Cannot authenticate to AP on W2K with ZyAIR G-220 802.11b+g Wireless LAN

Robert Flum robflum8d
Fri Mar 25 15:00:27 PDT 2011


I have a D-Link WBR1310, and am using WPA-PSK.  The D-Link has the
passphrase in ascii  Here is the wpa_supplicant.conf content:
ctrl_interface=/var/run/wpa_supplicant
eapol_version=1
ap_scan=2    (hidden SSID)
fast_reauth=1
# WPA-Personal(PSK) with TKIP and enforcement for frequent PTK rekeying
network={
	ssid="RPjkl7743374"
	proto=WPA
	key_mgmt=WPA-PSK
	pairwise=TKIP
	group=TKIP
	auth_alg=OPEN
	psk="ChE3se$@NDW!ch"
#	psk=161e76d210bbadc3007dc83e212361737da36391a4dd5cfeb080d165026e5e84
#	wpa_ptk_rekey=600
}

   I don't know much about wireless, but I'm reading the comments in
the .conf file and in the README-Windows.txt and muddling through.  I
hate to post this monster debug file (450 lines), but I don't know
what's important.  Here it is:

CTRL: Open pipe 00A143A0
CTRL: ConnectNamedPipe: connection in progress
Initializing interface '{79B2FD1F-6126-4AF2-B8E3-79D01FAB31FE}' conf 'C:\Program
 Files\wpa_supplicant\wpa_supplicant.conf' driver 'ndis' ctrl_interface 'N/A' br
idge 'N/A'
Reading configuration file 'C:\Program Files\wpa_supplicant\wpa_supplicant.conf'

ctrl_interface='/var/run/wpa_supplicant'
eapol_version=1
ap_scan=2
fast_reauth=1
Line: 532 - start of a new network block
ssid - hexdump_ascii(len=12):
     52 50 6a 6b 6c 37 37 34 33 33 37 34               RPjkl7743374
proto: 0x1
key_mgmt: 0x2
pairwise: 0x8
group: 0x8
auth_alg: 0x1
PSK (ASCII passphrase) - hexdump_ascii(len=14):
     43 68 45 33 73 65 24 40 4e 44 57 21 63 68         ChE3se$@NDW!ch
PSK (from passphrase) - hexdump(len=32): 16 1e 76 d2 10 bb ad c3 00 7d c8 3e 21
23 61 73 7d a3 63 91 a4 dd 5c fe b0 80 d1 65 02 6e 5e 84
Priority group 0
   id=0 ssid='RPjkl7743374'
NDIS: Packet.dll version: 4.1.0.2001
NDIS: 3 adapter names found
NDIS: 3 adapter descriptions found
NDIS: 0 - \Device\NPF_GenericDialupAdapter - Adapter for generic dialup and VPN
capture
NDIS: 1 - \Device\NPF_{79B2FD1F-6126-4AF2-B8E3-79D01FAB31FE} - ZyAIR G-220 802.1
1b+g Wireless LAN
NDIS: 2 - \Device\NPF_{BE327E39-D843-49F0-B1B9-B7378521C9D8} - Intel 8255x-based
 Integrated Fast Ethernet
NDIS: Adapter description prefix 'ZyAIR G-220 802.11b+g Wireless LAN'
NDIS: WZCEnumInterfaces failed: 1717; WZC service is apparently not running
OID_802_11_CAPABILITY - hexdump(len=104): 68 00 00 00 02 00 00 00 03 00 00 00 0b
 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 0
0 03 00 00 00 04 00 00 00 03 00 00 00 06 00 00 00 04 00 00 00 04 00 00 00 04 00
00 00 06 00 00 00 06 00 00 00 04 00 00 00 06 00 00 00 06 00 00 00 07 00 00 00 04
 00 00 00 07 00 00 00 06 00 00 00
NDIS: Driver supports OID_802_11_CAPABILITY - NoOfPMKIDs 3 NoOfAuthEncrPairs 11
NDIS: 0 - auth 0 encr 1
NDIS: 1 - auth 0 encr 0
NDIS: 2 - auth 1 encr 0
NDIS: 3 - auth 3 encr 4
NDIS: 4 - auth 3 encr 6
NDIS: 5 - auth 4 encr 4
NDIS: 6 - auth 4 encr 6
NDIS: 7 - auth 6 encr 4
NDIS: 8 - auth 6 encr 6
NDIS: 9 - auth 7 encr 4
NDIS: 10 - auth 7 encr 6
NDIS: driver capabilities: key_mgmt 0xf enc 0xf auth 0x3
NDIS: Set OID 0d010118 - hexdump(len=4): 06 00 00 00
NDIS: OID_802_11_PMKID (flush) - hexdump(len=8): 08 00 00 00 00 00 00 00
NDIS: Set OID 0d010123 - hexdump(len=8): 08 00 00 00 00 00 00 00
NDIS: Set OID 0d010118 - hexdump(len=4): 04 00 00 00
NDIS: Set OID 0d010102 - hexdump(len=36): 20 00 00 00 29 23 be 84 e1 6c d6 ae 52
 90 49 f1 f1 bb e9 eb b3 a6 db 3c 87 0c 3e 99 24 5e 0d 1c 06 b7 47 de
ndis_events: Connected to ROOT\CIMV2.
ndis_events: WMI: SELECT Index FROM Win32_NetworkAdapterConfiguration WHERE Sett
ingID='{79B2FD1F-6126-4AF2-B8E3-79D01FAB31FE}'
ndis_events: WMI: SELECT Name,PNPDeviceID FROM Win32_NetworkAdapter WHERE Index=
11
ndis_events: Win32_NetworkAdapter::Name='ZyAIR G-220 IEEE 802.11b+g USB Adapter'

ndis_events: Win32_NetworkAdapter::PNPDeviceID='USB\VID_0586&PID_3401\5&2C00CEAB
&0&1'
ndis_events: WMI: SELECT Name FROM Win32_PnPEntity WHERE DeviceID='USB\\VID_0586
&PID_3401\\5&2C00CEAB&0&1'
ndis_events: Win32_PnPEntity::Name='ZyAIR G-220 IEEE 802.11b+g USB Adapter #2'
ndis_events: use adapter descriptor 'ZyAIR G-220 IEEE 802.11b+g USB Adapter #2'
Connected to ROOT\WMI.
ndis_events: WMI: SELECT * FROM MSNdis_StatusMediaConnect
ndis_events: WMI: SELECT * FROM MSNdis_StatusMediaDisconnect
ndis_events: WMI: SELECT * FROM MSNdis_StatusMediaSpecificIndication
ndis_events: WMI: SELECT * FROM MSNdis_NotifyAdapterArrival
ndis_events: WMI: SELECT * FROM MSNdis_NotifyAdapterRemoval
NDIS: Set OID 0d010108 - hexdump(len=4): 01 00 00 00
Own MAC address: 00:a0:c5:9e:a2:6b
ndis_get_oid: oid=0xd010101 len (6) failed
NDIS: Set OID 0d01011e - hexdump(len=16): 10 00 00 00 00 00 00 00 ff ff ff ff ff
 ff 00 00
NDIS: Set OID 0d010114 - hexdump(len=4): 00 00 00 00
ndis_get_oid: oid=0xd010101 len (6) failed
NDIS: Set OID 0d01011e - hexdump(len=16): 10 00 00 00 01 00 00 00 ff ff ff ff ff
 ff 00 00
NDIS: Set OID 0d010114 - hexdump(len=4): 01 00 00 00
ndis_get_oid: oid=0xd010101 len (6) failed
NDIS: Set OID 0d01011e - hexdump(len=16): 10 00 00 00 02 00 00 00 ff ff ff ff ff
 ff 00 00
NDIS: Set OID 0d010114 - hexdump(len=4): 02 00 00 00
ndis_get_oid: oid=0xd010101 len (6) failed
NDIS: Set OID 0d01011e - hexdump(len=16): 10 00 00 00 03 00 00 00 ff ff ff ff ff
 ff 00 00
NDIS: Set OID 0d010114 - hexdump(len=4): 03 00 00 00
RSN: flushing PMKID list in the driver
NDIS: Set OID 0d010118 - hexdump(len=4): 06 00 00 00
NDIS: OID_802_11_PMKID (flush) - hexdump(len=8): 08 00 00 00 00 00 00 00
NDIS: Set OID 0d010123 - hexdump(len=8): 08 00 00 00 00 00 00 00
NDIS: Set OID 0d010118 - hexdump(len=4): 04 00 00 00
Setting scan request: 0 sec 100000 usec
WPS: UUID based on MAC address - hexdump(len=16): c7 de 21 c3 d5 9a 5f 56 9a 79
ea 50 af 6f b0 49
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
CTRL: Open pipe 01E67E10
CTRL: ConnectNamedPipe: connection in progress
Added interface {79B2FD1F-6126-4AF2-B8E3-79D01FAB31FE}
ndis_get_oid: oid=0xd010101 len (6) failed
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'RPjkl7743374'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
Overriding auth_alg selection: 0x1
WPA: No WPA/RSN IE available from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2
02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
State: SCANNING -> ASSOCIATING
NDIS: Set OID 0d010108 - hexdump(len=4): 01 00 00 00
NDIS: Set OID 0d010119 - hexdump(len=4): 01 00 00 00
NDIS: Set OID 0d010118 - hexdump(len=4): 04 00 00 00
NDIS: Set OID 0d01011b - hexdump(len=4): 04 00 00 00
NDIS: Set OID 0d010102 - hexdump(len=36): 0c 00 00 00 52 50 6a 6b 6c 37 37 34 33
 33 37 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
EAPOL: disable timer tick
EAPOL: Supplicant port status: Unauthorized
                 :
                 :   gap - I couldn't get it all
                 :
                 :
beacon_ies - hexdump(len=47): 00 0c 52 50 6a 6b 6c 37 37 34 33 33 37 34 01 04 82
 84 8b 96 03 01 01 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 0
0 50 f2 02
WPA: set own WPA/RSN IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 0
1 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00
00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=00:1b:11:5f:2a:db
No keys have been configured - skip key clearing
Select network based on association information
Network configuration found for the current AP
WPA: Using WPA IE from AssocReq to set cipher suites
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2
02 01 00 00 50 f2 02 01 00 00 50 f2 02
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
Associated with 00:1b:11:5f:2a:db
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from 00:1b:11:5f:2a:db
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 5
2 fe 9c c3 d0 42 08 65 80 43 2c 0b 13 0a 0b e1 99 9a a0 3a d1 03 df cc bd e4 7c
2c 09 eb 5b 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
0 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 52 fe 9c c3 d0 42 08 65 80 43 2c 0b 13 0a 0b e1 9
9 9a a0 3a d1 03 df cc bd e4 7c 2c 09 eb 5b 2e
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 0
0 00 01 52 fe 9c c3 d0 42 08 65 80 43 2c 0b 13 0a 0b e1 99 9a a0 3a d1 03 df cc
bd e4 7c 2c 09 eb 5b 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
0 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:1b:11:5f:2a:db (ver=1)
WPA: Renewed SNonce - hexdump(len=32): e7 0e bb 0d 84 ed 2d e5 d3 2c a6 ff 79 2e
 11 05 54 73 83 55 b4 cc f8 98 d2 b3 cb c4 7a 70 d7 0f
WPA: PTK derivation - A1=00:a0:c5:9e:a2:6b A2=00:1b:11:5f:2a:db
WPA: PMK - hexdump(len=32): 16 1e 76 d2 10 bb ad c3 00 7d c8 3e 21 23 61 73 7d a
3 63 91 a4 dd 5c fe b0 80 d1 65 02 6e 5e 84
WPA: PTK - hexdump(len=64): d6 50 0b 69 ae 3b 5a 39 2d 4d 63 8e 04 ab 5c 8b 70 2
a 25 bf 2e 2c e7 35 71 e8 64 d2 78 b7 04 9e 5e 48 d4 21 32 f9 de 2e 1e f2 8b 53
e1 09 e7 a5 84 4d 68 1f 50 9b 2d f7 32 b9 d3 fd e3 a4 9d e3
WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 0
1 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 09 00 20 00 00 00 00 00
00 00 01 e7 0e bb 0d 84 ed 2d e5 d3 2c a6 ff 79 2e 11 05 54 73 83 55 b4 cc f8 98
 d2 b3 cb c4 7a 70 d7 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 33 a6 05 d3 c6 e1 12 ea a6 2f 14 7d 7d
3c 64 fe 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50
 f2 02 00 00
RX EAPOL from 00:1b:11:5f:2a:db
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02
52 fe 9c c3 d0 42 08 65 80 43 2c 0b 13 0a 0b e1 99 9a a0 3a d1 03 df cc bd e4 7c
 2c 09 eb 5b 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
0 00 00 00 00 00 00 00 00 00 00 47 05 2c ee 5a 26 5a 2c b4 c4 9a 38 4a db f4 58
00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
  key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=32 key_data_length=24
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): 52 fe 9c c3 d0 42 08 65 80 43 2c 0b 13 0a 0b e1 9
9 9a a0 3a d1 03 df cc bd e4 7c 2c 09 eb 5b 2e
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 47 05 2c ee 5a 26 5a 2c b4 c4 9a 38 4a db f4 58
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00
00 00 02 52 fe 9c c3 d0 42 08 65 80 43 2c 0b 13 0a 0b e1 99 9a a0 3a d1 03 df cc
 bd e4 7c 2c 09 eb 5b 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 47 05 2c ee 5a 26 5a 2c b4 c4 9a 38 4a
db f4 58 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50
 f2 02
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:1b:11:5f:2a:db (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00
50 f2 02 01 00 00 50 f2 02
WPA: WPA IE in EAPOL-Key - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 0
0 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 17 92 e0 63 40 a7 8a ff 2a 83 bc df 31 3
9 02 b0 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
NDIS: OID_802_11_ADD_KEY - hexdump(len=64): 40 00 00 00 00 00 00 e0 20 00 00 00
00 1b 11 5f 2a db 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5e 48 d4 21 32 f9 de
 2e 1e f2 8b 53 e1 09 e7 a5 84 4d 68 1f 50 9b 2d f7 32 b9 d3 fd e3 a4 9d e3
NDIS: Set OID 0d01011d - hexdump(len=64): 40 00 00 00 00 00 00 e0 20 00 00 00 00
 1b 11 5f 2a db 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5e 48 d4 21 32 f9 de 2
e 1e f2 8b 53 e1 09 e7 a5 84 4d 68 1f 50 9b 2d f7 32 b9 d3 fd e3 a4 9d e3
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
Authentication with 00:1b:11:5f:2a:db timed out.
Added BSSID 00:1b:11:5f:2a:db into blacklist
NDIS: Set OID 0d010102 - hexdump(len=36): 20 00 00 00 b3 12 4d c8 43 bb 8b a6 1f
 03 5a 7d 09 38 25 1f 5d d4 cb fc 96 f5 45 3b 13 0d 89 0a 1c db ae 32
NDIS: Set OID 0d01011e - hexdump(len=16): 10 00 00 00 00 00 00 00 00 1b 11 5f 2a
 db 00 00
NDIS: Set OID 0d010114 - hexdump(len=4): 00 00 00 00
NDIS: Set OID 0d01011e - hexdump(len=16): 10 00 00 00 01 00 00 00 00 1b 11 5f 2a
 db 00 00
NDIS: Set OID 0d010114 - hexdump(len=4): 01 00 00 00
NDIS: Set OID 0d01011e - hexdump(len=16): 10 00 00 00 02 00 00 00 00 1b 11 5f 2a
 db 00 00
NDIS: Set OID 0d010114 - hexdump(len=4): 02 00 00 00
NDIS: Set OID 0d01011e - hexdump(len=16): 10 00 00 00 03 00 00 00 00 1b 11 5f 2a
 db 00 00
NDIS: Set OID 0d010114 - hexdump(len=4): 03 00 00 00
NDIS: Set OID 0d01011e - hexdump(len=16): 10 00 00 00 00 00 00 40 00 1b 11 5f 2a
 db 00 00
State: GROUP_HANDSHAKE -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'RPjkl7743374'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
Overriding auth_alg selection: 0x1
WPA: No WPA/RSN IE available from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2
02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
State: SCANNING -> ASSOCIATING
NDIS: Set OID 0d010108 - hexdump(len=4): 01 00 00 00
NDIS: Set OID 0d010119 - hexdump(len=4): 01 00 00 00
NDIS: Set OID 0d010118 - hexdump(len=4): 04 00 00 00
NDIS: Set OID 0d01011b - hexdump(len=4): 04 00 00 00
NDIS: Set OID 0d010102 - hexdump(len=36): 0c 00 00 00 52 50 6a 6b 6c 37 37 34 33
 33 37 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: Supplicant port status: Unauthorized
Authentication with 00:00:00:00:00:00 timed out.
Added BSSID 00:00:00:00:00:00 into blacklist
No keys have been configured - skip key clearing
State: ASSOCIATING -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'RPjkl7743374'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
Overriding auth_alg selection: 0x1
WPA: No WPA/RSN IE available from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2
02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
State: SCANNING -> ASSOCIATING
NDIS: Set OID 0d010108 - hexdump(len=4): 01 00 00 00
NDIS: Set OID 0d010119 - hexdump(len=4): 01 00 00 00
NDIS: Set OID 0d010118 - hexdump(len=4): 04 00 00 00
NDIS: Set OID 0d01011b - hexdump(len=4): 04 00 00 00
NDIS: Set OID 0d010102 - hexdump(len=36): 0c 00 00 00 52 50 6a 6b 6c 37 37 34 33
 33 37 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
Authentication with 00:00:00:00:00:00 timed out.
BSSID 00:00:00:00:00:00 blacklist count incremented to 2
No keys have been configured - skip key clearing
State: ASSOCIATING -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'RPjkl7743374'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
Overriding auth_alg selection: 0x1
WPA: No WPA/RSN IE available from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2
02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
State: SCANNING -> ASSOCIATING
NDIS: Set OID 0d010108 - hexdump(len=4): 01 00 00 00
NDIS: Set OID 0d010119 - hexdump(len=4): 01 00 00 00
NDIS: Set OID 0d010118 - hexdump(len=4): 04 00 00 00
NDIS: Set OID 0d01011b - hexdump(len=4): 04 00 00 00
NDIS: Set OID 0d010102 - hexdump(len=36): 0c 00 00 00 52 50 6a 6b 6c 37 37 34 33
 33 37 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized



More information about the Hostap mailing list