl80211: Send Action frame (ifindex=9, freq=2412 MHz wait=0 ms no_cck=0 offchanok=0)
nl80211: send_mlme - da=02:00:00:00:02:00 noack=0 freq=2412 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xd0 (WLAN_FC_STYPE_ACTION) nlmode=3
nl80211: send_mlme -> send_frame_cmd
nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0)
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln0
nl80211: Frame TX status event A1=02:00:00:00:02:00 stype=13 cookie=0x10 ack=1
wln0: Event TX_STATUS (16) received
mgmt::action cb ok=1
nl80211: Ignored event 64 (NL80211_CMD_NOTIFY_CQM) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 64 (NL80211_CMD_NOTIFY_CQM) for foreign interface (ifindex 12 wdev 0x0)
RX ctrl_iface - hexdump_ascii(len=9):
53 54 41 2d 46 49 52 53 54 STA-FIRST
RX ctrl_iface - hexdump_ascii(len=26):
53 54 41 2d 4e 45 58 54 20 30 32 3a 30 30 3a 30 STA-NEXT 02:00:0
30 3a 30 30 3a 30 32 3a 30 30 0:00:02:00
RX ctrl_iface - hexdump_ascii(len=9):
53 54 41 2d 4e 45 58 54 20 STA-NEXT
RX ctrl_iface - hexdump_ascii(len=9):
53 54 41 2d 46 49 52 53 54 STA-FIRST
RX ctrl_iface - hexdump_ascii(len=9):
53 54 41 2d 4e 45 58 54 20 STA-NEXT
RTM_NEWLINK: ifi_index=12 ifname=wlan2 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln0
nl80211: RX frame da=12:00:00:00:00:01 sa=02:00:00:00:02:00 bssid=12:00:00:00:00:01 freq=2412 ssi_signal=-30 fc=0x40c0 seq_ctrl=0xf0 stype=12 (WLAN_FC_STYPE_DEAUTH) len=26
wln0: Event RX_MGMT (18) received
wln0: mgmt::deauth
wln0: deauthentication: STA=02:00:00:00:02:00 reason_code=3
wln0: AP-STA-DISCONNECTED 02:00:00:00:02:00
CTRL_IFACE monitor send /tmp/hostapd_1_0\x00
nl80211: Set STA flags - ifname=wln0 addr=02:00:00:00:02:00 total_flags=0xc flags_or=0xc flags_and=0xfffffffd authorized=0
wln0: STA 02:00:00:00:02:00 WPA: event 3 notification
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=0 addr=0x11b3f30 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
addr=02:00:00:00:02:00
pairwise key
WPA: 02:00:00:00:02:00 WPA_PTK entering state DISCONNECTED
WPA: 02:00:00:00:02:00 WPA_PTK entering state INITIALIZE
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=0 addr=0x11b3f30 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
addr=02:00:00:00:02:00
pairwise key
wln0: STA 02:00:00:00:02:00 IEEE 802.11: deauthenticated
wln0: STA 02:00:00:00:02:00 MLME: MLME-DEAUTHENTICATE.indication(02:00:00:00:02:00, 3)
wln0: STA 02:00:00:00:02:00 MLME: MLME-DELETEKEYS.request(02:00:00:00:02:00)
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=0 addr=0x11b3f30 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
addr=02:00:00:00:02:00
pairwise key
nl80211: Set STA flags - ifname=wln0 addr=02:00:00:00:02:00 total_flags=0xc flags_or=0xc flags_and=0xfffffffd authorized=0
nl80211: sta_remove -> DEL_STATION wln0 02:00:00:00:02:00 --> 0 (Success)
ap_free_sta: cancel ap_handle_timer for 02:00:00:00:02:00
EAP: Server state machine removed
nl80211: Ignored event 20 (NL80211_CMD_DEL_STATION) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 20 (NL80211_CMD_DEL_STATION) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 39 (NL80211_CMD_DEAUTHENTICATE) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 39 (NL80211_CMD_DEAUTHENTICATE) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 48 (NL80211_CMD_DISCONNECT) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 48 (NL80211_CMD_DISCONNECT) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 20 (NL80211_CMD_DEL_STATION) for foreign interface (ifindex 9 wdev 0x0)
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wln0
nl80211: Delete station 02:00:00:00:02:00
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
nl80211: Ignored event 19 (NL80211_CMD_NEW_STATION) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 19 (NL80211_CMD_NEW_STATION) for foreign interface (ifindex 12 wdev 0x0)
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln0
nl80211: RX frame da=12:00:00:00:00:01 sa=02:00:00:00:02:00 bssid=12:00:00:00:00:01 freq=2412 ssi_signal=-30 fc=0xb0 seq_ctrl=0x100 stype=11 (WLAN_FC_STYPE_AUTH) len=140
wln0: Event RX_MGMT (18) received
mgmt::auth
authentication: STA=02:00:00:00:02:00 auth_alg=4 auth_transaction=1 status_code=0 wep=0 seq_ctrl=0x100
New STA
ap_sta_add: register ap_handle_timer timeout for 02:00:00:00:02:00 (300 seconds - ap_max_inactivity)
nl80211: sta_remove -> DEL_STATION wln0 02:00:00:00:02:00 --> -2 (No such file or directory)
nl80211: Add STA 02:00:00:00:02:00
* supported rates - hexdump(len=4): 02 04 0b 16
* capability=0x0
* aid=1 (UNASSOC_STA workaround)
* listen_interval=0
* flags set=0x0 mask=0xa0
FILS: Authentication frame fields - hexdump(len=110): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00 ff 11 0d 80 7e 2b 13 9c ff f1 62 93 7d 6f c8 c8 c9 f6 4d ff 09 04 f1 4e 8e cf 6e e0 0c 5b ff 38 08 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40
FILS: Remaining IEs - hexdump(len=110): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00 ff 11 0d 80 7e 2b 13 9c ff f1 62 93 7d 6f c8 c8 c9 f6 4d ff 09 04 f1 4e 8e cf 6e e0 0c 5b ff 38 08 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40
FILS: RSN element - hexdump(len=20): 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00
FILS: SNonce - hexdump(len=16): 80 7e 2b 13 9c ff f1 62 93 7d 6f c8 c8 c9 f6 4d
FILS: FILS Session - hexdump(len=8): f1 4e 8e cf 6e e0 0c 5b
FILS: Wrapped Data - hexdump(len=55): 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40
EAP: Server state machine created
IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state IDLE
IEEE 802.1X: 02:00:00:00:02:00 CTRL_DIR entering state FORCE_BOTH
FILS: Forward EAP-Initiate/Re-auth to authentication server
EAP: Update identity based on EAP-Initiate/Re-auth keyName-NAI - hexdump_ascii(len=28):
38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 8d48e6371a5bad7e
40 65 78 61 6d 70 6c 65 2e 63 6f 6d @example.com
wln0: STA 02:00:00:00:02:00 IEEE 802.1X: STA identity '8d48e6371a5bad7e at example.com'
Encapsulating EAP message into a RADIUS packet
wln0: RADIUS Sending RADIUS message to authentication server
wln0: RADIUS Next RADIUS client retransmit in 3 seconds
FILS: Will send Authentication frame once the response from authentication server is available
FILS: PMKID - hexdump(len=16): 32 a2 7c ab 30 0e af e7 cd 5e 3a 96 9e 0c fb aa
nl80211: Ignored event 19 (NL80211_CMD_NEW_STATION) for foreign interface (ifindex 9 wdev 0x0)
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wln0
nl80211: New station 02:00:00:00:02:00
RADIUS SRV: Received 266 bytes from 127.0.0.1:47133
RADIUS SRV: Creating a new session
hostapd_radius_get_eap_user: Failed to find user
RADIUS SRV: Matching user entry found
RADIUS SRV: Calling-Station-Id: 02:00:00:00:02:00
RADIUS SRV: [0x1 127.0.0.1] New session created
EAP: Server state machine created
RADIUS SRV: New session 0x1 initialized
EAP: EAP entering state INITIALIZE
EAP: parseEapResp: rxResp=0 rxInitiate=1 respId=0 respMethod=2 respVendor=0 respVendorMethod=0
: CTRL-EVENT-EAP-STARTED 00:00:00:00:00:00
EAP: EAP entering state SELECT_ACTION
EAP: getDecision: no identity known yet -> CONTINUE
EAP: EAP entering state INITIATE_RECEIVED
EAP: EAP-Initiate/Re-Auth - hexdump(len=50): 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40
EAP: Flags=0x0 SEQ=0
EAP: EAP-Initiate/Re-auth - keyName-NAI - hexdump_ascii(len=28):
38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 8d48e6371a5bad7e
40 65 78 61 6d 70 6c 65 2e 63 6f 6d @example.com
EAP: Authentication Tag match using HMAC-SHA256-128
EAP: EAP-Initiate/Re-Auth TVs/TLVs - hexdump(len=30): 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d
EAP: ERP key 8d48e6371a5bad7e at example.com SEQ updated to 0
EAP: Send EAP-Finish/Re-auth (success)
EAP: ERP rMSK - hexdump(len=64): [REMOVED]
: CTRL-EVENT-EAP-SUCCESS 00:00:00:00:00:00
RADIUS SRV: [0x1 127.0.0.1] EAP authentication succeeded
RADIUS SRV: Reply to 127.0.0.1:47133
RADIUS SRV: [0x1 127.0.0.1] Sending Access-Accept
RADIUS SRV: Removing completed session 0x1 after timeout
wln0: RADIUS Received 211 bytes from RADIUS server
wln0: RADIUS Received RADIUS message
wln0: STA 02:00:00:00:02:00 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec
RADIUS packet matching with station 02:00:00:00:02:00
MS-MPPE-Send-Key - hexdump(len=32): [REMOVED]
MS-MPPE-Recv-Key - hexdump(len=32): [REMOVED]
wln0: STA 02:00:00:00:02:00 IEEE 802.1X: decapsulated EAP packet (code=6 id=0 len=55) from RADIUS server: unknown EAP code
RSN: Generated FILS Nonce - hexdump(len=16): 12 1c 0b 60 d7 1b 0c 62 6c 1a a8 40 70 fc 78 d3
FILS: rMSK to PMK derivation
FILS: rMSK - hexdump(len=64): [REMOVED]
FILS: SNonce - hexdump(len=16): 80 7e 2b 13 9c ff f1 62 93 7d 6f c8 c8 c9 f6 4d
FILS: ANonce - hexdump(len=16): 12 1c 0b 60 d7 1b 0c 62 6c 1a a8 40 70 fc 78 d3
FILS: DHss - hexdump(len=0): [NULL]
FILS: PMK - hexdump(len=32): [REMOVED]
FILS: PTK derivation using PRF(SHA256)
FILS: PTK derivation - SPA=02:00:00:00:02:00 AA=12:00:00:00:00:01
FILS: SNonce - hexdump(len=16): 80 7e 2b 13 9c ff f1 62 93 7d 6f c8 c8 c9 f6 4d
FILS: ANonce - hexdump(len=16): 12 1c 0b 60 d7 1b 0c 62 6c 1a a8 40 70 fc 78 d3
FILS: PMK - hexdump(len=32): [REMOVED]
FILS: FILS-Key-Data - hexdump(len=80): [REMOVED]
FILS: ICK - hexdump(len=32): [REMOVED]
FILS: KEK - hexdump(len=32): [REMOVED]
FILS: TK - hexdump(len=16): [REMOVED]
FILS: Key-Auth derivation: STA-MAC=02:00:00:00:02:00 AP-BSSID=12:00:00:00:00:01
FILS: ICK - hexdump(len=32): [REMOVED]
FILS: SNonce - hexdump(len=16): 80 7e 2b 13 9c ff f1 62 93 7d 6f c8 c8 c9 f6 4d
FILS: ANonce - hexdump(len=16): 12 1c 0b 60 d7 1b 0c 62 6c 1a a8 40 70 fc 78 d3
FILS: gSTA - hexdump(len=0): [NULL]
FILS: gAP - hexdump(len=0): [NULL]
FILS: Key-Auth (STA) - hexdump(len=32): 95 7c 45 a9 cd 22 4a b3 60 87 3e e9 8b 7b 24 79 c0 09 de d4 e6 dc 5e 03 8b ed 52 8e 7d 4a 4f 95
FILS: Key-Auth (AP) - hexdump(len=32): 1d bb e1 04 ce 37 22 1c 64 25 95 e9 38 f2 48 31 b5 4e ca 38 20 8e 02 89 03 42 f9 f0 50 07 9e 42
authentication reply: STA=02:00:00:00:02:00 auth_alg=4 auth_transaction=2 resp=0 (IE len=114) (dbg=auth-fils-finish)
nl80211: send_mlme - da=02:00:00:00:02:00 noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xb0 (WLAN_FC_STYPE_AUTH) nlmode=3
nl80211: send_mlme - Use bss->freq=2412
nl80211: send_mlme -> send_frame_cmd
wln0: STA 02:00:00:00:02:00 IEEE 802.11: authentication OK (FILS)
wln0: STA 02:00:00:00:02:00 WPA: event 0 notification
wln0: STA 02:00:00:00:02:00 MLME: MLME-AUTHENTICATE.indication(02:00:00:00:02:00, unknown)
nl80211: Ignored event 37 (NL80211_CMD_AUTHENTICATE) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 37 (NL80211_CMD_AUTHENTICATE) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0)
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln0
nl80211: Frame TX status event A1=02:00:00:00:02:00 stype=11 cookie=0x11 ack=1
wln0: Event TX_STATUS (16) received
mgmt::auth cb
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln0
nl80211: RX frame da=12:00:00:00:00:01 sa=02:00:00:00:02:00 bssid=12:00:00:00:00:01 freq=2412 ssi_signal=-30 fc=0x0 seq_ctrl=0x110 stype=0 (WLAN_FC_STYPE_ASSOC_REQ) len=159
wln0: Event RX_MGMT (18) received
mgmt::assoc_req
association request: STA=02:00:00:00:02:00 capab_info=0x1431 listen_interval=5 seq_ctrl=0x110
FILS: Decrypted Association Request elements - hexdump(len=115): 00 06 54 65 73 74 46 54 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 21 02 00 14 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00 46 05 70 00 00 00 00 7f 0a 04 00 48 00 01 00 00 40 00 01 ff 21 03 95 7c 45 a9 cd 22 4a b3 60 87 3e e9 8b 7b 24 79 c0 09 de d4 e6 dc 5e 03 8b ed 52 8e 7d 4a 4f 95 ff 09 04 f1 4e 8e cf 6e e0 0c 5b
new AID 1
wln0: STA 02:00:00:00:02:00 IEEE 802.11: association OK (aid 1)
Add associated STA 02:00:00:00:02:00 (added_unassoc=1 auth_alg=4 ft_over_ds=0 reassoc=0 authorized=0 ft_tk=0 fils_tk=0)
nl80211: Set STA 02:00:00:00:02:00
* supported rates - hexdump(len=12): 02 04 0b 16 0c 12 18 24 30 48 60 6c
* capability=0x1431
* aid=1
* listen_interval=5
* flags set=0xb4 mask=0xb4
FILS: Association Response frame before FILS processing - hexdump(len=107): 10 00 00 00 02 00 00 00 02 00 12 00 00 00 00 01 12 00 00 00 00 01 00 00 11 14 00 00 01 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 46 05 02 00 00 00 00 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 01 00 0f ac 0e 80 00 7f 0a 04 00 40 02 00 00 01 40 00 01 5a 03 24 01 00 ff 09 04 f1 4e 8e cf 6e e0 0c 5b
FILS: Association Response plaintext - hexdump(len=100): [REMOVED]
FILS: Encrypted Association Response elements - hexdump(len=116): f9 5e 58 80 4e 5c 32 2c 1e 1c 98 78 c7 a6 c0 2c e7 4f 63 fc ad 28 98 25 4e 90 ad 26 2e 6d 5c c6 a2 51 89 50 9e c0 ff ae 4b 64 89 9c 0d 38 34 db a9 04 50 e0 9a d3 d3 a0 48 6a 92 0e 06 60 b4 64 e6 08 be bf 99 03 cd 9d 56 3b 25 da 76 60 ae bb f6 11 63 06 1f 38 29 07 c0 50 0c b5 b8 c1 58 4d ee ed c1 b6 bb cd 8f ce 60 59 24 b0 15 91 8e 25 5e b0 5f 5e
nl80211: send_mlme - da=02:00:00:00:02:00 noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0x10 (WLAN_FC_STYPE_ASSOC_RESP) nlmode=3
nl80211: send_mlme - Use bss->freq=2412
nl80211: send_mlme -> send_frame_cmd
nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0)
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln0
nl80211: Frame TX status event A1=02:00:00:00:02:00 stype=1 cookie=0x12 ack=1
wln0: Event TX_STATUS (16) received
mgmt::assoc_resp cb
wln0: STA 02:00:00:00:02:00 IEEE 802.11: associated (aid 1)
wln0: AP-STA-CONNECTED 02:00:00:00:02:00
CTRL_IFACE monitor send /tmp/hostapd_1_0\x00
wln0: STA 02:00:00:00:02:00 MLME: MLME-ASSOCIATE.indication(02:00:00:00:02:00)
nl80211: Set STA flags - ifname=wln0 addr=02:00:00:00:02:00 total_flags=0x6d flags_or=0xc flags_and=0xfffffffd authorized=1
wln0: STA 02:00:00:00:02:00 WPA: event 1 notification
wln0: STA 02:00:00:00:02:00 IEEE 802.1X: PMK from FILS - skip IEEE 802.1X/EAP
WPA: Start PTK rekeying timer for 02:00:00:00:02:00 (30 seconds)
wln0: STA 02:00:00:00:02:00 WPA: FILS authentication already completed - do not start 4-way handshake
wln0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 02:00:00:00:02:00 (300 seconds - ap_max_inactivity)
FILS: Configure TK to the driver
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=3 addr=0x11cc9c0 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
addr=02:00:00:00:02:00
pairwise key
IEEE 802.1X: 02:00:00:00:02:00 AUTH_PAE entering state AUTHENTICATED
nl80211: Set STA flags - ifname=wln0 addr=02:00:00:00:02:00 total_flags=0x6d flags_or=0x1 flags_and=0xffffffff authorized=1
wln0: STA 02:00:00:00:02:00 IEEE 802.1X: authorizing port
wln0: STA 02:00:00:00:02:00 RADIUS: starting accounting session 84C437E0F004CD29
wln0: STA 02:00:00:00:02:00 IEEE 802.1X: authenticated - EAP type: 0 (unknown)
IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state IDLE
RTM_NEWLINK: ifi_index=12 ifname=wlan2 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
nl80211: Ignored event 38 (NL80211_CMD_ASSOCIATE) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 38 (NL80211_CMD_ASSOCIATE) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 46 (NL80211_CMD_CONNECT) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 46 (NL80211_CMD_CONNECT) for foreign interface (ifindex 12 wdev 0x0)
RTM_NEWLINK: ifi_index=12 ifname=wlan2 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln0
nl80211: RX frame da=12:00:00:00:00:01 sa=02:00:00:00:02:00 bssid=12:00:00:00:00:01 freq=2412 ssi_signal=-30 fc=0x40d0 seq_ctrl=0x120 stype=13 (WLAN_FC_STYPE_ACTION) len=27
wln0: Event RX_MGMT (18) received
mgmt::action
RX_ACTION category 5 action 4 sa 02:00:00:00:02:00 da 12:00:00:00:00:01 len 27 freq 2412
Radio measurement frame, action 4 from 02:00:00:00:02:00
nl80211: Send Action frame (ifindex=9, freq=2412 MHz wait=0 ms no_cck=0 offchanok=0)
nl80211: send_mlme - da=02:00:00:00:02:00 noack=0 freq=2412 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xd0 (WLAN_FC_STYPE_ACTION) nlmode=3
nl80211: send_mlme -> send_frame_cmd
nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0)
nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln0
nl80211: Frame TX status event A1=02:00:00:00:02:00 stype=13 cookie=0x13 ack=1
wln0: Event TX_STATUS (16) received
mgmt::action cb ok=1
nl80211: Ignored event 64 (NL80211_CMD_NOTIFY_CQM) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 64 (NL80211_CMD_NOTIFY_CQM) for foreign interface (ifindex 12 wdev 0x0)
RX ctrl_iface - hexdump_ascii(len=9):
53 54 41 2d 46 49 52 53 54 STA-FIRST
RX ctrl_iface - hexdump_ascii(len=26):
53 54 41 2d 4e 45 58 54 20 30 32 3a 30 30 3a 30 STA-NEXT 02:00:0
30 3a 30 30 3a 30 32 3a 30 30 0:00:02:00
RX ctrl_iface - hexdump_ascii(len=9):
53 54 41 2d 4e 45 58 54 20 STA-NEXT
RX ctrl_iface - hexdump_ascii(len=9):
53 54 41 2d 46 49 52 53 54 STA-FIRST
RX ctrl_iface - hexdump_ascii(len=9):
53 54 41 2d 4e 45 58 54 20 STA-NEXT
RX ctrl_iface - hexdump_ascii(len=6):
53 54 41 54 55 53 STATUS
RTM_NEWLINK: ifi_index=12 ifname=wlan2 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Ignored event 20 (NL80211_CMD_DEL_STATION) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 20 (NL80211_CMD_DEL_STATION) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 39 (NL80211_CMD_DEAUTHENTICATE) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 39 (NL80211_CMD_DEAUTHENTICATE) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 48 (NL80211_CMD_DISCONNECT) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 48 (NL80211_CMD_DISCONNECT) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 19 (NL80211_CMD_NEW_STATION) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 19 (NL80211_CMD_NEW_STATION) for foreign interface (ifindex 12 wdev 0x0)
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln1
nl80211: RX frame da=12:00:00:00:00:02 sa=02:00:00:00:02:00 bssid=12:00:00:00:00:02 freq=2417 ssi_signal=-30 fc=0xb0 seq_ctrl=0x170 stype=11 (WLAN_FC_STYPE_AUTH) len=140
wln1: Event RX_MGMT (18) received
mgmt::auth
authentication: STA=02:00:00:00:02:00 auth_alg=4 auth_transaction=1 status_code=0 wep=0 seq_ctrl=0x170
New STA
ap_sta_add: register ap_handle_timer timeout for 02:00:00:00:02:00 (300 seconds - ap_max_inactivity)
nl80211: sta_remove -> DEL_STATION wln1 02:00:00:00:02:00 --> -2 (No such file or directory)
nl80211: Add STA 02:00:00:00:02:00
* supported rates - hexdump(len=4): 02 04 0b 16
* capability=0x0
* aid=1 (UNASSOC_STA workaround)
* listen_interval=0
* flags set=0x0 mask=0xa0
FILS: Authentication frame fields - hexdump(len=110): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00 ff 11 0d e1 2a 3a 98 71 71 1b 72 85 ce 04 6d fd 33 0a e5 ff 09 04 d5 7c 3c fc cc ce 62 7f ff 38 08 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40
FILS: Remaining IEs - hexdump(len=110): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00 ff 11 0d e1 2a 3a 98 71 71 1b 72 85 ce 04 6d fd 33 0a e5 ff 09 04 d5 7c 3c fc cc ce 62 7f ff 38 08 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40
FILS: RSN element - hexdump(len=20): 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00
FILS: SNonce - hexdump(len=16): e1 2a 3a 98 71 71 1b 72 85 ce 04 6d fd 33 0a e5
FILS: FILS Session - hexdump(len=8): d5 7c 3c fc cc ce 62 7f
FILS: Wrapped Data - hexdump(len=55): 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40
EAP: Server state machine created
IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state IDLE
IEEE 802.1X: 02:00:00:00:02:00 CTRL_DIR entering state FORCE_BOTH
FILS: Forward EAP-Initiate/Re-auth to authentication server
EAP: Update identity based on EAP-Initiate/Re-auth keyName-NAI - hexdump_ascii(len=28):
38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 8d48e6371a5bad7e
40 65 78 61 6d 70 6c 65 2e 63 6f 6d @example.com
wln1: STA 02:00:00:00:02:00 IEEE 802.1X: STA identity '8d48e6371a5bad7e at example.com'
Encapsulating EAP message into a RADIUS packet
wln1: RADIUS Sending RADIUS message to authentication server
wln1: RADIUS Next RADIUS client retransmit in 3 seconds
FILS: Will send Authentication frame once the response from authentication server is available
FILS: PMKID - hexdump(len=16): 32 a2 7c ab 30 0e af e7 cd 5e 3a 96 9e 0c fb aa
nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wln1
nl80211: New station 02:00:00:00:02:00
RADIUS SRV: Received 266 bytes from 127.0.0.1:42289
RADIUS SRV: Creating a new session
hostapd_radius_get_eap_user: Failed to find user
RADIUS SRV: Matching user entry found
RADIUS SRV: Calling-Station-Id: 02:00:00:00:02:00
RADIUS SRV: [0x2 127.0.0.1] New session created
EAP: Server state machine created
RADIUS SRV: New session 0x2 initialized
EAP: EAP entering state INITIALIZE
EAP: parseEapResp: rxResp=0 rxInitiate=1 respId=0 respMethod=2 respVendor=0 respVendorMethod=0
: CTRL-EVENT-EAP-STARTED 00:00:00:00:00:00
EAP: EAP entering state SELECT_ACTION
EAP: getDecision: no identity known yet -> CONTINUE
EAP: EAP entering state INITIATE_RECEIVED
EAP: EAP-Initiate/Re-Auth - hexdump(len=50): 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40
EAP: Flags=0x0 SEQ=0
EAP: EAP-Initiate/Re-auth - keyName-NAI - hexdump_ascii(len=28):
38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 8d48e6371a5bad7e
40 65 78 61 6d 70 6c 65 2e 63 6f 6d @example.com
EAP: SEQ=0 replayed (already received SEQ=0)
RADIUS SRV: No EAP data from the state machine - ignore this Access-Request silently (assuming it was a duplicate)
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln1
nl80211: RX frame da=12:00:00:00:00:02 sa=02:00:00:00:02:00 bssid=12:00:00:00:00:02 freq=2417 ssi_signal=-30 fc=0xb0 seq_ctrl=0x180 stype=11 (WLAN_FC_STYPE_AUTH) len=140
wln1: Event RX_MGMT (18) received
mgmt::auth
authentication: STA=02:00:00:00:02:00 auth_alg=4 auth_transaction=1 status_code=0 wep=0 seq_ctrl=0x180
FILS: Authentication frame fields - hexdump(len=110): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00 ff 11 0d e1 2a 3a 98 71 71 1b 72 85 ce 04 6d fd 33 0a e5 ff 09 04 d5 7c 3c fc cc ce 62 7f ff 38 08 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40
FILS: Remaining IEs - hexdump(len=110): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00 ff 11 0d e1 2a 3a 98 71 71 1b 72 85 ce 04 6d fd 33 0a e5 ff 09 04 d5 7c 3c fc cc ce 62 7f ff 38 08 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40
FILS: RSN element - hexdump(len=20): 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00
FILS: SNonce - hexdump(len=16): e1 2a 3a 98 71 71 1b 72 85 ce 04 6d fd 33 0a e5
FILS: FILS Session - hexdump(len=8): d5 7c 3c fc cc ce 62 7f
FILS: Wrapped Data - hexdump(len=55): 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40
FILS: Forward EAP-Initiate/Re-auth to authentication server
EAP: Update identity based on EAP-Initiate/Re-auth keyName-NAI - hexdump_ascii(len=28):
38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 8d48e6371a5bad7e
40 65 78 61 6d 70 6c 65 2e 63 6f 6d @example.com
wln1: STA 02:00:00:00:02:00 IEEE 802.1X: STA identity '8d48e6371a5bad7e at example.com'
Encapsulating EAP message into a RADIUS packet
wln1: RADIUS Sending RADIUS message to authentication server
wln1: RADIUS Next RADIUS client retransmit in 2 seconds
FILS: Will send Authentication frame once the response from authentication server is available
FILS: PMKID - hexdump(len=16): 32 a2 7c ab 30 0e af e7 cd 5e 3a 96 9e 0c fb aa
RADIUS SRV: Received 266 bytes from 127.0.0.1:42289
RADIUS SRV: Creating a new session
hostapd_radius_get_eap_user: Failed to find user
RADIUS SRV: Matching user entry found
RADIUS SRV: Calling-Station-Id: 02:00:00:00:02:00
RADIUS SRV: [0x3 127.0.0.1] New session created
EAP: Server state machine created
RADIUS SRV: New session 0x3 initialized
EAP: EAP entering state INITIALIZE
EAP: parseEapResp: rxResp=0 rxInitiate=1 respId=0 respMethod=2 respVendor=0 respVendorMethod=0
: CTRL-EVENT-EAP-STARTED 00:00:00:00:00:00
EAP: EAP entering state SELECT_ACTION
EAP: getDecision: no identity known yet -> CONTINUE
EAP: EAP entering state INITIATE_RECEIVED
EAP: EAP-Initiate/Re-Auth - hexdump(len=50): 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40
EAP: Flags=0x0 SEQ=0
EAP: EAP-Initiate/Re-auth - keyName-NAI - hexdump_ascii(len=28):
38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 8d48e6371a5bad7e
40 65 78 61 6d 70 6c 65 2e 63 6f 6d @example.com
EAP: SEQ=0 replayed (already received SEQ=0)
RADIUS SRV: No EAP data from the state machine - ignore this Access-Request silently (assuming it was a duplicate)
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln1
nl80211: RX frame da=12:00:00:00:00:02 sa=02:00:00:00:02:00 bssid=12:00:00:00:00:02 freq=2417 ssi_signal=-30 fc=0xb0 seq_ctrl=0x190 stype=11 (WLAN_FC_STYPE_AUTH) len=140
wln1: Event RX_MGMT (18) received
mgmt::auth
authentication: STA=02:00:00:00:02:00 auth_alg=4 auth_transaction=1 status_code=0 wep=0 seq_ctrl=0x190
FILS: Authentication frame fields - hexdump(len=110): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00 ff 11 0d e1 2a 3a 98 71 71 1b 72 85 ce 04 6d fd 33 0a e5 ff 09 04 d5 7c 3c fc cc ce 62 7f ff 38 08 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40
FILS: Remaining IEs - hexdump(len=110): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00 ff 11 0d e1 2a 3a 98 71 71 1b 72 85 ce 04 6d fd 33 0a e5 ff 09 04 d5 7c 3c fc cc ce 62 7f ff 38 08 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40
FILS: RSN element - hexdump(len=20): 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00
FILS: SNonce - hexdump(len=16): e1 2a 3a 98 71 71 1b 72 85 ce 04 6d fd 33 0a e5
FILS: FILS Session - hexdump(len=8): d5 7c 3c fc cc ce 62 7f
FILS: Wrapped Data - hexdump(len=55): 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40
FILS: Forward EAP-Initiate/Re-auth to authentication server
EAP: Update identity based on EAP-Initiate/Re-auth keyName-NAI - hexdump_ascii(len=28):
38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 8d48e6371a5bad7e
40 65 78 61 6d 70 6c 65 2e 63 6f 6d @example.com
wln1: STA 02:00:00:00:02:00 IEEE 802.1X: STA identity '8d48e6371a5bad7e at example.com'
Encapsulating EAP message into a RADIUS packet
wln1: RADIUS Sending RADIUS message to authentication server
wln1: RADIUS Next RADIUS client retransmit in 2 seconds
FILS: Will send Authentication frame once the response from authentication server is available
FILS: PMKID - hexdump(len=16): 32 a2 7c ab 30 0e af e7 cd 5e 3a 96 9e 0c fb aa
RADIUS SRV: Received 266 bytes from 127.0.0.1:42289
RADIUS SRV: Creating a new session
hostapd_radius_get_eap_user: Failed to find user
RADIUS SRV: Matching user entry found
RADIUS SRV: Calling-Station-Id: 02:00:00:00:02:00
RADIUS SRV: [0x4 127.0.0.1] New session created
EAP: Server state machine created
RADIUS SRV: New session 0x4 initialized
EAP: EAP entering state INITIALIZE
EAP: parseEapResp: rxResp=0 rxInitiate=1 respId=0 respMethod=2 respVendor=0 respVendorMethod=0
: CTRL-EVENT-EAP-STARTED 00:00:00:00:00:00
EAP: EAP entering state SELECT_ACTION
EAP: getDecision: no identity known yet -> CONTINUE
EAP: EAP entering state INITIATE_RECEIVED
EAP: EAP-Initiate/Re-Auth - hexdump(len=50): 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40
EAP: Flags=0x0 SEQ=0
EAP: EAP-Initiate/Re-auth - keyName-NAI - hexdump_ascii(len=28):
38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 8d48e6371a5bad7e
40 65 78 61 6d 70 6c 65 2e 63 6f 6d @example.com
EAP: SEQ=0 replayed (already received SEQ=0)
RADIUS SRV: No EAP data from the state machine - ignore this Access-Request silently (assuming it was a duplicate)
nl80211: Ignored event 20 (NL80211_CMD_DEL_STATION) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 20 (NL80211_CMD_DEL_STATION) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 37 (NL80211_CMD_AUTHENTICATE) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 37 (NL80211_CMD_AUTHENTICATE) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0)
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln0
nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=02:00:00:00:02:00 bssid=ff:ff:ff:ff:ff:ff freq=2412 ssi_signal=-30 fc=0x40 seq_ctrl=0x2070 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=109
nl80211: send_mlme - da=02:00:00:00:02:00 noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
nl80211: send_mlme - Use bss->freq=2412
nl80211: send_mlme -> send_frame_cmd
nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln1
nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=02:00:00:00:02:00 bssid=ff:ff:ff:ff:ff:ff freq=2417 ssi_signal=-30 fc=0x40 seq_ctrl=0x11a0 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=109
nl80211: send_mlme - da=02:00:00:00:02:00 noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3
nl80211: send_mlme - Use bss->freq=2417
nl80211: send_mlme -> send_frame_cmd
nl80211: Ignored event 34 (NL80211_CMD_NEW_SCAN_RESULTS) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 34 (NL80211_CMD_NEW_SCAN_RESULTS) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 20 (NL80211_CMD_DEL_STATION) for foreign interface (ifindex 9 wdev 0x0)
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wln0
nl80211: Delete station 02:00:00:00:02:00
nl80211: Ignored event 16 (NL80211_CMD_STOP_AP) for foreign interface (ifindex 9 wdev 0x0)
nl80211: Drv Event 16 (NL80211_CMD_STOP_AP) received for wln0
wln0: Event INTERFACE_UNAVAILABLE (28) received
Interface wln0 is unavailable -- stopped
RTM_NEWLINK: ifi_index=9 ifname=wln0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1002 ()
nl80211: Interface down (wln0/wln0)
wln0: Event INTERFACE_DISABLED (26) received
wln0: STA 02:00:00:00:02:00 MLME: MLME-DEAUTHENTICATE.indication(02:00:00:00:02:00, 1)
wln0: STA 02:00:00:00:02:00 MLME: MLME-DELETEKEYS.request(02:00:00:00:02:00)
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=0 addr=0x11cc9c0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20
nl80211: DEL_KEY
addr=02:00:00:00:02:00
pairwise key
nl80211: set_key failed; err=-100 Network is down
RSN: PTK removal from the driver failed
Removing station 02:00:00:00:02:00
wln0: AP-STA-DISCONNECTED 02:00:00:00:02:00
CTRL_IFACE monitor send /tmp/hostapd_1_0\x00
nl80211: Set STA flags - ifname=wln0 addr=02:00:00:00:02:00 total_flags=0x6c flags_or=0xc flags_and=0xfffffffd authorized=0
nl80211: sta_remove -> DEL_STATION wln0 02:00:00:00:02:00 --> -100 (Network is down)
ap_free_sta: cancel ap_handle_timer for 02:00:00:00:02:00
EAP: Server state machine removed
wln0: INTERFACE-DISABLED
CTRL_IFACE monitor send /tmp/hostapd_1_0\x00
nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wln1
nl80211: Delete station 02:00:00:00:02:00
nl80211: Drv Event 16 (NL80211_CMD_STOP_AP) received for wln1
wln1: Event INTERFACE_UNAVAILABLE (28) received
Interface wln1 is unavailable -- stopped
RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1002 ()
nl80211: Interface down (wln1/wln1)
wln1: Event INTERFACE_DISABLED (26) received
Removing station 02:00:00:00:02:00
nl80211: Set STA flags - ifname=wln1 addr=02:00:00:00:02:00 total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0
nl80211: sta_remove -> DEL_STATION wln1 02:00:00:00:02:00 --> -100 (Network is down)
ap_free_sta: cancel ap_handle_timer for 02:00:00:00:02:00
EAP: Server state machine removed
wln1: STA 02:00:00:00:02:00 RADIUS: Removing pending RADIUS authentication message for removed client
wln1: STA 02:00:00:00:02:00 RADIUS: Removing pending RADIUS authentication message for removed client
wln1: STA 02:00:00:00:02:00 RADIUS: Removing pending RADIUS authentication message for removed client
wln1: INTERFACE-DISABLED
CTRL_IFACE monitor send /tmp/hostapd_1_1\x00
nl80211: Ignored event 36 (NL80211_CMD_REG_CHANGE) for foreign interface (ifindex -1 wdev 0x0)
nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wln0
nl80211: Regulatory domain change
* initiator=0
* type=1
wln0: Event CHANNEL_LIST_CHANGED (27) received
RTM_NEWLINK: ifi_index=9 ifname=wln0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING])
nl80211: Interface up (wln0/wln0)
wln0: Event INTERFACE_ENABLED (25) received
wln0: INTERFACE-ENABLED
CTRL_IFACE monitor send /tmp/hostapd_1_0\x00
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
nl80211: Set beacon (beacon_set=0)
nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 12 00 00 00 00 01 12 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 01
nl80211: Beacon tail - hexdump(len=66): 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 01 00 0f ac 0e 80 00 46 05 02 00 00 00 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: ifindex=9
nl80211: beacon_int=100
nl80211: beacon_rate=0
nl80211: rate_type=0
nl80211: dtim_period=2
nl80211: ssid=TestFT
* beacon_int=100
* dtim_period=2
nl80211: hidden SSID not in use
nl80211: privacy=2
nl80211: auth_algs=0x1
nl80211: wpa_version=0x2
nl80211: key_mgmt_suites=0x40001
nl80211: pairwise_ciphers=0x10
nl80211: group_cipher=0x10
nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01
nl80211: multicast to unicast disabled on interface wln0
RTM_NEWLINK: ifi_index=9 ifname=wln0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP])
nl80211: Interface up (wln1/wln1)
wln1: Event INTERFACE_ENABLED (25) received
wln1: INTERFACE-ENABLED
CTRL_IFACE monitor send /tmp/hostapd_1_1\x00
wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a
nl80211: NEW_KEY
nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
broadcast key
nl80211: NL80211_CMD_SET_KEY - default key
nl80211: Set beacon (beacon_set=0)
nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 12 00 00 00 00 02 12 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 02
nl80211: Beacon tail - hexdump(len=66): 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 01 00 0f ac 0e 80 00 46 05 02 00 00 00 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: ifindex=10
nl80211: beacon_int=100
nl80211: beacon_rate=0
nl80211: rate_type=0
nl80211: dtim_period=2
nl80211: ssid=TestFT
* beacon_int=100
* dtim_period=2
nl80211: hidden SSID not in use
nl80211: privacy=2
nl80211: auth_algs=0x1
nl80211: wpa_version=0x2
nl80211: key_mgmt_suites=0x40001
nl80211: pairwise_ciphers=0x10
nl80211: group_cipher=0x10
nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79
nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01
nl80211: multicast to unicast disabled on interface wln1
RTM_NEWLINK: ifi_index=12 ifname=wlan2 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1002 ()
nl80211: Ignored event 35 (NL80211_CMD_SCAN_ABORTED) for foreign interface (ifindex 12 wdev 0x0)
nl80211: Ignored event 35 (NL80211_CMD_SCAN_ABORTED) for foreign interface (ifindex 12 wdev 0x0)
RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RADIUS SRV: Removing completed session 0x0
EAP: Server state machine removed
RTM_DELLINK: ifi_index=12 ifname=wlan2 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1002 ()
RTM_DELLINK: Interface 'wlan2' removed
RTM_NEWLINK: ifi_index=1 ifname=lo operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x8 ()
nl80211: Ignored event 16 (NL80211_CMD_STOP_AP) for foreign interface (ifindex 9 wdev 0x0)
nl80211: Drv Event 16 (NL80211_CMD_STOP_AP) received for wln0
wln0: Event INTERFACE_UNAVAILABLE (28) received
Interface wln0 is unavailable -- stopped
RTM_NEWLINK: ifi_index=9 ifname=wln0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1002 ()
nl80211: Interface down (wln0/wln0)
wln0: Event INTERFACE_DISABLED (26) received
wln0: INTERFACE-DISABLED
CTRL_IFACE monitor send /tmp/hostapd_1_0\x00
CTRL_IFACE monitor[0]: 2 - No such file or directory
CTRL_IFACE monitor detached /tmp/hostapd_1_0\x00
Signal 15 received - terminating
Control interface directory not empty - leaving it behind
hostapd_interface_deinit_free(0x118cde0)
hostapd_interface_deinit_free: num_bss=1 conf->num_bss=1
hostapd_interface_deinit(0x118cde0)
wln0: interface state ENABLED->DISABLED
hostapd_bss_deinit: deinit bss wln0
wln0: Deauthenticate all stations
nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3
nl80211: send_mlme - Use bss->freq=2412
nl80211: send_mlme -> send_frame_cmd
nl80211: Frame command failed: ret=-100 (Network is down) (freq=2412 wait=0)
wln0: AP-DISABLED
hostapd_cleanup(hapd=0x118e3a0 (wln0))
wln0: CTRL-EVENT-TERMINATING
Control interface directory not empty - leaving it behind
hostapd_free_hapd_data(wln0)
hostapd_interface_deinit_free: driver=0x521a80 drv_priv=0x11a1680 -> hapd_deinit
nl80211: deinit ifname=wln0 disabled_11b_rates=0
nl80211: Remove monitor interface: refcount=0
nl80211: Remove beacon (ifindex=9)
netlink: Operstate: ifindex=9 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
nl80211: Set mode ifindex 9 iftype 2 (STATION)
nl80211: Teardown AP(wln0) - device_ap_sme=0 use_monitor=0
nl80211: Unsubscribe mgmt frames handle 0x888888888992ad99 (AP teardown)
hostapd_interface_free(0x118cde0)
hostapd_interface_free: free hapd 0x118e3a0
hostapd_cleanup_iface(0x118cde0)
hostapd_cleanup_iface_partial(0x118cde0)
hostapd_cleanup_iface: free iface=0x118cde0
hostapd_interface_deinit_free(0x118fb60)
hostapd_interface_deinit_free: num_bss=1 conf->num_bss=1
hostapd_interface_deinit(0x118fb60)
wln1: interface state ENABLED->DISABLED
hostapd_bss_deinit: deinit bss wln1
wln1: Deauthenticate all stations
nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3
nl80211: send_mlme - Use bss->freq=2417
nl80211: send_mlme -> send_frame_cmd
wln1: AP-DISABLED
CTRL_IFACE monitor send /tmp/hostapd_1_1\x00
CTRL_IFACE monitor[0]: 2 - No such file or directory
CTRL_IFACE monitor detached /tmp/hostapd_1_1\x00
hostapd_cleanup(hapd=0x1191060 (wln1))
wln1: CTRL-EVENT-TERMINATING
hostapd_free_hapd_data(wln1)
hostapd_interface_deinit_free: driver=0x521a80 drv_priv=0x11a7230 -> hapd_deinit
nl80211: deinit ifname=wln1 disabled_11b_rates=0
nl80211: Remove monitor interface: refcount=0
nl80211: Remove beacon (ifindex=10)
netlink: Operstate: ifindex=10 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
nl80211: Set mode ifindex 10 iftype 2 (STATION)
nl80211: Teardown AP(wln1) - device_ap_sme=0 use_monitor=0
nl80211: Unsubscribe mgmt frames handle 0x88888888899162d9 (AP teardown)
hostapd_interface_free(0x118fb60)
hostapd_interface_free: free hapd 0x1191060
hostapd_cleanup_iface(0x118fb60)
hostapd_cleanup_iface_partial(0x118fb60)
hostapd_cleanup_iface: free iface=0x118fb60
hostapd_interface_deinit_free(0x11924b0)
hostapd_interface_deinit_free: num_bss=1 conf->num_bss=1
hostapd_interface_deinit(0x11924b0)
: interface state ENABLED->DISABLED
hostapd_bss_deinit: deinit bss
: AP-DISABLED
hostapd_cleanup(hapd=0x1195c10 ())
: CTRL-EVENT-TERMINATING
hostapd_free_hapd_data()
EAP: Server state machine removed
EAP: Server state machine removed
EAP: Server state machine removed
EAP: Server state machine removed
hostapd_interface_deinit_free: driver=0x526940 drv_priv=0x11a79b0 -> hapd_deinit
hostapd_interface_free(0x11924b0)
hostapd_interface_free: free hapd 0x1195c10
hostapd_cleanup_iface(0x11924b0)
hostapd_cleanup_iface_partial(0x11924b0)
hostapd_cleanup_iface: free iface=0x11924b0
-------------- next part --------------
Wireless daemon version 1.17
src/main.c:main() Using configuration directory /tmp
Loaded configuration from /tmp/main.conf
src/storage.c:storage_create_dirs() Using state directory /tmp/iwd
src/main.c:nl80211_appeared() Found nl80211 interface
src/module.c:iwd_modules_init()
station: Network configuration is disabled.
src/wsc.c:wsc_init()
src/knownnetworks.c:known_network_frequencies_load() No known frequency file found.
src/eap.c:__eap_method_enable()
src/eap-wsc.c:eap_wsc_init()
src/eap-md5.c:eap_md5_init()
src/eap-tls.c:eap_tls_init()
src/eap-ttls.c:eap_ttls_init()
src/eap-mschapv2.c:eap_mschapv2_init()
src/eap-sim.c:eap_sim_init()
src/eap-aka.c:eap_aka_prime_init()
src/eap-aka.c:eap_aka_init()
src/eap-peap.c:eap_peap_init()
src/eap-gtc.c:eap_gtc_init()
src/eap-pwd.c:eap_pwd_init()
src/manager.c:manager_wiphy_dump_callback() New wiphy rad2 added (2)
src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad1
src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad0
Wiphy: 2, Name: rad2
Permanent Address: 02:00:00:00:02:00
2.4Ghz Band:
Bitrates (non-HT):
1.0 Mbps
2.0 Mbps
5.5 Mbps
11.0 Mbps
6.0 Mbps
9.0 Mbps
12.0 Mbps
18.0 Mbps
24.0 Mbps
36.0 Mbps
48.0 Mbps
54.0 Mbps
HT Capabilities:
HT40
Short GI for 20Mhz
Short GI for 40Mhz
HT RX MCS indexes:
0-15
5Ghz Band:
Bitrates (non-HT):
6.0 Mbps
9.0 Mbps
12.0 Mbps
18.0 Mbps
24.0 Mbps
36.0 Mbps
48.0 Mbps
54.0 Mbps
HT Capabilities:
HT40
Short GI for 20Mhz
Short GI for 40Mhz
HT RX MCS indexes:
0-15
VHT Capabilities:
160 Mhz, 80+80 Mhz operation
Short GI for 80Mhz
Short GI for 160 and 80 + 80 Mhz
Max RX MCS: 0-9 for NSS: 8
Max TX MCS: 0-9 for NSS: 8
Ciphers: CCMP TKIP BIP
Supported iftypes: ad-hoc station ap p2p-client p2p-go p2p-device
src/manager.c:manager_interface_dump_callback()
src/manager.c:manager_get_interface_cb()
src/manager.c:manager_get_interface_cb()
src/manager.c:manager_interface_dump_callback()
src/manager.c:manager_interface_dump_callback()
src/manager.c:manager_interface_dump_callback()
src/manager.c:manager_interface_dump_callback()
src/wiphy.c:wiphy_update_reg_domain() New reg domain country code for (global) is 00
src/manager.c:manager_config_notify() Notification of command Del Interface(8)
src/netdev.c:netdev_link_notify() event 17 on ifindex 8
src/manager.c:manager_del_interface_cb()
src/manager.c:manager_create_interfaces() creating wlan2
src/manager.c:manager_create_interfaces() creating wlan2-p2p
src/manager.c:manager_config_notify() Notification of command New Interface(7)
src/netdev.c:netdev_link_notify() event 16 on ifindex 12
src/manager.c:manager_new_station_interface_cb()
src/netdev.c:netdev_create_from_genl() Created interface wlan2[12 200000002]
src/manager.c:manager_config_notify() Notification of command New Interface(7)
src/manager.c:manager_new_p2p_interface_cb()
src/p2p.c:p2p_device_update_from_genl() Created P2P device 200000003
src/netdev.c:netdev_link_notify() event 16 on ifindex 12
src/netdev.c:netdev_set_4addr() netdev: 12 use_4addr: 0
src/netdev.c:netdev_initial_up_cb() Interface 12 initialized
src/rrm.c:rrm_add_frame_watches()
src/netdev.c:netdev_link_notify() event 16 on ifindex 12
src/netdev.c:netdev_link_notify() event 16 on ifindex 12
src/manager.c:manager_config_notify() Notification of command Set Interface(6)
src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60)
src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60)
src/manager.c:manager_config_notify() Notification of command Set Interface(6)
src/manager.c:manager_config_notify() Notification of command Set Interface(6)
src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60)
src/netdev.c:netdev_link_notify() event 16 on ifindex 9
src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60)
src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60)
src/manager.c:manager_config_notify() Notification of command Set Interface(6)
src/manager.c:manager_config_notify() Notification of command Set Interface(6)
src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60)
src/netdev.c:netdev_link_notify() event 16 on ifindex 10
src/station.c:station_dbus_scan() Scan called from DBus
src/wiphy.c:wiphy_radio_work_insert() Inserting work item 1
src/wiphy.c:wiphy_radio_work_next() Starting work item 1
src/scan.c:scan_notify() Scan notification Trigger Scan(33)
src/scan.c:scan_request_triggered() Active scan triggered for wdev 200000002
src/station.c:station_dbus_scan_triggered() station_scan_triggered: 0
src/station.c:station_dbus_scan_triggered() Scan triggered for wlan2 subset 0
src/scan.c:scan_notify() Scan notification New Scan Results(34)
src/scan.c:get_scan_callback() get_scan_callback
src/scan.c:get_scan_done() get_scan_done
src/station.c:station_add_seen_bss() Processing BSS '12:00:00:00:00:01' with SSID: TestFT, freq: 2412, rank: 1512, strength: -3000, data_rate: 54.0
src/station.c:station_add_seen_bss() Added new Network "TestFT" security 8021x
src/wiphy.c:wiphy_radio_work_insert() Inserting work item 2
src/wiphy.c:wiphy_radio_work_done() Work item 1 done
src/wiphy.c:wiphy_radio_work_next() Starting work item 2
src/scan.c:scan_notify() Scan notification Trigger Scan(33)
src/scan.c:scan_request_triggered() Active scan triggered for wdev 200000002
src/station.c:station_dbus_scan_triggered() station_scan_triggered: 0
src/station.c:station_dbus_scan_triggered() Scan triggered for wlan2 subset 1
src/scan.c:scan_notify() Scan notification New Scan Results(34)
src/scan.c:get_scan_done() get_scan_done
src/station.c:station_add_seen_bss() Processing BSS '12:00:00:00:00:01' with SSID: TestFT, freq: 2412, rank: 1512, strength: -3000, data_rate: 54.0
src/wiphy.c:wiphy_radio_work_insert() Inserting work item 3
src/wiphy.c:wiphy_radio_work_done() Work item 2 done
src/wiphy.c:wiphy_radio_work_next() Starting work item 3
src/scan.c:scan_notify() Scan notification Trigger Scan(33)
src/scan.c:scan_request_triggered() Active scan triggered for wdev 200000002
src/station.c:station_dbus_scan_triggered() station_scan_triggered: 0
src/station.c:station_dbus_scan_triggered() Scan triggered for wlan2 subset 2
src/scan.c:scan_notify() Scan notification New Scan Results(34)
src/scan.c:get_scan_callback() get_scan_callback
src/scan.c:get_scan_done() get_scan_done
src/station.c:station_add_seen_bss() Processing BSS '12:00:00:00:00:02' with SSID: TestFT, freq: 2417, rank: 1512, strength: -3000, data_rate: 54.0
src/station.c:station_add_seen_bss() Processing BSS '12:00:00:00:00:01' with SSID: TestFT, freq: 2412, rank: 1512, strength: -3000, data_rate: 54.0
src/wiphy.c:wiphy_radio_work_done() Work item 3 done
src/station.c:station_force_connect_bssid() Attempting forced connection to BSS 12:00:00:00:00:01
src/network.c:network_connect_8021x()
src/network.c:network_connect_8021x() supplied 0 secrets, 0 more needed for EAP
src/netdev.c:netdev_cqm_rssi_update()
src/wiphy.c:wiphy_radio_work_insert() Inserting work item 4
src/wiphy.c:wiphy_radio_work_next() Starting work item 4
src/station.c:__station_connect_network() connecting to BSS 12:00:00:00:00:01
src/station.c:station_enter_state() Old State: disconnected, new state: connecting
src/scan.c:scan_notify() Scan notification Trigger Scan(33)
src/station.c:station_netdev_event() Associating
src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60)
src/scan.c:scan_notify() Scan notification New Scan Results(34)
src/netdev.c:netdev_mlme_notify() MLME notification New Station(19)
src/netdev.c:netdev_mlme_notify() MLME notification New Station(19)
src/netdev.c:netdev_mlme_notify() MLME notification Authenticate(37)
src/netdev.c:netdev_authenticate_event()
src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60)
src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60)
src/netdev.c:netdev_mlme_notify() MLME notification Associate(38)
src/netdev.c:netdev_associate_event()
src/netdev.c:netdev_link_notify() event 16 on ifindex 12
src/netdev.c:netdev_mlme_notify() MLME notification Connect(46)
src/netdev.c:netdev_connect_event()
src/netdev.c:netdev_unicast_notify() Unicast notification 129
src/netdev.c:netdev_control_port_frame_event()
src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139)
src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139)
src/netdev.c:netdev_unicast_notify() Unicast notification 129
src/netdev.c:netdev_control_port_frame_event()
src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139)
src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139)
src/netdev.c:netdev_unicast_notify() Unicast notification 129
src/netdev.c:netdev_control_port_frame_event()
src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139)
src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139)
src/netdev.c:netdev_unicast_notify() Unicast notification 129
src/netdev.c:netdev_control_port_frame_event()
src/eapol.c:eapol_eap_results_cb() EAP key material received
src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139)
src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139)
src/netdev.c:netdev_unicast_notify() Unicast notification 129
src/netdev.c:netdev_control_port_frame_event()
EAP completed with eapSuccess
src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139)
src/netdev.c:netdev_unicast_notify() Unicast notification 129
src/netdev.c:netdev_control_port_frame_event()
src/eapol.c:eapol_handle_ptk_1_of_4() ifindex=12
src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139)
src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139)
src/netdev.c:netdev_unicast_notify() Unicast notification 129
src/netdev.c:netdev_control_port_frame_event()
src/eapol.c:eapol_handle_ptk_3_of_4() ifindex=12
src/netdev.c:netdev_set_gtk() 12
src/netdev.c:netdev_set_igtk() 12
src/station.c:station_handshake_event() Setting keys
src/netdev.c:netdev_set_tk() 12
src/netdev.c:netdev_set_rekey_offload() 12
src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139)
src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139)
hardware_rekey not supported
src/station.c:station_connect_cb() 12, result: 0
src/station.c:station_connect_ok()
src/station.c:station_enter_state() Old State: connecting, new state: connected
src/wiphy.c:wiphy_radio_work_done() Work item 4 done
src/netdev.c:netdev_link_notify() event 16 on ifindex 12
src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60)
src/netdev.c:netdev_unicast_notify() Unicast notification 59
src/station.c:station_early_neighbor_report_cb() ifindex: 12, error: 0()
src/station.c:parse_neighbor_report() Neighbor report received for 12:00:00:00:00:01: ch 1 (oper class 81), MD not set
src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60)
src/netdev.c:netdev_mlme_notify() MLME notification Notify CQM(64)
src/station.c:station_dbus_disconnect()
src/station.c:station_enter_state() Old State: connected, new state: disconnecting
src/netdev.c:netdev_mlme_notify() MLME notification Del Station(20)
src/netdev.c:netdev_link_notify() event 16 on ifindex 12
src/netdev.c:netdev_mlme_notify() MLME notification Deauthenticate(39)
src/netdev.c:netdev_deauthenticate_event()
src/netdev.c:netdev_mlme_notify() MLME notification Disconnect(48)
src/netdev.c:netdev_disconnect_event()
src/netdev.c:netdev_mlme_notify() MLME notification Del Station(20)
src/station.c:station_disconnect_cb() 12, success: 1
src/station.c:station_enter_state() Old State: disconnecting, new state: disconnected
src/station.c:station_force_connect_bssid() Attempting forced connection to BSS 12:00:00:00:00:01
src/network.c:network_connect_8021x()
src/network.c:network_connect_8021x() supplied 0 secrets, 0 more needed for EAP
src/netdev.c:netdev_cqm_rssi_update()
src/wiphy.c:wiphy_radio_work_insert() Inserting work item 5
src/wiphy.c:wiphy_radio_work_next() Starting work item 5
src/station.c:__station_connect_network() connecting to BSS 12:00:00:00:00:01
src/station.c:station_enter_state() Old State: disconnected, new state: connecting
src/netdev.c:netdev_mlme_notify() MLME notification New Station(19)
src/netdev.c:netdev_mlme_notify() MLME notification New Station(19)
src/netdev.c:netdev_mlme_notify() MLME notification Authenticate(37)
src/netdev.c:netdev_authenticate_event()
src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60)
src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60)
src/netdev.c:netdev_mlme_notify() MLME notification Associate(38)
src/netdev.c:netdev_associate_event()
src/netdev.c:netdev_set_gtk() 12
src/netdev.c:netdev_set_igtk() 12
src/station.c:station_handshake_event() Setting keys
src/netdev.c:netdev_set_tk() 12
src/netdev.c:netdev_mlme_notify() MLME notification Connect(46)
src/netdev.c:netdev_connect_event()
src/netdev.c:netdev_link_notify() event 16 on ifindex 12
src/station.c:station_connect_cb() 12, result: 0
src/station.c:station_connect_ok()
src/station.c:station_enter_state() Old State: connecting, new state: connected
src/wiphy.c:wiphy_radio_work_done() Work item 5 done
src/netdev.c:netdev_link_notify() event 16 on ifindex 12
src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60)
src/netdev.c:netdev_unicast_notify() Unicast notification 59
src/station.c:station_early_neighbor_report_cb() ifindex: 12, error: 0()
src/station.c:parse_neighbor_report() Neighbor report received for 12:00:00:00:00:01: ch 1 (oper class 81), MD not set
src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60)
src/netdev.c:netdev_mlme_notify() MLME notification Notify CQM(64)
src/station.c:station_force_roam() Attempting forced roam to BSS 12:00:00:00:00:02
src/station.c:station_transition_start() 12, target 12:00:00:00:00:02
src/netdev.c:netdev_cqm_rssi_update()
src/wiphy.c:wiphy_radio_work_insert() Inserting work item 6
src/wiphy.c:wiphy_radio_work_next() Starting work item 6
src/station.c:station_enter_state() Old State: connected, new state: roaming
src/netdev.c:netdev_mlme_notify() MLME notification Del Station(20)
src/netdev.c:netdev_link_notify() event 16 on ifindex 12
src/netdev.c:netdev_mlme_notify() MLME notification Deauthenticate(39)
src/netdev.c:netdev_deauthenticate_event()
src/netdev.c:netdev_mlme_notify() MLME notification Disconnect(48)
src/netdev.c:netdev_disconnect_event()
src/netdev.c:netdev_mlme_notify() MLME notification New Station(19)
src/netdev.c:netdev_mlme_notify() MLME notification New Station(19)
src/netdev.c:netdev_mlme_notify() MLME notification Del Station(20)
src/netdev.c:netdev_mlme_notify() MLME notification Authenticate(37)
src/netdev.c:netdev_authenticate_event()
authentication timed out
src/wiphy.c:wiphy_radio_work_done() Work item 6 done
src/station.c:station_reassociate_cb() 12, result: 1
src/station.c:station_roam_failed() 12
src/station.c:station_disassociated() 12
src/station.c:station_enter_state() Old State: roaming, new state: disconnected
src/station.c:station_enter_state() Old State: disconnected, new state: autoconnect_quick
src/wiphy.c:wiphy_radio_work_insert() Inserting work item 7
src/wiphy.c:wiphy_radio_work_next() Starting work item 7
src/scan.c:scan_notify() Scan notification Trigger Scan(33)
src/scan.c:scan_request_triggered() Active scan triggered for wdev 200000002
src/station.c:station_quick_scan_triggered() Quick scan triggered for wlan2
src/scan.c:scan_notify() Scan notification New Scan Results(34)
src/scan.c:get_scan_callback() get_scan_callback
src/scan.c:get_scan_callback() get_scan_callback
src/scan.c:get_scan_done() get_scan_done
src/station.c:station_add_seen_bss() Processing BSS '12:00:00:00:00:02' with SSID: TestFT, freq: 2417, rank: 1512, strength: -3000, data_rate: 54.0
src/station.c:station_add_seen_bss() Processing BSS '12:00:00:00:00:01' with SSID: TestFT, freq: 2412, rank: 1512, strength: -3000, data_rate: 54.0
src/station.c:station_autoconnect_next() autoconnect: Trying SSID: TestFT
src/station.c:station_autoconnect_next() autoconnect: '12:00:00:00:00:01' freq: 2412, rank: 1512, strength: -3000
src/station.c:station_autoconnect_next() autoconnect: network_autoconnect: Operation not permitted (-1)
src/station.c:station_enter_state() Old State: autoconnect_quick, new state: autoconnect_full
src/scan.c:scan_periodic_start() Starting periodic scan for wdev 200000002
src/wiphy.c:wiphy_radio_work_insert() Inserting work item 8
src/wiphy.c:wiphy_radio_work_done() Work item 7 done
src/wiphy.c:wiphy_radio_work_next() Starting work item 8
src/scan.c:scan_notify() Scan notification Trigger Scan(33)
src/scan.c:scan_request_triggered() Passive scan triggered for wdev 200000002
src/scan.c:scan_periodic_triggered() Periodic scan triggered for wdev 200000002
src/netdev.c:netdev_mlme_notify() MLME notification Del Station(20)
src/netdev.c:netdev_mlme_notify() MLME notification Stop AP(16)
src/netdev.c:netdev_link_notify() event 16 on ifindex 9
src/netdev.c:netdev_mlme_notify() MLME notification Del Station(20)
src/netdev.c:netdev_mlme_notify() MLME notification Stop AP(16)
src/netdev.c:netdev_link_notify() event 16 on ifindex 10
src/wiphy.c:wiphy_reg_notify() Notification of command Reg Change(36)
src/wiphy.c:wiphy_update_reg_domain() New reg domain country code for (global) is XX
src/netdev.c:netdev_link_notify() event 16 on ifindex 9
src/netdev.c:netdev_link_notify() event 16 on ifindex 9
src/netdev.c:netdev_link_notify() event 16 on ifindex 10
Terminate
src/netdev.c:netdev_free() Freeing netdev wlan2[12]
src/device.c:device_free()
src/station.c:station_free()
src/scan.c:scan_periodic_stop() Stopping periodic scan for wdev 200000002
src/scan.c:scan_cancel() Trying to cancel scan id 8 for wdev 200000002
src/scan.c:scan_cancel() Scan is at the top of the queue and triggered
Removing scan context for wdev 200000002
src/scan.c:scan_context_free() sc: 0x1041e70
src/wiphy.c:wiphy_radio_work_done() Work item 8 done
src/netdev.c:netdev_link_notify() event 16 on ifindex 12
src/scan.c:scan_notify() Scan notification Scan Aborted(35)
src/netdev.c:netdev_link_notify() event 16 on ifindex 10
src/module.c:iwd_modules_exit()
src/eap.c:__eap_method_disable()
src/eap-wsc.c:eap_wsc_exit()
src/eap-md5.c:eap_md5_exit()
src/eap-tls.c:eap_tls_exit()
src/eap-ttls.c:eap_ttls_exit()
src/eap-mschapv2.c:eap_mschapv2_exit()
src/eap-sim.c:eap_sim_exit()
src/eap-aka.c:eap_aka_prime_exit()
src/eap-aka.c:eap_aka_exit()
src/eap-peap.c:eap_peap_exit()
src/eap-gtc.c:eap_gtc_exit()
src/eap-pwd.c:eap_pwd_exit()
Removing scan context for wdev 200000003
src/scan.c:scan_context_free() sc: 0x1036560
src/wsc.c:wsc_exit()
src/wiphy.c:wiphy_free() Freeing wiphy rad0[0]
src/wiphy.c:wiphy_free() Freeing wiphy rad1[1]
src/wiphy.c:wiphy_free() Freeing wiphy rad2[2]
D-Bus disconnected, quitting...
-------------- next part --------------
hw_mode=g
channel=2
ssid=TestFT
utf8_ssid=1
ctrl_interface=/var/run/hostapd
r1_key_holder=000000000002
nas_identifier=dummy2
wpa=2
# Can support WPA-EAP and FT-EAP (space separated list) at the same
# time but we want to force FT
wpa_key_mgmt=WPA-EAP FILS-SHA256
wpa_pairwise=CCMP
ieee8021x=1
fils_realm=example.com
wpa_ptk_rekey=30
wpa_group_rekey=80
ieee80211w=1
rsn_preauth=0
disable_pmksa_caching=1
# Allow PMK cache to be shared opportunistically among configured interfaces
# and BSSes (i.e., all configurations within a single hostapd process).
okc=1
mobility_domain=1234
reassociation_deadline=60000
r0kh=12:00:00:00:00:01 nas1.w1.fi 000102030405060708090a0b0c0d0e0f
r0kh=12:00:00:00:00:02 nas2.w1.fi 000102030405060708090a0b0c0d0e0f
r1kh=12:00:00:00:00:01 00:00:00:00:00:01 000102030405060708090a0b0c0d0e0f
r1kh=12:00:00:00:00:02 00:00:00:00:00:02 000102030405060708090a0b0c0d0e0f
# Push mode only needed for 8021x, not PSK mode since msk already known
pmk_r1_push=1
ft_over_ds=0
ap_table_expiration_time=36000
ap_table_max_size=10
rrm_neighbor_report=1
auth_server_addr=127.0.0.1
auth_server_port=1812
auth_server_shared_secret=secret
nas_identifier=nas2.w1.fi
-------------- next part --------------
hw_mode=g
channel=1
ssid=TestFT
utf8_ssid=1
ctrl_interface=/var/run/hostapd
r1_key_holder=000000000001
nas_identifier=dummy1
wpa=2
# Can support WPA-EAP and FT-EAP (space separated list) at the same
# time but we want to force FT
wpa_key_mgmt=WPA-EAP FILS-SHA256
wpa_pairwise=CCMP
ieee8021x=1
fils_realm=example.com
wpa_ptk_rekey=30
wpa_group_rekey=80
ieee80211w=1
rsn_preauth=0
disable_pmksa_caching=1
# Allow PMK cache to be shared opportunistically among configured interfaces
# and BSSes (i.e., all configurations within a single hostapd process).
okc=1
mobility_domain=1234
reassociation_deadline=60000
r0kh=12:00:00:00:00:01 nas1.w1.fi 000102030405060708090a0b0c0d0e0f
r0kh=12:00:00:00:00:02 nas2.w1.fi 000102030405060708090a0b0c0d0e0f
r1kh=12:00:00:00:00:01 00:00:00:00:00:01 000102030405060708090a0b0c0d0e0f
r1kh=12:00:00:00:00:02 00:00:00:00:00:02 000102030405060708090a0b0c0d0e0f
# Push mode only needed for 8021x, not PSK mode since msk already known
pmk_r1_push=1
ft_over_ds=0
ap_table_expiration_time=36000
ap_table_max_size=10
rrm_neighbor_report=1
auth_server_addr=127.0.0.1
auth_server_port=1812
auth_server_shared_secret=secret
nas_identifier=nas1.w1.fi
-------------- next part --------------
driver=none
radius_server_clients=/tmp/certs/radius-clients.text
radius_server_auth_port=1812
eap_user_file=/tmp/secrets/eap-user.text
eap_server=0
eap_server_erp=1
erp_send_reauth_start=1
erp_domain=example.com
fils_realm=example.com
disable_pmksa_caching=1
pwd_group=19
wpa_group_rekey=30
wpa_ptk_rekey=30
More information about the Hostap
mailing list