[PATCH] Revert "wpa_supplicant: Send EAPOL frames over nl80211 where available"

Krishna Chaitanya chaitanya.mgit at gmail.com
Tue Jul 25 09:47:18 PDT 2023


On Fri, Jul 21, 2023 at 8:13 PM Fabio Estevam <festevam at gmail.com> wrote:
>
> On Fri, Jul 21, 2023 at 11:11 AM Fabio Estevam <festevam at gmail.com> wrote:
> >
> > On Fri, Jul 21, 2023 at 9:37 AM Fabio Estevam <festevam at gmail.com> wrote:
> >
> > > Today I tried it again against top of head:
> > > 96deacf5d71022b263a27113de52c1f13efdd6ec
> > > and Wifi is functional on QCA9377!
> >
> > Sorry, the revert patch got applied by mistake and that's why it worked.
> >
> > I rebuilt a clean tree with no patch applied, hostap sha is
> > 96deacf5d71022b263a27113de52c1f13efdd6ec.
> >
> > The error still happens:
> >
> > # wpa_supplicant -iwlan0 -c /etc/wpa.conf &
> > # Successfully initialized wpa_supplicant
> > wlan0: SME: Trying to authenticat[   54.014745] wlan0: authenticate
> > with xx:xx:xx:xx:xx:xx
> > e with xx:xx:xx:xx:xx:xx (SSID='FABIOHOUSE' freq=2412 MHz)
> > [   54.026846] wlan0: 80 MHz not supported, disabling VHT
> > [   54.076840] wlan0: send auth to xx:xx:xx:xx:xx:xx (try 1/3)
> > [   54.090265] wlan0: authenticated
> > wlan0: Trying to associate with xx:xx:xx:xx:xx:xx (SSID='FABIOHO[
> > 54.100333] wlan0: associate with xx:xx:xx:xx:xx:xx (try 1/3)
> > USE' freq=2412 MHz)
> > [   54.120615] wlan0: RX AssocResp from xx:xx:xx:xx:xx:xx (capab=0x411
> > status=0 aid=4)
> > [   54.155201] wlan0: associated
> > wlan0: Associated with xx:xx:xx:xx:xx:xx
> > wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
> > wlan0: Unknown event 37
>
> Here is log of wpa_supplicant -dd.
>
> If you have any debug patch, I would be glad to test it.
I will try and repro locally by mimicing ath11k in hwsim first before
attempting to fix.
> # wpa_supplicant -dd -iwlan0 -c /etc/wpa.conf &
> # wpa_supplicant v2.11-devel
> random: Trying to read entropy from /dev/random
> Successfully initialized wpa_supplicant
> Initializing interface 'wlan0' conf '/etc/wpa.conf' driver 'default'
> ctrl_interface 'N/A' bridge 'N/A'
> Configuration file '/etc/wpa.conf' -> '/etc/wpa.conf'
> Reading configuration file '/etc/wpa.conf'
> Line: 1 - start of a new network block
> ssid - hexdump_ascii(len=10):
>      46 41 42 49 4f 48 4f 55 53 45                     FABIOHOUSE
> PSK - hexdump(len=32): [REMOVED]
> Priority group 0
>    id=0 ssid='FABIOHOUSE'
> nl80211: TDLS supported
> nl80211: TDLS external setup
> nl80211: Supported cipher 00-0f-ac:1
> nl80211: Supported cipher 00-0f-ac:5
> nl80211: Supported cipher 00-0f-ac:2
> nl80211: Supported cipher 00-0f-ac:4
> nl80211: Supported cipher 00-0f-ac:6
> nl80211: Supported cipher 00-0f-ac:13
> nl80211: Supported cipher 00-0f-ac:11
> nl80211: Supported cipher 00-0f-ac:12
> nl80211: Supports Probe Response offload in AP mode
> nl80211: Using driver-based off-channel TX
> nl80211: Driver-advertised extended capabilities (default) -
> hexdump(len=8): 04 00 00 00 00 00 00 40
> nl80211: Driver-advertised extended capabilities mask (default) -
> hexdump(len=8): 04 00 00 00 00 00 00 40
> nl80211: Use separate P2P group interface (driver advertised support)
> nl80211: Enable multi-channel concurrent (driver advertised support)
> nl80211: use P2P_DEVICE support
> nl80211: key_mgmt=0x1fd0f enc=0xf0f auth=0x7 flags=0x4000530fb7bfbe0
> rrm_flags=0x30 probe_resp_offloads=0x7 max_stations=32
> max_remain_on_chan=5000 max_scan_ssids=16
> nl80211: interface wlan0 in phy phy0
> nl80211: Set mode ifindex 6 iftype 2 (STATION)
> nl80211: Subscribe to mgmt frames with non-AP handle 0x23a53d0
> nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION)
> nl_handle=0x23a53d0 match=0801 multicast=0
> nl80211: kernel reports: Match already configured
> nl80211: Register frame command failed (type=208): ret=-114 (Operation
> already in progress)
> nl80211: Register frame match - hexdump(len=2): 08 01
> nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION)
> nl_handle=0x23a53d0 match=040e multicast=0
> nl80211: kernel reports: Match already configured
> nl80211: Register frame command failed (type=208): ret=-114 (Operation
> already in progress)
> nl80211: Register frame match - hexdump(len=2): 04 0e
> nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION)
> nl_handle=0x23a53d0 match=06 multicast=0
> nl80211: kernel reports: Match already configured
> nl80211: Register frame command failed (type=208): ret=-114 (Operation
> already in progress)
> nl80211: Register frame match - hexdump(len=1): 06
> nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION)
> nl_handle=0x23a53d0 match=0a07 multicast=0
> nl80211: kernel reports: Match already configured
> nl80211: Register frame command failed (type=208): ret=-114 (Operation
> already in progress)
> nl80211: Register frame match - hexdump(len=2): 0a 07
> nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION)
> nl_handle=0x23a53d0 match=0a11 multicast=0
> nl80211: kernel reports: Match already configured
> nl80211: Register frame command failed (type=208): ret=-114 (Operation
> already in progress)
> nl80211: Register frame match - hexdump(len=2): 0a 11
> nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION)
> nl_handle=0x23a53d0 match=1101 multicast=0
> nl80211: kernel reports: Match already configured
> nl80211: Register frame command failed (type=208): ret=-114 (Operation
> already in progress)
> nl80211: Register frame match - hexdump(len=2): 11 01
> nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION)
> nl_handle=0x23a53d0 match=1102 multicast=0
> nl80211: kernel reports: Match already configured
> nl80211: Register frame command failed (type=208): ret=-114 (Operation
> already in progress)
> nl80211: Register frame match - hexdump(len=2): 11 02
> nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION)
> nl_handle=0x23a53d0 match=0505 multicast=0
> nl80211: kernel reports: Match already configured
> nl80211: Register frame command failed (type=208): ret=-114 (Operation
> already in progress)
> nl80211: Register frame match - hexdump(len=2): 05 05
> nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION)
> nl_handle=0x23a53d0 match=0500 multicast=0
> nl80211: kernel reports: Match already configured
> nl80211: Register frame command failed (type=208): ret=-114 (Operation
> already in progress)
> nl80211: Register frame match - hexdump(len=2): 05 00
> nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION)
> nl_handle=0x23a53d0 match=1301 multicast=0
> nl80211: kernel reports: Match already configured
> nl80211: Register frame command failed (type=208): ret=-114 (Operation
> already in progress)
> nl80211: Register frame match - hexdump(len=2): 13 01
> nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION)
> nl_handle=0x23a53d0 match=1305 multicast=0
> nl80211: kernel reports: Match already configured
> nl80211: Register frame command failed (type=208): ret=-114 (Operation
> already in progress)
> nl80211: Register frame match - hexdump(len=2): 13 05
> nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION)
> nl_handle=0x23a53d0 match=7e506f9a1a multicast=0
> nl80211: kernel reports: Match already configured
> nl80211: Register frame command failed (type=208): ret=-114 (Operation
> already in progress)
> nl80211: Register frame match - hexdump(len=5): 7e 50 6f 9a 1a
> nl80211: Failed to register Action frame processing - ignore for now
> rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
> netlink: Operstate: ifindex=6 linkmode=1 (userspace-control),
> operstate=5 (IF_OPER_DORMANT)
> Add interface wlan0 to a new radio phy0
> nl80211: Regulatory information - country=00
> nl80211: 2402-2472 @ 40 MHz 20 mBm
> nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR)
> nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
> nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
> nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
> nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
> nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
> nl80211: 57240-63720 @ 2160 MHz 0 mBm
> nl80211: Added 802.11b mode based on 802.11g information
> nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447
> 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED]
> nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR]
> 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR]
> 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
> 5540[NO_IR][RADAR] 5560[NO_IR][RADAR] 5580[NO_IR][RADAR]
> 5600[NO_IR][RADAR] 5620[NO_IR][RADAR] 5640[NO_IR][RADAR]
> 5660[NO_IR][RADAR] 5680[NO_IR][RADAR] 5700[NO_IR][RADAR] 5720[NO_IR]
> 5745[NO_IR] 5765[NO_IR] 5785[NO_IR] 5805[NO_IR] 5825[NO_IR]
> 5845[NO_IR] 5865[DISABLED]
> nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447
> 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED]
> wlan0: Own MAC address: 00:1f:7b:31:04:a0
> wpa_driver_nl80211_set_key: ifindex=6 (wlan0) alg=0 addr=(nil)
> key_idx=0 set_tx=0 seq_len=0 key_len=0 key_flag=0x10 link_id=-1
> nl80211: DEL_KEY
>    broadcast key
> wpa_driver_nl80211_set_key: ifindex=6 (wlan0) alg=0 addr=(nil)
> key_idx=1 set_tx=0 seq_len=0 key_len=0 key_flag=0x10 link_id=-1
> nl80211: DEL_KEY
>    broadcast key
> wpa_driver_nl80211_set_key: ifindex=6 (wlan0) alg=0 addr=(nil)
> key_idx=2 set_tx=0 seq_len=0 key_len=0 key_flag=0x10 link_id=-1
> nl80211: DEL_KEY
>    broadcast key
> wpa_driver_nl80211_set_key: ifindex=6 (wlan0) alg=0 addr=(nil)
> key_idx=3 set_tx=0 seq_len=0 key_len=0 key_flag=0x10 link_id=-1
> nl80211: DEL_KEY
>    broadcast key
> wpa_driver_nl80211_set_key: ifindex=6 (wlan0) alg=0 addr=(nil)
> key_idx=4 set_tx=0 seq_len=0 key_len=0 key_flag=0x10 link_id=-1
> nl80211: DEL_KEY
>    broadcast key
> wpa_driver_nl80211_set_key: ifindex=6 (wlan0) alg=0 addr=(nil)
> key_idx=5 set_tx=0 seq_len=0 key_len=0 key_flag=0x10 link_id=-1
> nl80211: DEL_KEY
>    broadcast key
> wlan0: RSN: flushing PMKID list in the driver
> nl80211: Flush PMKIDs
> wlan0: Setting scan request: 0.100000 sec
> TDLS: TDLS operation supported by driver
> TDLS: Driver uses external link setup
> TDLS: Driver does not support TDLS channel switching
> wlan0: Added interface wlan0
> wlan0: State: DISCONNECTED -> DISCONNECTED
> nl80211: Set wlan0 operstate 0->0 (DORMANT)
> netlink: Operstate: ifindex=6 linkmode=-1 (no change), operstate=5
> (IF_OPER_DORMANT)
> nl80211: Skip set_supp_port(unauthorized) while not associated
> random: Got 20/20 bytes from /dev/random
> wlan0: State: DISCONNECTED -> SCANNING
> wlan0: Starting AP scan for wildcard SSID
> wlan0: Add radio work 'scan'@0x23a3fd8
> wlan0: First radio work item in the queue - schedule start immediately
> wlan0: Starting radio work 'scan'@0x23a3fd8 after 0.000219 second wait
> wlan0: nl80211: scan request
> nl80211: Scan SSID
> nl80211: Scan co-located APs on 6 GHz
> nl80211: Scan extra IEs - hexdump(len=13): 7f 0b 04 00 00 00 00 00 40
> 40 00 00 20
> Scan requested (ret=0) - scan timeout 10 seconds
> nl80211: Event message available
> nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
> wlan0: nl80211: Scan trigger
> wlan0: Event SCAN_STARTED (47) received
> wlan0: Own scan request started a scan in 0.000675 seconds
> nl80211: Event message available
> nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
> wlan0: nl80211: New scan results available
> nl80211: Scan probed for SSID ''
> nl[  591.384490] wlan0: authenticate with xx:xx:xx:xx:xx:xx
> 80211: Scan included frequencies:[  591.392674] wlan0: 80 MHz not
> supported, disabling VHT
>  2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180
> 5200 5220 5240 5260 5280 5300 5320 5500 5520 5540 5560 5580 5600 5620
> 5640 5660 5680 5700 5720 5745 5765 5785 5805 5825 5845
> wlan0: Event SCAN_RESULTS (3) received
> wlan0: Scan completed in 4.858982 seconds
> nl80211: Received scan results (2 BSSes)
> wlan0: BSS: Start scan result update 1
> wlan0: BSS: Add new id 0 BSSID xx:xx:xx:xx:xx:xx SSID 'FABIOHOUSE' freq 2412
> wlan0: BSS: Add new id 1 BS[  591.439095] wlan0: send auth to
> xx:xx:xx:xx:xx:xx (try 1/3)
> SID 74:3a:ef:af:a7:6b SSID 'FABIOHOUSE_5G' freq 5660
> BSS: last_scan_res_used=2/32
> wlan0: New sc[  591.452923] wlan0: authenticated
> an results available (own=1 ext=0)
> wlan0: Radio work 'scan'@0x23a3fd8 done in 4.875944 seconds
> wlan0: radio_work_free('scan'@0x23a3fd8): num_active_works --> 0
> wlan0: Selecting BSS from priority group 0
> wlan0: 0: xx:xx:xx:xx:xx:xx ssid='FABIOHOUSE' wpa_ie_len=0
> rsn_ie_len=20 caps=0x411 level=-70 freq=2412  wps
> wlan0:    selected based on RSN IE
> wlan0:    selected BSS xx:xx:xx:xx:xx:xx ssid='FABIOHOUSE'
> wlan0: Considering connect request: reassociate: 0  selected:
> xx:xx:xx:xx:xx:xx  bssid: 00:00:00:00:00:00  pending:
> 00:00:00:00:00:00  wpa_state: SCANNING  ssid=0x23a2ac8
> current_ssid=(nil)
> wlan0: Request association with xx:xx:xx:xx:xx:xx
> TDLS: TDLS is allowed in the target BSS
> TDLS: TDLS channel switch allowed in the target BSS
> wlan0: No ongoing scan/p2p-scan found to abort
> wlan0: Add radio work 'sme-connect'@0x23ad6f8
> wlan0: First radio work item in the queue - schedule start immediately
> wlan0: Starting radio work 'sme-connect'@0x23ad6f8 after 0.000244 second wait
> wlan0: WPA: clearing own WPA/RSN IE
> wlan0: RSN: clearing own RSNXE
> wlan0: Automatic auth_alg selection: 0x1
> wlan0: RSN: using IEEE 802.11i/D9.0
> wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
> wlan0: WPA: Selected mgmt group cipher 32
> wlan0: WPA: clearing AP WPA IE
> WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00
> 0f ac 04 01 00 00 0f ac 02 0c 00
> wlan0: WPA: clearing AP RSNXE
> wlan0: WPA: AP group 0x10 network profile group 0x18; available group 0x10
> wlan0: WPA: using GTK CCMP
> wlan0: WPA: AP pairwise 0x10 network profile pairwise 0x18; available
> pairwise 0x10
> wlan0: WPA: using PTK CCMP
> wlan0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available key_mgmt 0x2
> wlan0: WPA: using KEY_MGMT WPA-PSK
> wlan0: WPA: AP mgmt_group_cipher 0x20 network profile
> mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0
> wlan0: WPA: not using MGMT group cipher
> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04
> 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
> RSN: Set own RSNXE default - hexdump(len=0):
> PSK (set in config) - hexdump(len=32): [REMOVED]
> WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
> RRM: Determining whether RRM can be used - device support: 0x30
> RRM: No RRM in network
> Added supported operating classes IE - hexdump(len=22): 3b 14 51 51 53
> 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82
> wlan0: Cancelling scan request
> wlan0: SME: Trying to authenticate with xx:xx:xx:xx:xx:xx
> (SSID='FABIOHOUSE' freq=2412 MHz)
> wlan0: State: SCANNING -> AUTHENTICATING
> nl80211: Authenticate (ifindex=6)
>   * bssid=xx:xx:xx:xx:xx:xx
>   * freq=2412
>   * SSID=FABIOHOUSE
>   * IEs - hexdump(len=0): [NULL]
>   * Auth Type 0
> nl80211: Authentication request send successfully
> RTM_NEWLINK: ifi_index=6 ifname=wlan0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
> nl80211: Event message available
> nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
> nl80211: New station xx:xx:xx:xx:xx:xx
> nl80211: Event message available
> nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlan0
> nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on
> wlan0(00:1f:7b:31:04:a0) A1=00:1f:7b:31:04:a0 A2=xx:xx:xx:xx:xx:xx on
> link_id=-1
> nl80211: MLME event frame - hexdump(len=41): b0 00 3a 01 00 1f 7b 31
> 04 a0 74 3a ef af a7 6a 74 3a ef af a7 6a 40 2d 00 00 02 00 00 00 dd
> 09 00 10 18 02 03 00 1c 00 00
> nl80211: Authenticate event
> wlan0: Event AUTH (10) received
> wlan0: SME: Authentication response: peer=xx:xx:xx:xx:xx:xx
> auth_type=0 auth_transaction=2 status_code=0
> SME: Authentication response IEs - hexdump(len=11): dd 09 00 10 18 02
> 03 00 1c 00 00
> SME: Association Request IEs - hexdump(len=57): 30 14 01 00 00 0f ac
> 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 7f 0b 04 00 00 00 00 00
> 40 40 00 00 20 3b 14 51 51 53 54 73 74 75 76 77 78 79 7a 7b 7c 7d 7e
> 7f 80 81 82
> wlan0: Trying to associate with xx:xx:xx:xx:xx:xx (SSID='FABIOHO[
> 591.799664] wlan0: 80 MHz not supported, disabling VHT
> USE' freq=2412 MHz)
> wlan0: State: AUTHENTICATING -> ASSOCIATING
> nl80211: Set wlan0 operstate 0->0 (DORMANT)
> netlink: Operstate: ifindex=6 linkmode=-1 (no change), operstate=5
> (IF_OPER_DORMANT)
> nl80211: Skip set_supp_port(unauthorized) while not associated
> WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01
> 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
> wlan0: RSN: clearing own RSNXE
> nl80211: Associate (ifindex=6)
>   * bssid=xx:xx:xx:xx:xx:xx
>   * freq=2412
>   * SSID=FABIOHOUSE
> [  591.848580] wlan0: associate with xx:xx:xx:xx:xx:xx (try 1/3)
>   * IEs - hexdump(len=57): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04
> 01 00 00 0f ac 02 0c 00 7f 0b 04 00 00 00 00 00 40 40 00 00 20 3b 14
> 51 51 53 54 73 74 75 [  591.867519] wlan0: RX AssocResp from
> xx:xx:xx:xx:xx:xx (capab=0x411 status=0 aid=4)
> 76 77 78 79 7a 7b 7c 7d 7e 7f 80 81 82
>   * WPA Versions 0x2
>   * pairwise=0xfac04
>   * group=0xfac04
>   * akm[0]=0xfac02
> nl80211: Association request send successfully
> nl80211: Event message available
> nl80211: Drv Event 20 (NL80211_CMD_DEL_STATIO[  591.897633] wlan0: associated
> N) received for wlan0
> nl80211: Delete station xx:xx:xx:xx:xx:xx
This is peculiar, not sure why DEL_STA is being triggered.
> nl80211: Event message available
> nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
> nl80211: New station xx:xx:xx:xx:xx:xx
> nl80211: Event message available
> nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wlan0
> wlan0: Event EAPOL_RX (23) received
> wlan0: RX EAPOL from xx:xx:xx:xx:xx:xx (encrypted=0)
This is always received before the CMD_ASSOCIATE, though WPA supplicant seems
to handle it, but I suspect some kind of race here.
> RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00
> 00 00 00 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e ac 5b f6 b2 a0 87 7d
> fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 fe
> e1 4a 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a
> wlan0: Not associated - Delay processing of received EAPOL frame
> (state=ASSOCIATING connected_addr=00:00:00:00:00:00)
> RTM_NEWLINK: ifi_index=6 ifname=wlan0 operstate=5 linkmode=1
> ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> nl80211: Event message available
> nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlan0
> nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on
> wlan0(00:1f:7b:31:04:a0) A1=00:1f:7b:31:04:a0 A2=xx:xx:xx:xx:xx:xx on
> link_id=-1
> nl80211: MLME event frame - hexdump(len=171): 10 00 3a 01 00 1f 7b 31
> 04 a0 74 3a ef af a7 6a 74 3a ef af a7 6a 90 2d 11 04 00 00 04 c0 01
> 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a ad 01 17 ff 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01
> 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08
> 04 00 08 00 00 00 00 40 dd 18 00 50 f2 04 10 4a 00 01 10 10 3b 00 01
> 03 10 49 00 06 00 37 2a 00 01 20 dd 09 00 10 18 02 03 00 1c 00 00 dd
> 18 00 50 f2 02 01 01 88 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32
> 2f 00
> nl80211: Associate event
> wlan0: CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:xx:xx:xx reason=3
> locally_generated=1
> BSSID xx:xx:xx:xx:xx:xx ignore list count incremented to 5, ignoring
> for 600 seconds
> wlan0: CTRL-EVENT-DSCP-POLICY clear_all
> wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
> nl80211: Associated on 2412 MHz
> nl80211: Associated with xx:xx:xx:xx:xx:xx
> nl80211: Set drv->ssid based on scan res info to 'FABIOHOUSE'
> wlan0: Event ASSOC (0) received
> wlan0: Association info event
> req_ies - hexdump(len=122): 00 0a 46 41 42 49 4f 48 4f 55 53 45 01 08
> 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01
> 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 2d 1a 6f 19 1b ff 00 00 00 00
> 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 7f 0b 04 00 00
> 00 00 00 40 40 00 00 20 3b 14 51 51 53 54 73 74 75 76 77 78 79 7a 7b
> 7c 7d 7e 7f 80 81 82 dd 07 00 50 f2 02 00 01 00
> resp_ies - hexdump(len=141): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12
> 18 60 2d 1a ad 01 17 ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 3d 16 01 00 04 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 7f 08 04 00 08 00 00 00 00 40 dd 18 00 50 f2
> 04 10 4a 00 01 10 10 3b 00 01 03 10 49 00 06 00 37 2a 00 01 20 dd 09
> 00 10 18 02 03 00 1c 00 00 dd 18 00 50 f2 02 01 01 88 00 03 a4 00 00
> 27 a4 00 00 42 43 5e 00 62 32 2f 00
> wlan0: freq=2412 MHz
> WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01
> 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
> wlan0: RSN: clearing own RSNXE
> wlan0: State: ASSOCIATING -> ASSOCIATED
> nl80211: Set wlan0 operstate 0->0 (DORMANT)
> netlink: Operstate: ifindex=6 linkmode=-1 (no change), operstate=5
> (IF_OPER_DORMANT)
> nl80211: Set supplicant port unauthorized for xx:xx:xx:xx:xx:xx
> wlan0: Associated to a new BSS: BSSID=xx:xx:xx:xx:xx:xx
> wlan0: Associated with xx:xx:xx:xx:xx:xx
> wlan0: WPA: Association event - clear replay counter
> wlan0: WPA: Clear old PTK
> TDLS: Remove peers on association
> wlan0: Setting authentication timeout: 10 sec 0 usec
> wlan0: Cancelling scan request
> wlan0: Process pending EAPOL frame that was received just before
> association notification
> wlan0: RX EAPOL from xx:xx:xx:xx:xx:xx (encrypted=0)
> RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00
> 00 00 00 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e ac 5b f6 b2 a0 87 7d
> fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 fe
> e1 4a 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a
> wlan0: Setting authentication timeout: 10 sec 0 usec
> wlan0: IEEE 802.1X RX: version=2 type=3 length=117
> WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00
> 00 00 00 00 00 00 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e ac 5b f6 b2
> a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f
> ac 04 fe e1 4a 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a
> wlan0:   EAPOL-Key type=2
> wlan0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> wlan0:   key_length=16 key_data_length=22
>   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_nonce - hexdump(len=32): 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e
> ac 5b f6 b2 a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17
>   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> wlan0: WPA: RX message 1 of 4-Way Handshake from xx:xx:xx:xx:xx:xx (ver=2)
> RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 fe e1 4a 3c
> f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a
> WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 fe e1 4a
> 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a
> RSN: PMKID from Authenticator - hexdump(len=16): fe e1 4a 3c f8 09 e0
> 2e 78 f3 58 1c 07 73 b3 0a
> wlan0: RSN: no matching PMKID found
> wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE
> Get randomness: len=32 entropy=3
> WPA: Renewed SNonce - hexdump(len=32): 06 d0 6b ac 57 7d 60 94 c0 bc
> b8 d8 26 20 6a 1f 26 3e 0a 42 5f c5 8a bb b5 14 4a d1 8a 61 9b 5c
> WPA: PTK derivation using PRF(SHA1)
> WPA: PTK derivation - A1=00:1f:7b:31:04:a0 A2=xx:xx:xx:xx:xx:xx
> WPA: Nonce1 - hexdump(len=32): 06 d0 6b ac 57 7d 60 94 c0 bc b8 d8 26
> 20 6a 1f 26 3e 0a 42 5f c5 8a bb b5 14 4a d1 8a 61 9b 5c
> WPA: Nonce2 - hexdump(len=32): 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e
> ac 5b f6 b2 a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=48): [REMOVED]
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: KEK - hexdump(len=16): [REMOVED]
> WPA: TK - hexdump(len=16): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01
> 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
> WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00
> wlan0: WPA: Sending EAPOL-Key 2/4
> WPA: Send EAPOL-Key frame to xx:xx:xx:xx:xx:xx ver=2 mic_len=16 key_mgmt=0x2
> WPA: EAPOL-Key MIC using HMAC-SHA1
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: Derived Key MIC - hexdump(len=16): ac 73 0a 8b 1b 3c 82 ac 95 40
> 84 fb 0b 8e 8c 2e
> WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00
> 00 00 00 00 00 00 06 d0 6b ac 57 7d 60 94 c0 bc b8 d8 26 20 6a 1f 26
> 3e 0a 42 5f c5 8a bb b5 14 4a d1 8a 61 9b 5c 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 ac 73 0a 8b 1b 3c 82 ac 95 40 84 fb 0b 8e 8c 2e 00 16 30 14 01 00
> 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
> nl80211: Send over control port dest=xx:xx:xx:xx:xx:xx proto=0x888e
> len=121 no_encrypt=1
> wlan0: Unknown event 37
> nl80211: tx_control_port cookie=0x19
> WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
> WMM AC: U-APSD queues=0x0
> WMM AC: Valid WMM association, WMM AC is enabled
> wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
> RTM_NEWLINK: ifi_index=6 ifname=wlan0 wext ifi_family=0
> ifi_flags=0x11003 ([UP][LOWER_UP])
> RTM_NEWLINK: ifi_index=6 ifname=wlan0 wext ifi_family=0
> ifi_flags=0x11003 ([UP][LOWER_UP])
> RTM_NEWLINK: ifi_index=6 ifname=wlan0 wext ifi_family=0
> ifi_flags=0x11003 ([UP][LOWER_UP])
> nl80211: Event message available
> nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlan0
> nl80211: Ignore connect event (cmd=46) when using userspace SME
> nl80211: Event message available
> nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
> wlan0: nl80211: Scan trigger
> wlan0: Event SCAN_STARTED (47) received
> wlan0: External program started a scan
> nl80211: Event message available
> nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS)
> received for wlan0
> nl80211: Control port TX status (ack=1), cookie=25
> wlan0: Event EAPOL_TX_STATUS (37) received
> wlan0: Unknown event 37
> nl80211: Event message available
> nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wlan0
> wlan0: Event EAPOL_RX (23) received
> wlan0: RX EAPOL from xx:xx:xx:xx:xx:xx (encrypted=0)
> RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00
> 00 00 01 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e ac 5b f6 b2 a0 87 7d
> fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 fe
> e1 4a 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a
> wlan0: IEEE 802.1X RX: version=2 type=3 length=117
> WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00
> 00 00 00 00 00 01 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e ac 5b f6 b2
> a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f
> ac 04 fe e1 4a 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a
> wlan0:   EAPOL-Key type=2
> wlan0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> wlan0:   key_length=16 key_data_length=22
>   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
>   key_nonce - hexdump(len=32): 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e
> ac 5b f6 b2 a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17
>   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> wlan0: WPA: RX message 1 of 4-Way Handshake from xx:xx:xx:xx:xx:xx (ver=2)
> RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 fe e1 4a 3c
> f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a
> WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 fe e1 4a
> 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a
> RSN: PMKID from Authenticator - hexdump(len=16): fe e1 4a 3c f8 09 e0
> 2e 78 f3 58 1c 07 73 b3 0a
> wlan0: RSN: no matching PMKID found
> wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> WPA: PTK derivation using PRF(SHA1)
> WPA: PTK derivation - A1=00:1f:7b:31:04:a0 A2=xx:xx:xx:xx:xx:xx
> WPA: Nonce1 - hexdump(len=32): 06 d0 6b ac 57 7d 60 94 c0 bc b8 d8 26
> 20 6a 1f 26 3e 0a 42 5f c5 8a bb b5 14 4a d1 8a 61 9b 5c
> WPA: Nonce2 - hexdump(len=32): 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e
> ac 5b f6 b2 a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=48): [REMOVED]
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: KEK - hexdump(len=16): [REMOVED]
> WPA: TK - hexdump(len=16): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01
> 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
> WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
> wlan0: WPA: Sending EAPOL-Key 2/4
> WPA: Send EAPOL-Key frame to xx:xx:xx:xx:xx:xx ver=2 mic_len=16 key_mgmt=0x2
> WPA: EAPOL-Key MIC using HMAC-SHA1
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: Derived Key MIC - hexdump(len=16): 9e ef 58 f5 9a 29 2e 81 a7 d8
> 86 08 3e f5 8d c8
> WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00
> 00 00 00 00 00 01 06 d0 6b ac 57 7d 60 94 c0 bc b8 d8 26 20 6a 1f 26
> 3e 0a 42 5f c5 8a bb b5 14 4a d1 8a 61 9b 5c 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 9e ef 58 f5 9a 29 2e 81 a7 d8 86 08 3e f5 8d c8 00 16 30 14 01 00
> 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
> nl80211: Send over control port dest=xx:xx:xx:xx:xx:xx proto=0x888e
> len=121 no_encrypt=1
> wlan0: Unknown event 37
> nl80211: tx_control_port cookie=0x1a
> nl80211: Event message available
> nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS)
> received for wlan0
> nl80211: Control port TX status (ack=1), cookie=26
> wlan0: Event EAPOL_TX_STATUS (37) received
> wlan0: Unknown event 37
> nl80211: Event message available
> nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wlan0
> wlan0: Event EAPOL_RX (23) received
> wlan0: RX EAPOL from xx:xx:xx:xx:xx:xx (encrypted=0)
> RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00
> 00 00 02 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e ac 5b f6 b2 a0 87 7d
> fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 fe
> e1 4a 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a
> wlan0: IEEE 802.1X RX: version=2 type=3 length=117
> WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00
> 00 00 00 00 00 02 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e ac 5b f6 b2
> a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f
> ac 04 fe e1 4a 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a
> wlan0:   EAPOL-Key type=2
> wlan0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> wlan0:   key_length=16 key_data_length=22
>   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
>   key_nonce - hexdump(len=32): 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e
> ac 5b f6 b2 a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17
>   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> wlan0: WPA: RX message 1 of 4-Way Handshake from xx:xx:xx:xx:xx:xx (ver=2)
> RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 fe e1 4a 3c
> f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a
> WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 fe e1 4a
> 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a
> RSN: PMKID from Authenticator - hexdump(len=16): fe e1 4a 3c f8 09 e0
> 2e 78 f3 58 1c 07 73 b3 0a
> wlan0: RSN: no matching PMKID found
> wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> WPA: PTK derivation using PRF(SHA1)
> WPA: PTK derivation - A1=00:1f:7b:31:04:a0 A2=xx:xx:xx:xx:xx:xx
> WPA: Nonce1 - hexdump(len=32): 06 d0 6b ac 57 7d 60 94 c0 bc b8 d8 26
> 20 6a 1f 26 3e 0a 42 5f c5 8a bb b5 14 4a d1 8a 61 9b 5c
> WPA: Nonce2 - hexdump(len=32): 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e
> ac 5b f6 b2 a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=48): [REMOVED]
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: KEK - hexdump(len=16): [REMOVED]
> WPA: TK - hexdump(len=16): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01
> 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
> WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
> wlan0: WPA: Sending EAPOL-Key 2/4
> WPA: Send EAPOL-Key frame to xx:xx:xx:xx:xx:xx ver=2 mic_len=16 key_mgmt=0x2
> WPA: EAPOL-Key MIC using HMAC-SHA1
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: Derived Key MIC - hexdump(len=16): 3a f3 f5 5e b9 b9 6e b7 c4 a3
> 73 12 bf b0 3b 4f
> WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00
> 00 00 00 00 00 02 06 d0 6b ac 57 7d 60 94 c0 bc b8 d8 26 20 6a 1f 26
> 3e 0a 42 5f c5 8a bb b5 14 4a d1 8a 61 9b 5c 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 3a f3 f5 5e b9 b9 6e b7 c4 a3 73 12 bf b0 3b 4f 00 16 30 14 01 00
> 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
> nl80211: Send over control port dest=xx:xx:xx:xx:xx:xx proto=0x888e
> len=121 no_encrypt=1
> wlan0: Unknown event 37
> nl80211: tx_control_port cookie=0x1b
> nl80211: Event message available
> nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS)
> received for wlan0
> nl80211: Control port TX status (ack=1), cookie=27
> wlan0: Event EAPOL_TX_STATUS (37) received
> wlan0: Unknown event 37
> nl80211: Event message available
> nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wlan0
> wlan0: Event EAPOL_RX (23) received
> wlan0: RX EAPOL from xx:xx:xx:xx:xx:xx (encrypted=0)
> RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00
> 00 00 03 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e ac 5b f6 b2 a0 87 7d
> fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 fe
> e1 4a 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a
> wlan0: IEEE 802.1X RX: version=2 type=3 length=117
> WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00
> 00 00 00 00 00 03 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e ac 5b f6 b2
> a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f
> ac 04 fe e1 4a 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a
> wlan0:   EAPOL-Key type=2
> wlan0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> wlan0:   key_length=16 key_data_length=22
>   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
>   key_nonce - hexdump(len=32): 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e
> ac 5b f6 b2 a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17
>   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> wlan0: WPA: RX message 1 of 4-Way Handshake from xx:xx:xx:xx:xx:xx (ver=2)
> RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 fe e1 4a 3c
> f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a
> WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 fe e1 4a
> 3c f8 09 e0 2e 78 f3 58 1c 07 73 b3 0a
> RSN: PMKID from Authenticator - hexdump(len=16): fe e1 4a 3c f8 09 e0
> 2e 78 f3 58 1c 07 73 b3 0a
> wlan0: RSN: no matching PMKID found
> wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> WPA: PTK derivation using PRF(SHA1)
> WPA: PTK derivation - A1=00:1f:7b:31:04:a0 A2=xx:xx:xx:xx:xx:xx
> WPA: Nonce1 - hexdump(len=32): 06 d0 6b ac 57 7d 60 94 c0 bc b8 d8 26
> 20 6a 1f 26 3e 0a 42 5f c5 8a bb b5 14 4a d1 8a 61 9b 5c
> WPA: Nonce2 - hexdump(len=32): 9e 4b 0f 0b 7d 47 f7 f5 16 b6 07 30 2e
> ac 5b f6 b2 a0 87 7d fb 94 c1 96 d4 07 b2 71 41 a6 a9 17
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=48): [REMOVED]
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: KEK - hexdump(len=16): [REMOVED]
> WPA: TK - hexdump(len=16): [REMOVED]
> WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01
> 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
> WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03
> wlan0: WPA: Sending EAPOL-Key 2/4
> WPA: Send EAPOL-Key frame to xx:xx:xx:xx:xx:xx ver=2 mic_len=16 key_mgmt=0x2
> WPA: EAPOL-Key MIC using HMAC-SHA1
> WPA: KCK - hexdump(len=16): [REMOVED]
> WPA: Derived Key MIC - hexdump(len=16): 3c 9a b2 5e cf 8b 18 2f b0 4a
> 57 bc 45 e1 db 79
> WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00
> 00 00 00 00 00 03 06 d0 6b ac 57 7d 60 94 c0 bc b8 d8 26 20 6a 1f 26
> 3e 0a 42 5f c5 8a bb b5 14 4a d1 8a 61 9b 5c 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 3c 9a b2 5e cf 8b 18 2f b0 4a 57 bc 45 e1 db 79 00 16 30 14 01 00
> 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
> nl80211: Send over control port dest=xx:xx:xx:xx:xx:xx proto=0x888e
> len=121 no_encrypt=1
> wlan0: Unknown event 37
> nl80211: tx_control_port cookie=0x1c
> nl80211: Event message available
> nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS)
> received for wlan0
> nl80211: Control port TX status (ack=1), cookie=28
> wlan0: Event EAPOL_TX_STATUS (37) received
> wlan0: Unknown event 37
> nl80211: Event message available
> nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
> wlan0: nl80211: New scan results available
> nl80211: Scan probed for SSID ''
> nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442
> 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320
> 5500 5520 5540 5560 5580 5600 5620 5640 5660 5680 5700 5720 5745 5765
> 5785 5805 5825 5845
> wlan0: Event SCAN_RESULTS (3) received
> nl80211: Received scan results (2 BSSes)
> nl80211: Scan results indicate BSS status with xx:xx:xx:xx:xx:xx as associated
> wlan0: BSS: Start scan result update 2
> BSS: last_scan_res_used=2/32
> wlan0: New scan results available (own=0 ext=1)
> wlan0: Do not use results from externally requested scan operation for
> network selection
> RTM_NEWLINK: ifi_index=6 ifname=wlan0 wext ifi_family=0
> ifi_flags=0x11003 ([UP][LOWER_UP])
> wlan0: Authentication with 74:3a:[  602.250924] wlan0:
> deauthenticating from xx:xx:xx:xx:xx:xx by local choice (Reason:
> 3=DEAUTH_LEAVING)
> ef:af:a7:6a timed out.
> Added BSSID xx:xx:xx:xx:xx:xx into ignore list, ignoring for 10 seconds
> TDLS: Remove peers on disassociation
> wlan0: WPA: Clear old PMK and PTK
> wlan0: Request to deauthenticate - bssid=xx:xx:xx:xx:xx:xx
> pending_bssid=00:00:00:00:00:00 reason=3 (DEAUTH_LEAVING)
> state=4WAY_HANDSHAKE
> TDLS: Tear down peers
> wpa_driver_nl80211_deauthenticate(addr=xx:xx:xx:xx:xx:xx reason_code=3)
> wlan0: Event DEAUTH (11) received
> wlan0: Deauthentication notification
> wlan0:  * reason 3 (DEAUTH_LEAVING) locally_generated=1
> Deauthentication frame IE(s) - hexdump(len=0): [NULL]
> wlan0: CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:xx:xx:xx reason=3
> locally_generated=1
> wlan0: WPA: 4-Way Handshake failed - pre-shared key may be incorrect
> wlan0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="FABIOHOUSE"
> auth_failures=1 duration=10 reason=WRONG_KEY
> wlan0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=7)
> wlan0: Setting scan request: 0.100000 sec
> wlan0: Radio work 'sme-connect'@0x23ad6f8 done in 10.999229 seconds
> wlan0: radio_work_free('sme-connect'@0x23ad6f8): num_active_works --> 0
> BSSID xx:xx:xx:xx:xx:xx ignore list count incremented to 2, ignoring
> for 10 seconds
> wlan0: Consecutive connection failures: 1 --> request scan in 100 ms
> wlan0: Ignore new scan request for 0.100000 sec since an earlier
> request is scheduled to trigger sooner
> TDLS: Remove peers on disassociation
> wlan0: WPA: Clear old PMK and PTK
> wlan0: Disconnect event - remove keys
> wlan0: State: 4WAY_HANDSHAKE -> DISCONNECTED
> nl80211: Set wlan0 operstate 0->0 (DORMANT)
> netlink: Operstate: ifindex=6 linkmode=-1 (no change), operstate=5
> (IF_OPER_DORMANT)
> nl80211: Skip set_supp_port(unauthorized) while not associated
> WMM AC: WMM AC is disabled
> wlan0: State: DISCONNECTED -> DISCONNECTED
> nl80211: Set wlan0 operstate 0->0 (DORMANT)
> netlink: Operstate: ifindex=6 linkmode=-1 (no change), operstate=5
> (IF_OPER_DORMANT)
> nl80211: Skip set_supp_port(unauthorized) while not associated
> QM: Clear all active DSCP policies
> wlan0: CTRL-EVENT-DSCP-POLICY clear_all
> wlan0: Ignore new scan request for 1.000000 sec since an earlier
> request is scheduled to trigger sooner
> RTM_NEWLINK: ifi_index=6 ifname=wlan0 operstate=2 linkmode=1
> ifi_family=0 ifi_flags=0x1003 ([UP])
> nl80211: Event message available
> nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
> nl80211: Delete station xx:xx:xx:xx:xx:xx
> nl80211: Event message available
> nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlan0
> nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on
> wlan0(00:1f:7b:31:04:a0) A1=xx:xx:xx:xx:xx:xx A2=00:1f:7b:31:04:a0 on
> link_id=-1
> nl80211: MLME event frame - hexdump(len=26): c0 00 00 00 74 3a ef af
> a7 6a 00 1f 7b 31 04 a0 74 3a ef af a7 6a 00 00 03 00
> nl80211: Deauthenticate event
> nl80211: Ignore deauth event triggered due to own deauth request
> nl80211: Event message available
> nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlan0
> nl80211: Ignore disconnect event when using userspace SME
> wlan0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
> RTM_NEWLINK: ifi_index=6 ifname=wlan0 wext ifi_family=0 ifi_flags=0x1003 ([UP])
> nl80211: Event message available
> nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlan0
> nl80211: Regulatory domain change
>  * initiator=0
>  * type=1
> wlan0: Event CHANNEL_LIST_CHANGED (27) received
> wlan0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
> wlan0: Updating hw mode
> nl80211: Regulatory information - country=00
> nl80211: 2402-2472 @ 40 MHz 20 mBm
> nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR)
> nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
> nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
> nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
> nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
> nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
> nl80211: 57240-63720 @ 2160 MHz 0 mBm
> nl80211: Added 802.11b mode based on 802.11g information
> nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447
> 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED]
> nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR]
> 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR]
> 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR]
> 5540[NO_IR][RADAR] 5560[NO_IR][RADAR] 5580[NO_IR][RADAR]
> 5600[NO_IR][RADAR] 5620[NO_IR][RADAR] 5640[NO_IR][RADAR]
> 5660[NO_IR][RADAR] 5680[NO_IR][RADAR] 5700[NO_IR][RADAR] 5720[NO_IR]
> 5745[NO_IR] 5765[NO_IR] 5785[NO_IR] 5805[NO_IR] 5825[NO_IR]
> 5845[NO_IR] 5865[DISABLED]
> nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447
> 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[DISABLED]
> wlan0: State: DISCONNECTED -> SCANNING
> wlan0: Starting AP scan for wildcard SSID
> wlan0: Add radio work 'scan'@0x23c3d70
> wlan0: First radio work item in the queue - schedule start immediately
> wlan0: Starting radio work 'scan'@0x23c3d70 after 0.000212 second wait
> wlan0: nl80211: scan request
> nl80211: Scan SSID
> nl80211: Scan co-located APs on 6 GHz
> nl80211: Scan extra IEs - hexdump(len=13): 7f 0b 04 00 00 00 00 00 40
> 40 00 00 20
> Scan requested (ret=0) - scan timeout 30 seconds
> nl80211: Event message available
> nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
> wlan0: nl80211: Scan trigger
> wlan0: Event SCAN_STARTED (47) received
> wlan0: Own scan request started a scan in 0.001161 seconds



More information about the Hostap mailing list