Hi Jouni, On Wed, 2021-08-25 at 12:37 +0300, Jouni Malinen wrote: > On Thu, Aug 05, 2021 at 08:01:04AM -0700, James Prestwood wrote: > > I am running into a problem where the radius server thinks there > > was a > > duplicate access request during FILS reassocation. I have two > > EAP/FILS > > enabled APs. Here is the sequence of events: > > > > - Authenicate over EAP to AP1 > > - Disconnect from AP1 and authenticate using FILS to AP1 > > - Reassociate to AP2 using FILS > > > > Everything appears to be working fine initially (my identity is > > found) > > but then the radius server throws the message away claiming the > > sequence number is a duplicate: > .. > > Which station implementation are you using here and would you be able > to > provide debug logs from both the authentication server and station > for > all those authentication attempts? I am using IWD, attached are debug logs for both IWD and hostapd, as well as my hostapd/radius config. FWIW FT-FILS works just fine, its only reassociation that behaves this way. Note, these config files are used in our own testing so they contain much more info (like FT IDs etc.) that shouldn't be taken into account when the key_mgmt is just set to "WPA-EAP FILS-SHA256" (or correct me if I'm wrong). > > > EAP: SEQ=0 replayed (already received SEQ=0) > .. > > And sure enough, if I remove the sequence number check it all works > > as > > expected and I am able to reassociate: > > Well, I don't think I'd call that "as expected" taken into account > reuse > of the same sequence number is incorrect and a potential security > vulnerability.. Thanks, James
random: Trying to read entropy from /dev/random Configuration file: /tmp/ft-eap-ccmp-1.conf Configuration file: /tmp/ft-eap-ccmp-2.conf Configuration file: radius.conf nl80211: TDLS supported nl80211: TDLS external setup nl80211: Supported cipher 00-0f-ac:1 nl80211: Supported cipher 00-0f-ac:5 nl80211: Supported cipher 00-0f-ac:2 nl80211: Supported cipher 00-0f-ac:4 nl80211: Supported cipher 00-0f-ac:10 nl80211: Supported cipher 00-0f-ac:8 nl80211: Supported cipher 00-0f-ac:9 nl80211: Supported cipher 00-0f-ac:6 nl80211: Supported cipher 00-0f-ac:13 nl80211: Supported cipher 00-0f-ac:11 nl80211: Supported cipher 00-0f-ac:12 nl80211: Using driver-based off-channel TX nl80211: Driver-advertised extended capabilities (default) - hexdump(len=8): 04 00 40 00 00 00 00 40 nl80211: Driver-advertised extended capabilities mask (default) - hexdump(len=8): 04 00 40 00 00 00 00 40 nl80211: Supported vendor command: vendor_id=0x1374 subcmd=1 nl80211: Supported vendor event: vendor_id=0x1374 subcmd=1 nl80211: Use separate P2P group interface (driver advertised support) nl80211: use P2P_DEVICE support nl80211: key_mgmt=0x1ff0f enc=0xfef auth=0x7 flags=0xe4000d30fb5bfbe0 rrm_flags=0x10 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=4 nl80211: interface wln0 in phy rad0 nl80211: Set mode ifindex 9 iftype 3 (AP) nl80211: Setup AP(wln0) - device_ap_sme=0 use_monitor=0 nl80211: Subscribe to mgmt frames with AP handle 0x1196b30 nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x1196b30 match= multicast=0 nl80211: Register frame type=0x0 (WLAN_FC_STYPE_ASSOC_REQ) nl_handle=0x1196b30 match= multicast=0 nl80211: Register frame type=0x20 (WLAN_FC_STYPE_REASSOC_REQ) nl_handle=0x1196b30 match= multicast=0 nl80211: Register frame type=0xa0 (WLAN_FC_STYPE_DISASSOC) nl_handle=0x1196b30 match= multicast=0 nl80211: Register frame type=0xc0 (WLAN_FC_STYPE_DEAUTH) nl_handle=0x1196b30 match= multicast=0 nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x1196b30 match= multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1196b30 match=04 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1196b30 match=0501 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1196b30 match=0503 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1196b30 match=0504 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1196b30 match=06 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1196b30 match=08 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1196b30 match=09 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1196b30 match=0a multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1196b30 match=11 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1196b30 match=7f multicast=0 rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0 nl80211: Add own interface ifindex 9 (ifidx_reason -1) nl80211: if_indices[16]: 9(-1) nl80211: Do not open EAPOL RX socket - using control port for RX phy: rad0 BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits) nl80211: No channel number found for frequency 5900 MHz nl80211: No channel number found for frequency 5905 MHz nl80211: No channel number found for frequency 5910 MHz nl80211: No channel number found for frequency 5915 MHz nl80211: No channel number found for frequency 5920 MHz nl80211: No channel number found for frequency 5925 MHz nl80211: No channel number found for frequency 902 MHz nl80211: No channel number found for frequency 903 MHz nl80211: No channel number found for frequency 903 MHz nl80211: No channel number found for frequency 904 MHz nl80211: No channel number found for frequency 904 MHz nl80211: No channel number found for frequency 905 MHz nl80211: No channel number found for frequency 905 MHz nl80211: No channel number found for frequency 906 MHz nl80211: No channel number found for frequency 906 MHz nl80211: No channel number found for frequency 907 MHz nl80211: No channel number found for frequency 907 MHz nl80211: No channel number found for frequency 908 MHz nl80211: No channel number found for frequency 908 MHz nl80211: No channel number found for frequency 909 MHz nl80211: No channel number found for frequency 909 MHz nl80211: No channel number found for frequency 910 MHz nl80211: No channel number found for frequency 910 MHz nl80211: No channel number found for frequency 911 MHz nl80211: No channel number found for frequency 911 MHz nl80211: No channel number found for frequency 912 MHz nl80211: No channel number found for frequency 912 MHz nl80211: No channel number found for frequency 913 MHz nl80211: No channel number found for frequency 913 MHz nl80211: No channel number found for frequency 914 MHz nl80211: No channel number found for frequency 914 MHz nl80211: No channel number found for frequency 915 MHz nl80211: No channel number found for frequency 915 MHz nl80211: No channel number found for frequency 916 MHz nl80211: No channel number found for frequency 916 MHz nl80211: No channel number found for frequency 917 MHz nl80211: No channel number found for frequency 917 MHz nl80211: No channel number found for frequency 918 MHz nl80211: No channel number found for frequency 918 MHz nl80211: No channel number found for frequency 919 MHz nl80211: No channel number found for frequency 919 MHz nl80211: No channel number found for frequency 920 MHz nl80211: No channel number found for frequency 920 MHz nl80211: No channel number found for frequency 921 MHz nl80211: No channel number found for frequency 921 MHz nl80211: No channel number found for frequency 922 MHz nl80211: No channel number found for frequency 922 MHz nl80211: No channel number found for frequency 923 MHz nl80211: No channel number found for frequency 923 MHz nl80211: No channel number found for frequency 924 MHz nl80211: No channel number found for frequency 924 MHz nl80211: No channel number found for frequency 925 MHz nl80211: No channel number found for frequency 925 MHz nl80211: No channel number found for frequency 926 MHz nl80211: No channel number found for frequency 926 MHz nl80211: No channel number found for frequency 927 MHz nl80211: No channel number found for frequency 927 MHz nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Remove unsupported mode nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR] Completing interface initialization Mode: IEEE 802.11g Channel: 1 Frequency: 2412 MHz DFS 0 channels required radar detection nl80211: Set freq 2412 (ht_enabled=0, vht_enabled=0, he_enabled=0, bandwidth=20 MHz, cf1=2412 MHz, cf2=0 MHz) * freq=2412 * he_enabled=0 * vht_enabled=0 * ht_enabled=0 * channel_type=0 RATE[0] rate=10 flags=0x1 RATE[1] rate=20 flags=0x1 RATE[2] rate=55 flags=0x1 RATE[3] rate=110 flags=0x1 RATE[4] rate=60 flags=0x0 RATE[5] rate=90 flags=0x0 RATE[6] rate=120 flags=0x0 RATE[7] rate=180 flags=0x0 RATE[8] rate=240 flags=0x0 RATE[9] rate=360 flags=0x0 RATE[10] rate=480 flags=0x0 RATE[11] rate=540 flags=0x0 hostapd_setup_bss(hapd=0x118e3a0 (wln0), first=1) nl80211: flush -> DEL_STATION wln0 (all) Using interface wln0 with hwaddr 42:00:00:00:00:00 and ssid "TestFT" wln0: RADIUS Authentication server 127.0.0.1:1812 connect[radius]: Network is unreachable random: Got 20/20 random bytes GMK - hexdump(len=32): [REMOVED] Key Counter - hexdump(len=32): [REMOVED] WPA: Delay group state machine start until Beacon frames have been configured nl80211: Set beacon (beacon_set=0) nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 42 00 00 00 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 01 nl80211: Beacon tail - hexdump(len=75): 2a 01 04 32 04 30 48 60 6c 30 1c 01 00 00 0f ac 04 01 00 00 0f ac 04 03 00 00 0f ac 03 00 0f ac 0e 00 0f ac 10 80 00 46 05 02 00 00 00 00 36 03 12 34 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: ifindex=9 nl80211: beacon_int=100 nl80211: beacon_rate=0 nl80211: rate_type=0 nl80211: dtim_period=2 nl80211: ssid=TestFT * beacon_int=100 * dtim_period=2 nl80211: hidden SSID not in use nl80211: privacy=2 nl80211: auth_algs=0x1 nl80211: wpa_version=0x2 nl80211: key_mgmt_suites=0x140020 nl80211: Not enough room for all AKM suites (num_suites=3 > NL80211_MAX_NR_AKM_SUITES) nl80211: pairwise_ciphers=0x10 nl80211: group_cipher=0x10 nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01 nl80211: multicast to unicast disabled on interface wln0 wln0: Deauthenticate all stations at BSS start nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3 nl80211: send_mlme - Use bss->freq=2412 nl80211: send_mlme -> send_frame_cmd WPA: Start group state machine to set initial keys WPA: group state machine entering state GTK_INIT (VLAN-ID 0) GTK - hexdump(len=16): [REMOVED] IGTK - hexdump(len=16): [REMOVED] WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key nl80211: Set wln0 operstate 0->1 (UP) netlink: Operstate: ifindex=9 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) nl80211: TX queue param set: queue=0 aifs=1 cw_min=3 cw_max=7 burst_time=15 --> res=0 nl80211: TX queue param set: queue=1 aifs=1 cw_min=7 cw_max=15 burst_time=30 --> res=0 nl80211: TX queue param set: queue=2 aifs=3 cw_min=15 cw_max=63 burst_time=0 --> res=0 nl80211: TX queue param set: queue=3 aifs=7 cw_min=15 cw_max=1023 burst_time=0 --> res=0 wln0: interface state UNINITIALIZED->ENABLED wln0: AP-ENABLED wln0: Setup of interface done. nl80211: TDLS supported nl80211: TDLS external setup nl80211: Supported cipher 00-0f-ac:1 nl80211: Supported cipher 00-0f-ac:5 nl80211: Supported cipher 00-0f-ac:2 nl80211: Supported cipher 00-0f-ac:4 nl80211: Supported cipher 00-0f-ac:10 nl80211: Supported cipher 00-0f-ac:8 nl80211: Supported cipher 00-0f-ac:9 nl80211: Supported cipher 00-0f-ac:6 nl80211: Supported cipher 00-0f-ac:13 nl80211: Supported cipher 00-0f-ac:11 nl80211: Supported cipher 00-0f-ac:12 nl80211: Using driver-based off-channel TX nl80211: Driver-advertised extended capabilities (default) - hexdump(len=8): 04 00 40 00 00 00 00 40 nl80211: Driver-advertised extended capabilities mask (default) - hexdump(len=8): 04 00 40 00 00 00 00 40 nl80211: Supported vendor command: vendor_id=0x1374 subcmd=1 nl80211: Supported vendor event: vendor_id=0x1374 subcmd=1 nl80211: Use separate P2P group interface (driver advertised support) nl80211: use P2P_DEVICE support nl80211: key_mgmt=0x1ff0f enc=0xfef auth=0x7 flags=0xe4000d30fb5bfbe0 rrm_flags=0x10 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=4 nl80211: interface wln1 in phy rad1 nl80211: Set mode ifindex 10 iftype 3 (AP) nl80211: Setup AP(wln1) - device_ap_sme=0 use_monitor=0 nl80211: Subscribe to mgmt frames with AP handle 0x119df10 nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x119df10 match= multicast=0 nl80211: Register frame type=0x0 (WLAN_FC_STYPE_ASSOC_REQ) nl_handle=0x119df10 match= multicast=0 nl80211: Register frame type=0x20 (WLAN_FC_STYPE_REASSOC_REQ) nl_handle=0x119df10 match= multicast=0 nl80211: Register frame type=0xa0 (WLAN_FC_STYPE_DISASSOC) nl_handle=0x119df10 match= multicast=0 nl80211: Register frame type=0xc0 (WLAN_FC_STYPE_DEAUTH) nl_handle=0x119df10 match= multicast=0 nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x119df10 match= multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=04 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=0501 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=0503 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=0504 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=06 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=08 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=09 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=0a multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=11 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=7f multicast=0 rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0 nl80211: Add own interface ifindex 10 (ifidx_reason -1) nl80211: if_indices[16]: 10(-1) nl80211: Do not open EAPOL RX socket - using control port for RX phy: rad1 BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits) Using existing control interface directory. nl80211: No channel number found for frequency 5900 MHz nl80211: No channel number found for frequency 5905 MHz nl80211: No channel number found for frequency 5910 MHz nl80211: No channel number found for frequency 5915 MHz nl80211: No channel number found for frequency 5920 MHz nl80211: No channel number found for frequency 5925 MHz nl80211: No channel number found for frequency 902 MHz nl80211: No channel number found for frequency 903 MHz nl80211: No channel number found for frequency 903 MHz nl80211: No channel number found for frequency 904 MHz nl80211: No channel number found for frequency 904 MHz nl80211: No channel number found for frequency 905 MHz nl80211: No channel number found for frequency 905 MHz nl80211: No channel number found for frequency 906 MHz nl80211: No channel number found for frequency 906 MHz nl80211: No channel number found for frequency 907 MHz nl80211: No channel number found for frequency 907 MHz nl80211: No channel number found for frequency 908 MHz nl80211: No channel number found for frequency 908 MHz nl80211: No channel number found for frequency 909 MHz nl80211: No channel number found for frequency 909 MHz nl80211: No channel number found for frequency 910 MHz nl80211: No channel number found for frequency 910 MHz nl80211: No channel number found for frequency 911 MHz nl80211: No channel number found for frequency 911 MHz nl80211: No channel number found for frequency 912 MHz nl80211: No channel number found for frequency 912 MHz nl80211: No channel number found for frequency 913 MHz nl80211: No channel number found for frequency 913 MHz nl80211: No channel number found for frequency 914 MHz nl80211: No channel number found for frequency 914 MHz nl80211: No channel number found for frequency 915 MHz nl80211: No channel number found for frequency 915 MHz nl80211: No channel number found for frequency 916 MHz nl80211: No channel number found for frequency 916 MHz nl80211: No channel number found for frequency 917 MHz nl80211: No channel number found for frequency 917 MHz nl80211: No channel number found for frequency 918 MHz nl80211: No channel number found for frequency 918 MHz nl80211: No channel number found for frequency 919 MHz nl80211: No channel number found for frequency 919 MHz nl80211: No channel number found for frequency 920 MHz nl80211: No channel number found for frequency 920 MHz nl80211: No channel number found for frequency 921 MHz nl80211: No channel number found for frequency 921 MHz nl80211: No channel number found for frequency 922 MHz nl80211: No channel number found for frequency 922 MHz nl80211: No channel number found for frequency 923 MHz nl80211: No channel number found for frequency 923 MHz nl80211: No channel number found for frequency 924 MHz nl80211: No channel number found for frequency 924 MHz nl80211: No channel number found for frequency 925 MHz nl80211: No channel number found for frequency 925 MHz nl80211: No channel number found for frequency 926 MHz nl80211: No channel number found for frequency 926 MHz nl80211: No channel number found for frequency 927 MHz nl80211: No channel number found for frequency 927 MHz nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Remove unsupported mode nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR] Completing interface initialization Mode: IEEE 802.11g Channel: 2 Frequency: 2417 MHz DFS 0 channels required radar detection nl80211: Set freq 2417 (ht_enabled=0, vht_enabled=0, he_enabled=0, bandwidth=20 MHz, cf1=2417 MHz, cf2=0 MHz) * freq=2417 * he_enabled=0 * vht_enabled=0 * ht_enabled=0 * channel_type=0 RATE[0] rate=10 flags=0x1 RATE[1] rate=20 flags=0x1 RATE[2] rate=55 flags=0x1 RATE[3] rate=110 flags=0x1 RATE[4] rate=60 flags=0x0 RATE[5] rate=90 flags=0x0 RATE[6] rate=120 flags=0x0 RATE[7] rate=180 flags=0x0 RATE[8] rate=240 flags=0x0 RATE[9] rate=360 flags=0x0 RATE[10] rate=480 flags=0x0 RATE[11] rate=540 flags=0x0 hostapd_setup_bss(hapd=0x1191060 (wln1), first=1) nl80211: flush -> DEL_STATION wln1 (all) Using interface wln1 with hwaddr 42:00:00:00:01:00 and ssid "TestFT" wln1: RADIUS Authentication server 127.0.0.1:1812 connect[radius]: Network is unreachable GMK - hexdump(len=32): [REMOVED] Key Counter - hexdump(len=32): [REMOVED] WPA: Delay group state machine start until Beacon frames have been configured nl80211: Set beacon (beacon_set=0) nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 42 00 00 00 01 00 42 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 02 nl80211: Beacon tail - hexdump(len=71): 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 01 00 0f ac 10 80 00 46 05 02 00 00 00 00 36 03 12 34 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: ifindex=10 nl80211: beacon_int=100 nl80211: beacon_rate=0 nl80211: rate_type=0 nl80211: dtim_period=2 nl80211: ssid=TestFT * beacon_int=100 * dtim_period=2 nl80211: hidden SSID not in use nl80211: privacy=2 nl80211: auth_algs=0x1 nl80211: wpa_version=0x2 nl80211: key_mgmt_suites=0x100001 nl80211: pairwise_ciphers=0x10 nl80211: group_cipher=0x10 nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01 nl80211: multicast to unicast disabled on interface wln1 wln1: Deauthenticate all stations at BSS start nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3 nl80211: send_mlme - Use bss->freq=2417 nl80211: send_mlme -> send_frame_cmd WPA: Start group state machine to set initial keys WPA: group state machine entering state GTK_INIT (VLAN-ID 0) GTK - hexdump(len=16): [REMOVED] IGTK - hexdump(len=16): [REMOVED] WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key nl80211: Set wln1 operstate 0->1 (UP) netlink: Operstate: ifindex=10 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) nl80211: TX queue param set: queue=0 aifs=1 cw_min=3 cw_max=7 burst_time=15 --> res=0 nl80211: TX queue param set: queue=1 aifs=1 cw_min=7 cw_max=15 burst_time=30 --> res=0 nl80211: TX queue param set: queue=2 aifs=3 cw_min=15 cw_max=63 burst_time=0 --> res=0 nl80211: TX queue param set: queue=3 aifs=7 cw_min=15 cw_max=1023 burst_time=0 --> res=0 wln1: interface state UNINITIALIZED->ENABLED wln1: AP-ENABLED wln1: Setup of interface done. Completing interface initialization hostapd_setup_bss(hapd=0x1195c10 (), first=1) : Deauthenticate all stations at BSS start : interface state UNINITIALIZED->ENABLED : AP-ENABLED : Setup of interface done. Using existing control interface directory. RTM_NEWLINK: ifi_index=9 ifname=wln0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0) nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln0 nl80211: Frame TX status event A1=ff:ff:ff:ff:ff:ff stype=12 cookie=0x1 ack=0 wln0: Event TX_STATUS (16) received mgmt::deauth cb nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln1 nl80211: Frame TX status event A1=ff:ff:ff:ff:ff:ff stype=12 cookie=0x1 ack=0 wln1: Event TX_STATUS (16) received mgmt::deauth cb RX ctrl_iface - hexdump_ascii(len=6): 41 54 54 41 43 48 ATTACH CTRL_IFACE monitor attached /tmp/hostapd_1_0\x00 RX ctrl_iface - hexdump_ascii(len=6): 41 54 54 41 43 48 ATTACH CTRL_IFACE monitor attached /tmp/hostapd_1_1\x00 RTM_NEWLINK: ifi_index=11 ifname=nlmon operstate=0 linkmode=0 ifi_family=0 ifi_flags=0x102c1 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=1 ifname=lo operstate=0 linkmode=0 ifi_family=0 ifi_flags=0x10049 ([UP][RUNNING][LOWER_UP]) nl80211: Ignored event 16 (NL80211_CMD_STOP_AP) for foreign interface (ifindex 9 wdev 0x0) nl80211: Drv Event 16 (NL80211_CMD_STOP_AP) received for wln0 wln0: Event INTERFACE_UNAVAILABLE (28) received Interface wln0 is unavailable -- stopped RTM_NEWLINK: ifi_index=9 ifname=wln0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1002 () nl80211: Interface down (wln0/wln0) wln0: Event INTERFACE_DISABLED (26) received wln0: INTERFACE-DISABLED CTRL_IFACE monitor send /tmp/hostapd_1_0\x00 RTM_NEWLINK: ifi_index=9 ifname=wln0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1002 () l2_packet_receive - recvfrom: Network is down l2_packet_receive - recvfrom: Network is down RTM_NEWLINK: ifi_index=9 ifname=wln0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Interface up (wln0/wln0) nl80211: Own MAC address on ifindex 9 (wln0) changed from 42:00:00:00:00:00 to 12:00:00:00:00:01 wln0: Event INTERFACE_ENABLED (25) received wln0: INTERFACE-ENABLED CTRL_IFACE monitor send /tmp/hostapd_1_0\x00 wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key nl80211: Set beacon (beacon_set=0) nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 42 00 00 00 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 01 nl80211: Beacon tail - hexdump(len=75): 2a 01 04 32 04 30 48 60 6c 30 1c 01 00 00 0f ac 04 01 00 00 0f ac 04 03 00 00 0f ac 03 00 0f ac 0e 00 0f ac 10 80 00 46 05 02 00 00 00 00 36 03 12 34 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: ifindex=9 nl80211: beacon_int=100 nl80211: beacon_rate=0 nl80211: rate_type=0 nl80211: dtim_period=2 nl80211: ssid=TestFT * beacon_int=100 * dtim_period=2 nl80211: hidden SSID not in use nl80211: privacy=2 nl80211: auth_algs=0x1 nl80211: wpa_version=0x2 nl80211: key_mgmt_suites=0x140020 nl80211: Not enough room for all AKM suites (num_suites=3 > NL80211_MAX_NR_AKM_SUITES) nl80211: pairwise_ciphers=0x10 nl80211: group_cipher=0x10 nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01 nl80211: multicast to unicast disabled on interface wln0 RTM_NEWLINK: ifi_index=9 ifname=wln0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) nl80211: Drv Event 16 (NL80211_CMD_STOP_AP) received for wln1 wln1: Event INTERFACE_UNAVAILABLE (28) received Interface wln1 is unavailable -- stopped RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1002 () nl80211: Interface down (wln1/wln1) wln1: Event INTERFACE_DISABLED (26) received wln1: INTERFACE-DISABLED CTRL_IFACE monitor send /tmp/hostapd_1_1\x00 l2_packet_receive - recvfrom: Network is down l2_packet_receive - recvfrom: Network is down RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1002 () RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) nl80211: Interface up (wln1/wln1) nl80211: Own MAC address on ifindex 10 (wln1) changed from 42:00:00:00:01:00 to 12:00:00:00:00:02 wln1: Event INTERFACE_ENABLED (25) received wln1: INTERFACE-ENABLED CTRL_IFACE monitor send /tmp/hostapd_1_1\x00 wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key nl80211: Set beacon (beacon_set=0) nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 42 00 00 00 01 00 42 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 02 nl80211: Beacon tail - hexdump(len=71): 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 01 00 0f ac 10 80 00 46 05 02 00 00 00 00 36 03 12 34 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: ifindex=10 nl80211: beacon_int=100 nl80211: beacon_rate=0 nl80211: rate_type=0 nl80211: dtim_period=2 nl80211: ssid=TestFT * beacon_int=100 * dtim_period=2 nl80211: hidden SSID not in use nl80211: privacy=2 nl80211: auth_algs=0x1 nl80211: wpa_version=0x2 nl80211: key_mgmt_suites=0x100001 nl80211: pairwise_ciphers=0x10 nl80211: group_cipher=0x10 nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01 nl80211: multicast to unicast disabled on interface wln1 RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RX ctrl_iface - hexdump_ascii(len=6): 52 45 4c 4f 41 44 RELOAD Reload interface wln0 wln0: Flushing old station entries nl80211: flush -> DEL_STATION wln0 (all) wln0: Deauthenticate all stations nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3 nl80211: send_mlme - Use bss->freq=2412 nl80211: send_mlme -> send_frame_cmd nl80211: Frame command failed: ret=-22 (Invalid argument) (freq=2412 wait=0) WPA: group state machine entering state GTK_INIT (VLAN-ID 0) GTK - hexdump(len=16): [REMOVED] IGTK - hexdump(len=16): [REMOVED] WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key nl80211: Set beacon (beacon_set=1) nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 42 00 00 00 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 01 nl80211: Beacon tail - hexdump(len=75): 2a 01 04 32 04 30 48 60 6c 30 1c 01 00 00 0f ac 04 01 00 00 0f ac 04 03 00 00 0f ac 03 00 0f ac 0e 00 0f ac 10 80 00 46 05 02 00 00 00 00 36 03 12 34 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: ifindex=9 nl80211: beacon_int=100 nl80211: beacon_rate=0 nl80211: rate_type=0 nl80211: dtim_period=2 nl80211: ssid=TestFT * beacon_int=100 * dtim_period=2 nl80211: hidden SSID not in use nl80211: privacy=2 nl80211: auth_algs=0x1 nl80211: wpa_version=0x2 nl80211: key_mgmt_suites=0x140020 nl80211: Not enough room for all AKM suites (num_suites=3 > NL80211_MAX_NR_AKM_SUITES) nl80211: pairwise_ciphers=0x10 nl80211: group_cipher=0x10 nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01 nl80211: multicast to unicast disabled on interface wln0 Reconfigured interface wln0 RX ctrl_iface - hexdump_ascii(len=7): 44 49 53 41 42 4c 45 DISABLE wln0: AP-DISABLED CTRL_IFACE monitor send /tmp/hostapd_1_0\x00 wln0: Deauthenticate all stations nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3 nl80211: send_mlme - Use bss->freq=2412 nl80211: send_mlme -> send_frame_cmd nl80211: Frame command failed: ret=-22 (Invalid argument) (freq=2412 wait=0) hostapd_free_hapd_data(wln0) hostapd_deinit_driver: driver=0x521a80 drv_priv=0x11941d0 -> hapd_deinit nl80211: deinit ifname=wln0 disabled_11b_rates=0 nl80211: Remove monitor interface: refcount=0 nl80211: Remove beacon (ifindex=9) netlink: Operstate: ifindex=9 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP) nl80211: Set mode ifindex 9 iftype 2 (STATION) nl80211: Teardown AP(wln0) - device_ap_sme=0 use_monitor=0 nl80211: Unsubscribe mgmt frames handle 0x888888888991e3b9 (AP teardown) hostapd_deinit_driver:bss[0]->drv_priv=0x11941d0 hostapd_cleanup_iface_partial(0x118cde0) Interface wln0 disabled wln0: interface state ENABLED->DISABLED RX ctrl_iface - hexdump_ascii(len=6): 45 4e 41 42 4c 45 ENABLE Enable interface wln0 nl80211: TDLS supported nl80211: TDLS external setup nl80211: Supported cipher 00-0f-ac:1 nl80211: Supported cipher 00-0f-ac:5 nl80211: Supported cipher 00-0f-ac:2 nl80211: Supported cipher 00-0f-ac:4 nl80211: Supported cipher 00-0f-ac:10 nl80211: Supported cipher 00-0f-ac:8 nl80211: Supported cipher 00-0f-ac:9 nl80211: Supported cipher 00-0f-ac:6 nl80211: Supported cipher 00-0f-ac:13 nl80211: Supported cipher 00-0f-ac:11 nl80211: Supported cipher 00-0f-ac:12 nl80211: Using driver-based off-channel TX nl80211: Driver-advertised extended capabilities (default) - hexdump(len=8): 04 00 40 00 00 00 00 40 nl80211: Driver-advertised extended capabilities mask (default) - hexdump(len=8): 04 00 40 00 00 00 00 40 nl80211: Supported vendor command: vendor_id=0x1374 subcmd=1 nl80211: Supported vendor event: vendor_id=0x1374 subcmd=1 nl80211: Use separate P2P group interface (driver advertised support) nl80211: use P2P_DEVICE support nl80211: key_mgmt=0x1ff0f enc=0xfef auth=0x7 flags=0xe4000d30fb5bfbe0 rrm_flags=0x10 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=4 nl80211: interface wln0 in phy rad0 nl80211: Set mode ifindex 9 iftype 3 (AP) nl80211: Setup AP(wln0) - device_ap_sme=0 use_monitor=0 nl80211: Subscribe to mgmt frames with AP handle 0x11a7650 nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x11a7650 match= multicast=0 nl80211: Register frame type=0x0 (WLAN_FC_STYPE_ASSOC_REQ) nl_handle=0x11a7650 match= multicast=0 nl80211: Register frame type=0x20 (WLAN_FC_STYPE_REASSOC_REQ) nl_handle=0x11a7650 match= multicast=0 nl80211: Register frame type=0xa0 (WLAN_FC_STYPE_DISASSOC) nl_handle=0x11a7650 match= multicast=0 nl80211: Register frame type=0xc0 (WLAN_FC_STYPE_DEAUTH) nl_handle=0x11a7650 match= multicast=0 nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x11a7650 match= multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a7650 match=04 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a7650 match=0501 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a7650 match=0503 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a7650 match=0504 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a7650 match=06 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a7650 match=08 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a7650 match=09 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a7650 match=0a multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a7650 match=11 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a7650 match=7f multicast=0 rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0 nl80211: Add own interface ifindex 9 (ifidx_reason -1) nl80211: if_indices[16]: 9(-1) nl80211: Do not open EAPOL RX socket - using control port for RX BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits) ctrl_iface already exists! nl80211: No channel number found for frequency 5900 MHz nl80211: No channel number found for frequency 5905 MHz nl80211: No channel number found for frequency 5910 MHz nl80211: No channel number found for frequency 5915 MHz nl80211: No channel number found for frequency 5920 MHz nl80211: No channel number found for frequency 5925 MHz nl80211: No channel number found for frequency 902 MHz nl80211: No channel number found for frequency 903 MHz nl80211: No channel number found for frequency 903 MHz nl80211: No channel number found for frequency 904 MHz nl80211: No channel number found for frequency 904 MHz nl80211: No channel number found for frequency 905 MHz nl80211: No channel number found for frequency 905 MHz nl80211: No channel number found for frequency 906 MHz nl80211: No channel number found for frequency 906 MHz nl80211: No channel number found for frequency 907 MHz nl80211: No channel number found for frequency 907 MHz nl80211: No channel number found for frequency 908 MHz nl80211: No channel number found for frequency 908 MHz nl80211: No channel number found for frequency 909 MHz nl80211: No channel number found for frequency 909 MHz nl80211: No channel number found for frequency 910 MHz nl80211: No channel number found for frequency 910 MHz nl80211: No channel number found for frequency 911 MHz nl80211: No channel number found for frequency 911 MHz nl80211: No channel number found for frequency 912 MHz nl80211: No channel number found for frequency 912 MHz nl80211: No channel number found for frequency 913 MHz nl80211: No channel number found for frequency 913 MHz nl80211: No channel number found for frequency 914 MHz nl80211: No channel number found for frequency 914 MHz nl80211: No channel number found for frequency 915 MHz nl80211: No channel number found for frequency 915 MHz nl80211: No channel number found for frequency 916 MHz nl80211: No channel number found for frequency 916 MHz nl80211: No channel number found for frequency 917 MHz nl80211: No channel number found for frequency 917 MHz nl80211: No channel number found for frequency 918 MHz nl80211: No channel number found for frequency 918 MHz nl80211: No channel number found for frequency 919 MHz nl80211: No channel number found for frequency 919 MHz nl80211: No channel number found for frequency 920 MHz nl80211: No channel number found for frequency 920 MHz nl80211: No channel number found for frequency 921 MHz nl80211: No channel number found for frequency 921 MHz nl80211: No channel number found for frequency 922 MHz nl80211: No channel number found for frequency 922 MHz nl80211: No channel number found for frequency 923 MHz nl80211: No channel number found for frequency 923 MHz nl80211: No channel number found for frequency 924 MHz nl80211: No channel number found for frequency 924 MHz nl80211: No channel number found for frequency 925 MHz nl80211: No channel number found for frequency 925 MHz nl80211: No channel number found for frequency 926 MHz nl80211: No channel number found for frequency 926 MHz nl80211: No channel number found for frequency 927 MHz nl80211: No channel number found for frequency 927 MHz nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Remove unsupported mode nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR] Completing interface initialization Mode: IEEE 802.11g Channel: 1 Frequency: 2412 MHz DFS 0 channels required radar detection nl80211: Set freq 2412 (ht_enabled=0, vht_enabled=0, he_enabled=0, bandwidth=20 MHz, cf1=2412 MHz, cf2=0 MHz) * freq=2412 * he_enabled=0 * vht_enabled=0 * ht_enabled=0 * channel_type=0 RATE[0] rate=10 flags=0x1 RATE[1] rate=20 flags=0x1 RATE[2] rate=55 flags=0x1 RATE[3] rate=110 flags=0x1 RATE[4] rate=60 flags=0x0 RATE[5] rate=90 flags=0x0 RATE[6] rate=120 flags=0x0 RATE[7] rate=180 flags=0x0 RATE[8] rate=240 flags=0x0 RATE[9] rate=360 flags=0x0 RATE[10] rate=480 flags=0x0 RATE[11] rate=540 flags=0x0 hostapd_setup_bss(hapd=0x118e3a0 (wln0), first=1) nl80211: flush -> DEL_STATION wln0 (all) Using interface wln0 with hwaddr 12:00:00:00:00:01 and ssid "TestFT" wln0: RADIUS Authentication server 127.0.0.1:1812 RADIUS local address: 127.0.0.1:52175 GMK - hexdump(len=32): [REMOVED] Key Counter - hexdump(len=32): [REMOVED] WPA: Delay group state machine start until Beacon frames have been configured nl80211: Set beacon (beacon_set=0) nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 12 00 00 00 00 01 12 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 01 nl80211: Beacon tail - hexdump(len=75): 2a 01 04 32 04 30 48 60 6c 30 1c 01 00 00 0f ac 04 01 00 00 0f ac 04 03 00 00 0f ac 03 00 0f ac 0e 00 0f ac 10 80 00 46 05 02 00 00 00 00 36 03 12 34 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: ifindex=9 nl80211: beacon_int=100 nl80211: beacon_rate=0 nl80211: rate_type=0 nl80211: dtim_period=2 nl80211: ssid=TestFT * beacon_int=100 * dtim_period=2 nl80211: hidden SSID not in use nl80211: privacy=2 nl80211: auth_algs=0x1 nl80211: wpa_version=0x2 nl80211: key_mgmt_suites=0x140020 nl80211: Not enough room for all AKM suites (num_suites=3 > NL80211_MAX_NR_AKM_SUITES) nl80211: pairwise_ciphers=0x10 nl80211: group_cipher=0x10 nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01 nl80211: multicast to unicast disabled on interface wln0 wln0: Deauthenticate all stations at BSS start nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3 nl80211: send_mlme - Use bss->freq=2412 nl80211: send_mlme -> send_frame_cmd WPA: Start group state machine to set initial keys WPA: group state machine entering state GTK_INIT (VLAN-ID 0) GTK - hexdump(len=16): [REMOVED] IGTK - hexdump(len=16): [REMOVED] WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key nl80211: Set wln0 operstate 0->1 (UP) netlink: Operstate: ifindex=9 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) nl80211: TX queue param set: queue=0 aifs=1 cw_min=3 cw_max=7 burst_time=15 --> res=0 nl80211: TX queue param set: queue=1 aifs=1 cw_min=7 cw_max=15 burst_time=30 --> res=0 nl80211: TX queue param set: queue=2 aifs=3 cw_min=15 cw_max=63 burst_time=0 --> res=0 nl80211: TX queue param set: queue=3 aifs=7 cw_min=15 cw_max=1023 burst_time=0 --> res=0 wln0: interface state DISABLED->ENABLED wln0: AP-ENABLED CTRL_IFACE monitor send /tmp/hostapd_1_0\x00 wln0: Setup of interface done. nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln0 nl80211: Frame TX status event A1=ff:ff:ff:ff:ff:ff stype=12 cookie=0x2 ack=0 wln0: Event TX_STATUS (16) received mgmt::deauth cb RTM_NEWLINK: ifi_index=9 ifname=wln0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RX ctrl_iface - hexdump_ascii(len=6): 52 45 4c 4f 41 44 RELOAD Reload interface wln1 wln1: Flushing old station entries nl80211: flush -> DEL_STATION wln1 (all) wln1: Deauthenticate all stations nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3 nl80211: send_mlme - Use bss->freq=2417 nl80211: send_mlme -> send_frame_cmd nl80211: Frame command failed: ret=-22 (Invalid argument) (freq=2417 wait=0) WPA: group state machine entering state GTK_INIT (VLAN-ID 0) GTK - hexdump(len=16): [REMOVED] IGTK - hexdump(len=16): [REMOVED] WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key nl80211: Set beacon (beacon_set=1) nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 42 00 00 00 01 00 42 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 02 nl80211: Beacon tail - hexdump(len=71): 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 01 00 0f ac 10 80 00 46 05 02 00 00 00 00 36 03 12 34 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: ifindex=10 nl80211: beacon_int=100 nl80211: beacon_rate=0 nl80211: rate_type=0 nl80211: dtim_period=2 nl80211: ssid=TestFT * beacon_int=100 * dtim_period=2 nl80211: hidden SSID not in use nl80211: privacy=2 nl80211: auth_algs=0x1 nl80211: wpa_version=0x2 nl80211: key_mgmt_suites=0x100001 nl80211: pairwise_ciphers=0x10 nl80211: group_cipher=0x10 nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01 nl80211: multicast to unicast disabled on interface wln1 Reconfigured interface wln1 RX ctrl_iface - hexdump_ascii(len=7): 44 49 53 41 42 4c 45 DISABLE wln1: AP-DISABLED CTRL_IFACE monitor send /tmp/hostapd_1_1\x00 wln1: Deauthenticate all stations nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3 nl80211: send_mlme - Use bss->freq=2417 nl80211: send_mlme -> send_frame_cmd nl80211: Frame command failed: ret=-22 (Invalid argument) (freq=2417 wait=0) hostapd_free_hapd_data(wln1) hostapd_deinit_driver: driver=0x521a80 drv_priv=0x119dd70 -> hapd_deinit nl80211: deinit ifname=wln1 disabled_11b_rates=0 nl80211: Remove monitor interface: refcount=0 nl80211: Remove beacon (ifindex=10) netlink: Operstate: ifindex=10 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP) nl80211: Set mode ifindex 10 iftype 2 (STATION) nl80211: Teardown AP(wln1) - device_ap_sme=0 use_monitor=0 nl80211: Unsubscribe mgmt frames handle 0x8888888889915799 (AP teardown) hostapd_deinit_driver:bss[0]->drv_priv=0x119dd70 hostapd_cleanup_iface_partial(0x118fb60) Interface wln1 disabled wln1: interface state ENABLED->DISABLED RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP]) wln1: Event INTERFACE_STATUS (5) received Unknown event 5 RX ctrl_iface - hexdump_ascii(len=6): 45 4e 41 42 4c 45 ENABLE Enable interface wln1 nl80211: TDLS supported nl80211: TDLS external setup nl80211: Supported cipher 00-0f-ac:1 nl80211: Supported cipher 00-0f-ac:5 nl80211: Supported cipher 00-0f-ac:2 nl80211: Supported cipher 00-0f-ac:4 nl80211: Supported cipher 00-0f-ac:10 nl80211: Supported cipher 00-0f-ac:8 nl80211: Supported cipher 00-0f-ac:9 nl80211: Supported cipher 00-0f-ac:6 nl80211: Supported cipher 00-0f-ac:13 nl80211: Supported cipher 00-0f-ac:11 nl80211: Supported cipher 00-0f-ac:12 nl80211: Using driver-based off-channel TX nl80211: Driver-advertised extended capabilities (default) - hexdump(len=8): 04 00 40 00 00 00 00 40 nl80211: Driver-advertised extended capabilities mask (default) - hexdump(len=8): 04 00 40 00 00 00 00 40 nl80211: Supported vendor command: vendor_id=0x1374 subcmd=1 nl80211: Supported vendor event: vendor_id=0x1374 subcmd=1 nl80211: Use separate P2P group interface (driver advertised support) nl80211: use P2P_DEVICE support nl80211: key_mgmt=0x1ff0f enc=0xfef auth=0x7 flags=0xe4000d30fb5bfbe0 rrm_flags=0x10 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=4 nl80211: interface wln1 in phy rad1 nl80211: Set mode ifindex 10 iftype 3 (AP) nl80211: Setup AP(wln1) - device_ap_sme=0 use_monitor=0 nl80211: Subscribe to mgmt frames with AP handle 0x119df10 nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x119df10 match= multicast=0 nl80211: Register frame type=0x0 (WLAN_FC_STYPE_ASSOC_REQ) nl_handle=0x119df10 match= multicast=0 nl80211: Register frame type=0x20 (WLAN_FC_STYPE_REASSOC_REQ) nl_handle=0x119df10 match= multicast=0 nl80211: Register frame type=0xa0 (WLAN_FC_STYPE_DISASSOC) nl_handle=0x119df10 match= multicast=0 nl80211: Register frame type=0xc0 (WLAN_FC_STYPE_DEAUTH) nl_handle=0x119df10 match= multicast=0 nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x119df10 match= multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=04 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=0501 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=0503 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=0504 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=06 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=08 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=09 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=0a multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=11 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119df10 match=7f multicast=0 rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0 nl80211: Add own interface ifindex 10 (ifidx_reason -1) nl80211: if_indices[16]: 10(-1) nl80211: Do not open EAPOL RX socket - using control port for RX BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits) ctrl_iface already exists! nl80211: No channel number found for frequency 5900 MHz nl80211: No channel number found for frequency 5905 MHz nl80211: No channel number found for frequency 5910 MHz nl80211: No channel number found for frequency 5915 MHz nl80211: No channel number found for frequency 5920 MHz nl80211: No channel number found for frequency 5925 MHz nl80211: No channel number found for frequency 902 MHz nl80211: No channel number found for frequency 903 MHz nl80211: No channel number found for frequency 903 MHz nl80211: No channel number found for frequency 904 MHz nl80211: No channel number found for frequency 904 MHz nl80211: No channel number found for frequency 905 MHz nl80211: No channel number found for frequency 905 MHz nl80211: No channel number found for frequency 906 MHz nl80211: No channel number found for frequency 906 MHz nl80211: No channel number found for frequency 907 MHz nl80211: No channel number found for frequency 907 MHz nl80211: No channel number found for frequency 908 MHz nl80211: No channel number found for frequency 908 MHz nl80211: No channel number found for frequency 909 MHz nl80211: No channel number found for frequency 909 MHz nl80211: No channel number found for frequency 910 MHz nl80211: No channel number found for frequency 910 MHz nl80211: No channel number found for frequency 911 MHz nl80211: No channel number found for frequency 911 MHz nl80211: No channel number found for frequency 912 MHz nl80211: No channel number found for frequency 912 MHz nl80211: No channel number found for frequency 913 MHz nl80211: No channel number found for frequency 913 MHz nl80211: No channel number found for frequency 914 MHz nl80211: No channel number found for frequency 914 MHz nl80211: No channel number found for frequency 915 MHz nl80211: No channel number found for frequency 915 MHz nl80211: No channel number found for frequency 916 MHz nl80211: No channel number found for frequency 916 MHz nl80211: No channel number found for frequency 917 MHz nl80211: No channel number found for frequency 917 MHz nl80211: No channel number found for frequency 918 MHz nl80211: No channel number found for frequency 918 MHz nl80211: No channel number found for frequency 919 MHz nl80211: No channel number found for frequency 919 MHz nl80211: No channel number found for frequency 920 MHz nl80211: No channel number found for frequency 920 MHz nl80211: No channel number found for frequency 921 MHz nl80211: No channel number found for frequency 921 MHz nl80211: No channel number found for frequency 922 MHz nl80211: No channel number found for frequency 922 MHz nl80211: No channel number found for frequency 923 MHz nl80211: No channel number found for frequency 923 MHz nl80211: No channel number found for frequency 924 MHz nl80211: No channel number found for frequency 924 MHz nl80211: No channel number found for frequency 925 MHz nl80211: No channel number found for frequency 925 MHz nl80211: No channel number found for frequency 926 MHz nl80211: No channel number found for frequency 926 MHz nl80211: No channel number found for frequency 927 MHz nl80211: No channel number found for frequency 927 MHz nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Remove unsupported mode nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR] Completing interface initialization Mode: IEEE 802.11g Channel: 2 Frequency: 2417 MHz DFS 0 channels required radar detection nl80211: Set freq 2417 (ht_enabled=0, vht_enabled=0, he_enabled=0, bandwidth=20 MHz, cf1=2417 MHz, cf2=0 MHz) * freq=2417 * he_enabled=0 * vht_enabled=0 * ht_enabled=0 * channel_type=0 RATE[0] rate=10 flags=0x1 RATE[1] rate=20 flags=0x1 RATE[2] rate=55 flags=0x1 RATE[3] rate=110 flags=0x1 RATE[4] rate=60 flags=0x0 RATE[5] rate=90 flags=0x0 RATE[6] rate=120 flags=0x0 RATE[7] rate=180 flags=0x0 RATE[8] rate=240 flags=0x0 RATE[9] rate=360 flags=0x0 RATE[10] rate=480 flags=0x0 RATE[11] rate=540 flags=0x0 hostapd_setup_bss(hapd=0x1191060 (wln1), first=1) nl80211: flush -> DEL_STATION wln1 (all) Using interface wln1 with hwaddr 12:00:00:00:00:02 and ssid "TestFT" wln1: RADIUS Authentication server 127.0.0.1:1812 RADIUS local address: 127.0.0.1:57736 GMK - hexdump(len=32): [REMOVED] Key Counter - hexdump(len=32): [REMOVED] WPA: Delay group state machine start until Beacon frames have been configured nl80211: Set beacon (beacon_set=0) nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 12 00 00 00 00 02 12 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 02 nl80211: Beacon tail - hexdump(len=71): 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 01 00 0f ac 10 80 00 46 05 02 00 00 00 00 36 03 12 34 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: ifindex=10 nl80211: beacon_int=100 nl80211: beacon_rate=0 nl80211: rate_type=0 nl80211: dtim_period=2 nl80211: ssid=TestFT * beacon_int=100 * dtim_period=2 nl80211: hidden SSID not in use nl80211: privacy=2 nl80211: auth_algs=0x1 nl80211: wpa_version=0x2 nl80211: key_mgmt_suites=0x100001 nl80211: pairwise_ciphers=0x10 nl80211: group_cipher=0x10 nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01 nl80211: multicast to unicast disabled on interface wln1 wln1: Deauthenticate all stations at BSS start nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3 nl80211: send_mlme - Use bss->freq=2417 nl80211: send_mlme -> send_frame_cmd WPA: Start group state machine to set initial keys WPA: group state machine entering state GTK_INIT (VLAN-ID 0) GTK - hexdump(len=16): [REMOVED] IGTK - hexdump(len=16): [REMOVED] WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key nl80211: Set wln1 operstate 0->1 (UP) netlink: Operstate: ifindex=10 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) nl80211: TX queue param set: queue=0 aifs=1 cw_min=3 cw_max=7 burst_time=15 --> res=0 nl80211: TX queue param set: queue=1 aifs=1 cw_min=7 cw_max=15 burst_time=30 --> res=0 nl80211: TX queue param set: queue=2 aifs=3 cw_min=15 cw_max=63 burst_time=0 --> res=0 nl80211: TX queue param set: queue=3 aifs=7 cw_min=15 cw_max=1023 burst_time=0 --> res=0 wln1: interface state DISABLED->ENABLED wln1: AP-ENABLED CTRL_IFACE monitor send /tmp/hostapd_1_1\x00 wln1: Setup of interface done. RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln1 nl80211: Frame TX status event A1=ff:ff:ff:ff:ff:ff stype=12 cookie=0x2 ack=0 wln1: Event TX_STATUS (16) received mgmt::deauth cb RX ctrl_iface - hexdump_ascii(len=87): 53 45 54 5f 4e 45 49 47 48 42 4f 52 20 31 32 3a SET_NEIGHBOR 12: 30 30 3a 30 30 3a 30 30 3a 30 30 3a 30 32 20 73 00:00:00:00:02 s 73 69 64 3d 22 54 65 73 74 46 54 22 20 6e 72 3d sid="TestFT" nr= 31 32 30 30 30 30 30 30 30 30 30 32 38 66 30 30 1200000000028f00 30 30 30 30 35 31 30 32 30 36 30 36 30 33 30 30 0000510206060300 30 30 30 30 20 20 20 0000 RX ctrl_iface - hexdump_ascii(len=87): 53 45 54 5f 4e 45 49 47 48 42 4f 52 20 31 32 3a SET_NEIGHBOR 12: 30 30 3a 30 30 3a 30 30 3a 30 30 3a 30 31 20 73 00:00:00:00:01 s 73 69 64 3d 22 54 65 73 74 46 54 22 20 6e 72 3d sid="TestFT" nr= 31 32 30 30 30 30 30 30 30 30 30 31 38 66 30 30 1200000000018f00 30 30 30 30 35 31 30 31 30 36 30 36 30 33 30 30 0000510106060300 30 30 30 30 20 20 20 0000 RTM_DELLINK: ifi_index=8 ifname=wlan2 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1002 () RTM_DELLINK: Interface 'wlan2' removed RTM_NEWLINK: ifi_index=12 ifname=wlan2 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1002 () RTM_NEWLINK: ifi_index=12 ifname=wlan2 operstate=0 linkmode=0 ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) RTM_NEWLINK: ifi_index=12 ifname=wlan2 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK: ifi_index=12 ifname=wlan2 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) RX ctrl_iface - hexdump_ascii(len=36): 53 45 54 20 77 70 61 5f 6b 65 79 5f 6d 67 6d 74 SET wpa_key_mgmt 20 57 50 41 2d 45 41 50 20 46 49 4c 53 2d 53 48 WPA-EAP FILS-SH 41 32 35 36 A256 CTRL_IFACE SET 'wpa_key_mgmt'='WPA-EAP FILS-SHA256' RX ctrl_iface - hexdump_ascii(len=6): 52 45 4c 4f 41 44 RELOAD Reload interface wln0 wln0: Flushing old station entries nl80211: flush -> DEL_STATION wln0 (all) wln0: Deauthenticate all stations nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3 nl80211: send_mlme - Use bss->freq=2412 nl80211: send_mlme -> send_frame_cmd WPA: group state machine entering state GTK_INIT (VLAN-ID 0) GTK - hexdump(len=16): [REMOVED] IGTK - hexdump(len=16): [REMOVED] WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key nl80211: Set beacon (beacon_set=1) nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 12 00 00 00 00 01 12 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 01 nl80211: Beacon tail - hexdump(len=66): 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 01 00 0f ac 0e 80 00 46 05 02 00 00 00 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: ifindex=9 nl80211: beacon_int=100 nl80211: beacon_rate=0 nl80211: rate_type=0 nl80211: dtim_period=2 nl80211: ssid=TestFT * beacon_int=100 * dtim_period=2 nl80211: hidden SSID not in use nl80211: privacy=2 nl80211: auth_algs=0x1 nl80211: wpa_version=0x2 nl80211: key_mgmt_suites=0x40001 nl80211: pairwise_ciphers=0x10 nl80211: group_cipher=0x10 nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01 nl80211: multicast to unicast disabled on interface wln0 Reconfigured interface wln0 nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0) nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln0 nl80211: Frame TX status event A1=ff:ff:ff:ff:ff:ff stype=12 cookie=0x3 ack=0 wln0: Event TX_STATUS (16) received mgmt::deauth cb RX ctrl_iface - hexdump_ascii(len=7): 44 49 53 41 42 4c 45 DISABLE wln0: AP-DISABLED CTRL_IFACE monitor send /tmp/hostapd_1_0\x00 wln0: Deauthenticate all stations nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3 nl80211: send_mlme - Use bss->freq=2412 nl80211: send_mlme -> send_frame_cmd hostapd_free_hapd_data(wln0) hostapd_deinit_driver: driver=0x521a80 drv_priv=0x119d710 -> hapd_deinit nl80211: deinit ifname=wln0 disabled_11b_rates=0 nl80211: Remove monitor interface: refcount=0 nl80211: Remove beacon (ifindex=9) netlink: Operstate: ifindex=9 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP) nl80211: Set mode ifindex 9 iftype 2 (STATION) nl80211: Teardown AP(wln0) - device_ap_sme=0 use_monitor=0 nl80211: Unsubscribe mgmt frames handle 0x888888888992fed9 (AP teardown) hostapd_deinit_driver:bss[0]->drv_priv=0x119d710 hostapd_cleanup_iface_partial(0x118cde0) Interface wln0 disabled wln0: interface state ENABLED->DISABLED nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0) RX ctrl_iface - hexdump_ascii(len=6): 45 4e 41 42 4c 45 ENABLE Enable interface wln0 nl80211: TDLS supported nl80211: TDLS external setup nl80211: Supported cipher 00-0f-ac:1 nl80211: Supported cipher 00-0f-ac:5 nl80211: Supported cipher 00-0f-ac:2 nl80211: Supported cipher 00-0f-ac:4 nl80211: Supported cipher 00-0f-ac:10 nl80211: Supported cipher 00-0f-ac:8 nl80211: Supported cipher 00-0f-ac:9 nl80211: Supported cipher 00-0f-ac:6 nl80211: Supported cipher 00-0f-ac:13 nl80211: Supported cipher 00-0f-ac:11 nl80211: Supported cipher 00-0f-ac:12 nl80211: Using driver-based off-channel TX nl80211: Driver-advertised extended capabilities (default) - hexdump(len=8): 04 00 40 00 00 00 00 40 nl80211: Driver-advertised extended capabilities mask (default) - hexdump(len=8): 04 00 40 00 00 00 00 40 nl80211: Supported vendor command: vendor_id=0x1374 subcmd=1 nl80211: Supported vendor event: vendor_id=0x1374 subcmd=1 nl80211: Use separate P2P group interface (driver advertised support) nl80211: use P2P_DEVICE support nl80211: key_mgmt=0x1ff0f enc=0xfef auth=0x7 flags=0xe4000d30fb5bfbe0 rrm_flags=0x10 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=4 nl80211: interface wln0 in phy rad0 nl80211: Set mode ifindex 9 iftype 3 (AP) nl80211: Setup AP(wln0) - device_ap_sme=0 use_monitor=0 nl80211: Subscribe to mgmt frames with AP handle 0x11a2510 nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x11a2510 match= multicast=0 nl80211: Register frame type=0x0 (WLAN_FC_STYPE_ASSOC_REQ) nl_handle=0x11a2510 match= multicast=0 nl80211: Register frame type=0x20 (WLAN_FC_STYPE_REASSOC_REQ) nl_handle=0x11a2510 match= multicast=0 nl80211: Register frame type=0xa0 (WLAN_FC_STYPE_DISASSOC) nl_handle=0x11a2510 match= multicast=0 nl80211: Register frame type=0xc0 (WLAN_FC_STYPE_DEAUTH) nl_handle=0x11a2510 match= multicast=0 nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x11a2510 match= multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a2510 match=04 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a2510 match=0501 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a2510 match=0503 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a2510 match=0504 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a2510 match=06 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a2510 match=08 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a2510 match=09 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a2510 match=0a multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a2510 match=11 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x11a2510 match=7f multicast=0 rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0 nl80211: Add own interface ifindex 9 (ifidx_reason -1) nl80211: if_indices[16]: 9(-1) nl80211: Do not open EAPOL RX socket - using control port for RX BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits) ctrl_iface already exists! nl80211: No channel number found for frequency 5900 MHz nl80211: No channel number found for frequency 5905 MHz nl80211: No channel number found for frequency 5910 MHz nl80211: No channel number found for frequency 5915 MHz nl80211: No channel number found for frequency 5920 MHz nl80211: No channel number found for frequency 5925 MHz nl80211: No channel number found for frequency 902 MHz nl80211: No channel number found for frequency 903 MHz nl80211: No channel number found for frequency 903 MHz nl80211: No channel number found for frequency 904 MHz nl80211: No channel number found for frequency 904 MHz nl80211: No channel number found for frequency 905 MHz nl80211: No channel number found for frequency 905 MHz nl80211: No channel number found for frequency 906 MHz nl80211: No channel number found for frequency 906 MHz nl80211: No channel number found for frequency 907 MHz nl80211: No channel number found for frequency 907 MHz nl80211: No channel number found for frequency 908 MHz nl80211: No channel number found for frequency 908 MHz nl80211: No channel number found for frequency 909 MHz nl80211: No channel number found for frequency 909 MHz nl80211: No channel number found for frequency 910 MHz nl80211: No channel number found for frequency 910 MHz nl80211: No channel number found for frequency 911 MHz nl80211: No channel number found for frequency 911 MHz nl80211: No channel number found for frequency 912 MHz nl80211: No channel number found for frequency 912 MHz nl80211: No channel number found for frequency 913 MHz nl80211: No channel number found for frequency 913 MHz nl80211: No channel number found for frequency 914 MHz nl80211: No channel number found for frequency 914 MHz nl80211: No channel number found for frequency 915 MHz nl80211: No channel number found for frequency 915 MHz nl80211: No channel number found for frequency 916 MHz nl80211: No channel number found for frequency 916 MHz nl80211: No channel number found for frequency 917 MHz nl80211: No channel number found for frequency 917 MHz nl80211: No channel number found for frequency 918 MHz nl80211: No channel number found for frequency 918 MHz nl80211: No channel number found for frequency 919 MHz nl80211: No channel number found for frequency 919 MHz nl80211: No channel number found for frequency 920 MHz nl80211: No channel number found for frequency 920 MHz nl80211: No channel number found for frequency 921 MHz nl80211: No channel number found for frequency 921 MHz nl80211: No channel number found for frequency 922 MHz nl80211: No channel number found for frequency 922 MHz nl80211: No channel number found for frequency 923 MHz nl80211: No channel number found for frequency 923 MHz nl80211: No channel number found for frequency 924 MHz nl80211: No channel number found for frequency 924 MHz nl80211: No channel number found for frequency 925 MHz nl80211: No channel number found for frequency 925 MHz nl80211: No channel number found for frequency 926 MHz nl80211: No channel number found for frequency 926 MHz nl80211: No channel number found for frequency 927 MHz nl80211: No channel number found for frequency 927 MHz nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Remove unsupported mode nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR] Completing interface initialization Mode: IEEE 802.11g Channel: 1 Frequency: 2412 MHz DFS 0 channels required radar detection nl80211: Set freq 2412 (ht_enabled=0, vht_enabled=0, he_enabled=0, bandwidth=20 MHz, cf1=2412 MHz, cf2=0 MHz) * freq=2412 * he_enabled=0 * vht_enabled=0 * ht_enabled=0 * channel_type=0 RATE[0] rate=10 flags=0x1 RATE[1] rate=20 flags=0x1 RATE[2] rate=55 flags=0x1 RATE[3] rate=110 flags=0x1 RATE[4] rate=60 flags=0x0 RATE[5] rate=90 flags=0x0 RATE[6] rate=120 flags=0x0 RATE[7] rate=180 flags=0x0 RATE[8] rate=240 flags=0x0 RATE[9] rate=360 flags=0x0 RATE[10] rate=480 flags=0x0 RATE[11] rate=540 flags=0x0 hostapd_setup_bss(hapd=0x118e3a0 (wln0), first=1) nl80211: flush -> DEL_STATION wln0 (all) Using interface wln0 with hwaddr 12:00:00:00:00:01 and ssid "TestFT" wln0: RADIUS Authentication server 127.0.0.1:1812 RADIUS local address: 127.0.0.1:47133 GMK - hexdump(len=32): [REMOVED] Key Counter - hexdump(len=32): [REMOVED] WPA: Delay group state machine start until Beacon frames have been configured nl80211: Set beacon (beacon_set=0) nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 12 00 00 00 00 01 12 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 01 nl80211: Beacon tail - hexdump(len=66): 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 01 00 0f ac 0e 80 00 46 05 02 00 00 00 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: ifindex=9 nl80211: beacon_int=100 nl80211: beacon_rate=0 nl80211: rate_type=0 nl80211: dtim_period=2 nl80211: ssid=TestFT * beacon_int=100 * dtim_period=2 nl80211: hidden SSID not in use nl80211: privacy=2 nl80211: auth_algs=0x1 nl80211: wpa_version=0x2 nl80211: key_mgmt_suites=0x40001 nl80211: pairwise_ciphers=0x10 nl80211: group_cipher=0x10 nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01 nl80211: multicast to unicast disabled on interface wln0 wln0: Deauthenticate all stations at BSS start nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3 nl80211: send_mlme - Use bss->freq=2412 nl80211: send_mlme -> send_frame_cmd WPA: Start group state machine to set initial keys WPA: group state machine entering state GTK_INIT (VLAN-ID 0) GTK - hexdump(len=16): [REMOVED] IGTK - hexdump(len=16): [REMOVED] WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key nl80211: Set wln0 operstate 0->1 (UP) netlink: Operstate: ifindex=9 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) nl80211: TX queue param set: queue=0 aifs=1 cw_min=3 cw_max=7 burst_time=15 --> res=0 nl80211: TX queue param set: queue=1 aifs=1 cw_min=7 cw_max=15 burst_time=30 --> res=0 nl80211: TX queue param set: queue=2 aifs=3 cw_min=15 cw_max=63 burst_time=0 --> res=0 nl80211: TX queue param set: queue=3 aifs=7 cw_min=15 cw_max=1023 burst_time=0 --> res=0 wln0: interface state DISABLED->ENABLED wln0: AP-ENABLED CTRL_IFACE monitor send /tmp/hostapd_1_0\x00 wln0: Setup of interface done. nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln0 nl80211: Frame TX status event A1=ff:ff:ff:ff:ff:ff stype=12 cookie=0x5 ack=0 wln0: Event TX_STATUS (16) received mgmt::deauth cb RTM_NEWLINK: ifi_index=9 ifname=wln0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RX ctrl_iface - hexdump_ascii(len=36): 53 45 54 20 77 70 61 5f 6b 65 79 5f 6d 67 6d 74 SET wpa_key_mgmt 20 57 50 41 2d 45 41 50 20 46 49 4c 53 2d 53 48 WPA-EAP FILS-SH 41 32 35 36 A256 CTRL_IFACE SET 'wpa_key_mgmt'='WPA-EAP FILS-SHA256' RX ctrl_iface - hexdump_ascii(len=6): 52 45 4c 4f 41 44 RELOAD Reload interface wln1 wln1: Flushing old station entries nl80211: flush -> DEL_STATION wln1 (all) wln1: Deauthenticate all stations nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3 nl80211: send_mlme - Use bss->freq=2417 nl80211: send_mlme -> send_frame_cmd WPA: group state machine entering state GTK_INIT (VLAN-ID 0) GTK - hexdump(len=16): [REMOVED] IGTK - hexdump(len=16): [REMOVED] WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key nl80211: Set beacon (beacon_set=1) nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 12 00 00 00 00 02 12 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 02 nl80211: Beacon tail - hexdump(len=66): 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 01 00 0f ac 0e 80 00 46 05 02 00 00 00 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: ifindex=10 nl80211: beacon_int=100 nl80211: beacon_rate=0 nl80211: rate_type=0 nl80211: dtim_period=2 nl80211: ssid=TestFT * beacon_int=100 * dtim_period=2 nl80211: hidden SSID not in use nl80211: privacy=2 nl80211: auth_algs=0x1 nl80211: wpa_version=0x2 nl80211: key_mgmt_suites=0x40001 nl80211: pairwise_ciphers=0x10 nl80211: group_cipher=0x10 nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01 nl80211: multicast to unicast disabled on interface wln1 Reconfigured interface wln1 nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 10 wdev 0x0) nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln1 nl80211: Frame TX status event A1=ff:ff:ff:ff:ff:ff stype=12 cookie=0x3 ack=0 wln1: Event TX_STATUS (16) received mgmt::deauth cb RX ctrl_iface - hexdump_ascii(len=7): 44 49 53 41 42 4c 45 DISABLE wln1: AP-DISABLED CTRL_IFACE monitor send /tmp/hostapd_1_1\x00 wln1: Deauthenticate all stations nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3 nl80211: send_mlme - Use bss->freq=2417 nl80211: send_mlme -> send_frame_cmd hostapd_free_hapd_data(wln1) hostapd_deinit_driver: driver=0x521a80 drv_priv=0x11a92d0 -> hapd_deinit nl80211: deinit ifname=wln1 disabled_11b_rates=0 nl80211: Remove monitor interface: refcount=0 nl80211: Remove beacon (ifindex=10) netlink: Operstate: ifindex=10 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP) nl80211: Set mode ifindex 10 iftype 2 (STATION) nl80211: Teardown AP(wln1) - device_ap_sme=0 use_monitor=0 nl80211: Unsubscribe mgmt frames handle 0x8888888889915799 (AP teardown) hostapd_deinit_driver:bss[0]->drv_priv=0x11a92d0 hostapd_cleanup_iface_partial(0x118fb60) Interface wln1 disabled wln1: interface state ENABLED->DISABLED nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 10 wdev 0x0) RX ctrl_iface - hexdump_ascii(len=6): 45 4e 41 42 4c 45 ENABLE Enable interface wln1 nl80211: TDLS supported nl80211: TDLS external setup nl80211: Supported cipher 00-0f-ac:1 nl80211: Supported cipher 00-0f-ac:5 nl80211: Supported cipher 00-0f-ac:2 nl80211: Supported cipher 00-0f-ac:4 nl80211: Supported cipher 00-0f-ac:10 nl80211: Supported cipher 00-0f-ac:8 nl80211: Supported cipher 00-0f-ac:9 nl80211: Supported cipher 00-0f-ac:6 nl80211: Supported cipher 00-0f-ac:13 nl80211: Supported cipher 00-0f-ac:11 nl80211: Supported cipher 00-0f-ac:12 nl80211: Using driver-based off-channel TX nl80211: Driver-advertised extended capabilities (default) - hexdump(len=8): 04 00 40 00 00 00 00 40 nl80211: Driver-advertised extended capabilities mask (default) - hexdump(len=8): 04 00 40 00 00 00 00 40 nl80211: Supported vendor command: vendor_id=0x1374 subcmd=1 nl80211: Supported vendor event: vendor_id=0x1374 subcmd=1 nl80211: Use separate P2P group interface (driver advertised support) nl80211: use P2P_DEVICE support nl80211: key_mgmt=0x1ff0f enc=0xfef auth=0x7 flags=0xe4000d30fb5bfbe0 rrm_flags=0x10 probe_resp_offloads=0x0 max_stations=0 max_remain_on_chan=5000 max_scan_ssids=4 nl80211: interface wln1 in phy rad1 nl80211: Set mode ifindex 10 iftype 3 (AP) nl80211: Setup AP(wln1) - device_ap_sme=0 use_monitor=0 nl80211: Subscribe to mgmt frames with AP handle 0x119ea50 nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x119ea50 match= multicast=0 nl80211: Register frame type=0x0 (WLAN_FC_STYPE_ASSOC_REQ) nl_handle=0x119ea50 match= multicast=0 nl80211: Register frame type=0x20 (WLAN_FC_STYPE_REASSOC_REQ) nl_handle=0x119ea50 match= multicast=0 nl80211: Register frame type=0xa0 (WLAN_FC_STYPE_DISASSOC) nl_handle=0x119ea50 match= multicast=0 nl80211: Register frame type=0xc0 (WLAN_FC_STYPE_DEAUTH) nl_handle=0x119ea50 match= multicast=0 nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x119ea50 match= multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119ea50 match=04 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119ea50 match=0501 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119ea50 match=0503 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119ea50 match=0504 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119ea50 match=06 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119ea50 match=08 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119ea50 match=09 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119ea50 match=0a multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119ea50 match=11 multicast=0 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x119ea50 match=7f multicast=0 rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0 nl80211: Add own interface ifindex 10 (ifidx_reason -1) nl80211: if_indices[16]: 10(-1) nl80211: Do not open EAPOL RX socket - using control port for RX BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits) ctrl_iface already exists! nl80211: No channel number found for frequency 5900 MHz nl80211: No channel number found for frequency 5905 MHz nl80211: No channel number found for frequency 5910 MHz nl80211: No channel number found for frequency 5915 MHz nl80211: No channel number found for frequency 5920 MHz nl80211: No channel number found for frequency 5925 MHz nl80211: No channel number found for frequency 902 MHz nl80211: No channel number found for frequency 903 MHz nl80211: No channel number found for frequency 903 MHz nl80211: No channel number found for frequency 904 MHz nl80211: No channel number found for frequency 904 MHz nl80211: No channel number found for frequency 905 MHz nl80211: No channel number found for frequency 905 MHz nl80211: No channel number found for frequency 906 MHz nl80211: No channel number found for frequency 906 MHz nl80211: No channel number found for frequency 907 MHz nl80211: No channel number found for frequency 907 MHz nl80211: No channel number found for frequency 908 MHz nl80211: No channel number found for frequency 908 MHz nl80211: No channel number found for frequency 909 MHz nl80211: No channel number found for frequency 909 MHz nl80211: No channel number found for frequency 910 MHz nl80211: No channel number found for frequency 910 MHz nl80211: No channel number found for frequency 911 MHz nl80211: No channel number found for frequency 911 MHz nl80211: No channel number found for frequency 912 MHz nl80211: No channel number found for frequency 912 MHz nl80211: No channel number found for frequency 913 MHz nl80211: No channel number found for frequency 913 MHz nl80211: No channel number found for frequency 914 MHz nl80211: No channel number found for frequency 914 MHz nl80211: No channel number found for frequency 915 MHz nl80211: No channel number found for frequency 915 MHz nl80211: No channel number found for frequency 916 MHz nl80211: No channel number found for frequency 916 MHz nl80211: No channel number found for frequency 917 MHz nl80211: No channel number found for frequency 917 MHz nl80211: No channel number found for frequency 918 MHz nl80211: No channel number found for frequency 918 MHz nl80211: No channel number found for frequency 919 MHz nl80211: No channel number found for frequency 919 MHz nl80211: No channel number found for frequency 920 MHz nl80211: No channel number found for frequency 920 MHz nl80211: No channel number found for frequency 921 MHz nl80211: No channel number found for frequency 921 MHz nl80211: No channel number found for frequency 922 MHz nl80211: No channel number found for frequency 922 MHz nl80211: No channel number found for frequency 923 MHz nl80211: No channel number found for frequency 923 MHz nl80211: No channel number found for frequency 924 MHz nl80211: No channel number found for frequency 924 MHz nl80211: No channel number found for frequency 925 MHz nl80211: No channel number found for frequency 925 MHz nl80211: No channel number found for frequency 926 MHz nl80211: No channel number found for frequency 926 MHz nl80211: No channel number found for frequency 927 MHz nl80211: No channel number found for frequency 927 MHz nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz 20 mBm nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR) nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR) nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR) nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR) nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR) nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR) nl80211: 57240-63720 @ 2160 MHz 0 mBm nl80211: Remove unsupported mode nl80211: Added 802.11b mode based on 802.11g information nl80211: Mode IEEE 802.11g: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR] nl80211: Mode IEEE 802.11a: 5180[NO_IR] 5200[NO_IR] 5220[NO_IR] 5240[NO_IR] 5260[NO_IR][RADAR] 5280[NO_IR][RADAR] 5300[NO_IR][RADAR] 5320[NO_IR][RADAR] 5500[NO_IR][RADAR] 5520[NO_IR][RADAR] 5540[NO_IR][RADAR] nl80211: Mode IEEE 802.11b: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467[NO_IR] 2472[NO_IR] 2484[NO_IR] Completing interface initialization Mode: IEEE 802.11g Channel: 2 Frequency: 2417 MHz DFS 0 channels required radar detection nl80211: Set freq 2417 (ht_enabled=0, vht_enabled=0, he_enabled=0, bandwidth=20 MHz, cf1=2417 MHz, cf2=0 MHz) * freq=2417 * he_enabled=0 * vht_enabled=0 * ht_enabled=0 * channel_type=0 RATE[0] rate=10 flags=0x1 RATE[1] rate=20 flags=0x1 RATE[2] rate=55 flags=0x1 RATE[3] rate=110 flags=0x1 RATE[4] rate=60 flags=0x0 RATE[5] rate=90 flags=0x0 RATE[6] rate=120 flags=0x0 RATE[7] rate=180 flags=0x0 RATE[8] rate=240 flags=0x0 RATE[9] rate=360 flags=0x0 RATE[10] rate=480 flags=0x0 RATE[11] rate=540 flags=0x0 hostapd_setup_bss(hapd=0x1191060 (wln1), first=1) nl80211: flush -> DEL_STATION wln1 (all) Using interface wln1 with hwaddr 12:00:00:00:00:02 and ssid "TestFT" wln1: RADIUS Authentication server 127.0.0.1:1812 RADIUS local address: 127.0.0.1:42289 GMK - hexdump(len=32): [REMOVED] Key Counter - hexdump(len=32): [REMOVED] WPA: Delay group state machine start until Beacon frames have been configured nl80211: Set beacon (beacon_set=0) nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 12 00 00 00 00 02 12 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 02 nl80211: Beacon tail - hexdump(len=66): 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 01 00 0f ac 0e 80 00 46 05 02 00 00 00 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: ifindex=10 nl80211: beacon_int=100 nl80211: beacon_rate=0 nl80211: rate_type=0 nl80211: dtim_period=2 nl80211: ssid=TestFT * beacon_int=100 * dtim_period=2 nl80211: hidden SSID not in use nl80211: privacy=2 nl80211: auth_algs=0x1 nl80211: wpa_version=0x2 nl80211: key_mgmt_suites=0x40001 nl80211: pairwise_ciphers=0x10 nl80211: group_cipher=0x10 nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01 nl80211: multicast to unicast disabled on interface wln1 wln1: Deauthenticate all stations at BSS start nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3 nl80211: send_mlme - Use bss->freq=2417 nl80211: send_mlme -> send_frame_cmd WPA: Start group state machine to set initial keys WPA: group state machine entering state GTK_INIT (VLAN-ID 0) GTK - hexdump(len=16): [REMOVED] IGTK - hexdump(len=16): [REMOVED] WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key nl80211: Set wln1 operstate 0->1 (UP) netlink: Operstate: ifindex=10 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) nl80211: TX queue param set: queue=0 aifs=1 cw_min=3 cw_max=7 burst_time=15 --> res=0 nl80211: TX queue param set: queue=1 aifs=1 cw_min=7 cw_max=15 burst_time=30 --> res=0 nl80211: TX queue param set: queue=2 aifs=3 cw_min=15 cw_max=63 burst_time=0 --> res=0 nl80211: TX queue param set: queue=3 aifs=7 cw_min=15 cw_max=1023 burst_time=0 --> res=0 wln1: interface state DISABLED->ENABLED wln1: AP-ENABLED CTRL_IFACE monitor send /tmp/hostapd_1_1\x00 wln1: Setup of interface done. nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln1 nl80211: Frame TX status event A1=ff:ff:ff:ff:ff:ff stype=12 cookie=0x5 ack=0 wln1: Event TX_STATUS (16) received mgmt::deauth cb RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0) nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln0 nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=02:00:00:00:02:00 bssid=ff:ff:ff:ff:ff:ff freq=2412 ssi_signal=-30 fc=0x40 seq_ctrl=0x310 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=109 nl80211: send_mlme - da=02:00:00:00:02:00 noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3 nl80211: send_mlme - Use bss->freq=2412 nl80211: send_mlme -> send_frame_cmd nl80211: Ignored event 34 (NL80211_CMD_NEW_SCAN_RESULTS) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 34 (NL80211_CMD_NEW_SCAN_RESULTS) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 34 (NL80211_CMD_NEW_SCAN_RESULTS) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 34 (NL80211_CMD_NEW_SCAN_RESULTS) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0) nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln1 nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=02:00:00:00:02:00 bssid=ff:ff:ff:ff:ff:ff freq=2417 ssi_signal=-30 fc=0x40 seq_ctrl=0x8520 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=109 nl80211: send_mlme - da=02:00:00:00:02:00 noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3 nl80211: send_mlme - Use bss->freq=2417 nl80211: send_mlme -> send_frame_cmd nl80211: Ignored event 34 (NL80211_CMD_NEW_SCAN_RESULTS) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 34 (NL80211_CMD_NEW_SCAN_RESULTS) for foreign interface (ifindex 12 wdev 0x0) RX ctrl_iface - hexdump_ascii(len=9): 53 54 41 2d 46 49 52 53 54 STA-FIRST RX ctrl_iface - hexdump_ascii(len=9): 53 54 41 2d 4e 45 58 54 20 STA-NEXT RX ctrl_iface - hexdump_ascii(len=9): 53 54 41 2d 46 49 52 53 54 STA-FIRST RX ctrl_iface - hexdump_ascii(len=9): 53 54 41 2d 4e 45 58 54 20 STA-NEXT RX ctrl_iface - hexdump_ascii(len=6): 53 54 41 54 55 53 STATUS nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln0 nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=02:00:00:00:02:00 bssid=ff:ff:ff:ff:ff:ff freq=2412 ssi_signal=-30 fc=0x40 seq_ctrl=0x0 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=103 nl80211: send_mlme - da=02:00:00:00:02:00 noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3 nl80211: send_mlme - Use bss->freq=2412 nl80211: send_mlme -> send_frame_cmd nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0) nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln0 nl80211: Frame TX status event A1=02:00:00:00:02:00 stype=5 cookie=0x6 ack=1 wln0: Event TX_STATUS (16) received nl80211: Ignored event 34 (NL80211_CMD_NEW_SCAN_RESULTS) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 34 (NL80211_CMD_NEW_SCAN_RESULTS) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 19 (NL80211_CMD_NEW_STATION) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 19 (NL80211_CMD_NEW_STATION) for foreign interface (ifindex 12 wdev 0x0) nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln0 nl80211: RX frame da=12:00:00:00:00:01 sa=02:00:00:00:02:00 bssid=12:00:00:00:00:01 freq=2412 ssi_signal=-30 fc=0xb0 seq_ctrl=0x10 stype=11 (WLAN_FC_STYPE_AUTH) len=30 wln0: Event RX_MGMT (18) received mgmt::auth authentication: STA=02:00:00:00:02:00 auth_alg=0 auth_transaction=1 status_code=0 wep=0 seq_ctrl=0x10 New STA ap_sta_add: register ap_handle_timer timeout for 02:00:00:00:02:00 (300 seconds - ap_max_inactivity) nl80211: sta_remove -> DEL_STATION wln0 02:00:00:00:02:00 --> -2 (No such file or directory) nl80211: Add STA 02:00:00:00:02:00 * supported rates - hexdump(len=4): 02 04 0b 16 * capability=0x0 * aid=1 (UNASSOC_STA workaround) * listen_interval=0 * flags set=0x0 mask=0xa0 wln0: STA 02:00:00:00:02:00 IEEE 802.11: authentication OK (open system) wln0: STA 02:00:00:00:02:00 MLME: MLME-AUTHENTICATE.indication(02:00:00:00:02:00, OPEN_SYSTEM) wln0: STA 02:00:00:00:02:00 MLME: MLME-DELETEKEYS.request(02:00:00:00:02:00) authentication reply: STA=02:00:00:00:02:00 auth_alg=0 auth_transaction=2 resp=0 (IE len=0) (dbg=handle-auth) nl80211: send_mlme - da=02:00:00:00:02:00 noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xb0 (WLAN_FC_STYPE_AUTH) nlmode=3 nl80211: send_mlme - Use bss->freq=2412 nl80211: send_mlme -> send_frame_cmd nl80211: Ignored event 19 (NL80211_CMD_NEW_STATION) for foreign interface (ifindex 9 wdev 0x0) nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wln0 nl80211: New station 02:00:00:00:02:00 nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0) nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln0 nl80211: Frame TX status event A1=02:00:00:00:02:00 stype=11 cookie=0x7 ack=1 wln0: Event TX_STATUS (16) received mgmt::auth cb wln0: STA 02:00:00:00:02:00 IEEE 802.11: authenticated nl80211: Set STA flags - ifname=wln0 addr=02:00:00:00:02:00 total_flags=0x20 flags_or=0x0 flags_and=0xfffffff1 authorized=0 nl80211: Ignored event 37 (NL80211_CMD_AUTHENTICATE) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 37 (NL80211_CMD_AUTHENTICATE) for foreign interface (ifindex 12 wdev 0x0) nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln0 nl80211: RX frame da=12:00:00:00:00:01 sa=02:00:00:00:02:00 bssid=12:00:00:00:00:01 freq=2412 ssi_signal=-30 fc=0x0 seq_ctrl=0x20 stype=0 (WLAN_FC_STYPE_ASSOC_REQ) len=97 wln0: Event RX_MGMT (18) received mgmt::assoc_req association request: STA=02:00:00:00:02:00 capab_info=0x1431 listen_interval=5 seq_ctrl=0x20 new AID 1 wln0: STA 02:00:00:00:02:00 IEEE 802.11: association OK (aid 1) Add associated STA 02:00:00:00:02:00 (added_unassoc=1 auth_alg=0 ft_over_ds=0 reassoc=0 authorized=0 ft_tk=0 fils_tk=0) nl80211: Set STA 02:00:00:00:02:00 * supported rates - hexdump(len=12): 02 04 0b 16 0c 12 18 24 30 48 60 6c * capability=0x1431 * aid=1 * listen_interval=5 * flags set=0xb4 mask=0xb4 nl80211: send_mlme - da=02:00:00:00:02:00 noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0x10 (WLAN_FC_STYPE_ASSOC_RESP) nlmode=3 nl80211: send_mlme - Use bss->freq=2412 nl80211: send_mlme -> send_frame_cmd nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0) nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln0 nl80211: Frame TX status event A1=02:00:00:00:02:00 stype=1 cookie=0x8 ack=1 wln0: Event TX_STATUS (16) received mgmt::assoc_resp cb wln0: STA 02:00:00:00:02:00 IEEE 802.11: associated (aid 1) wln0: STA 02:00:00:00:02:00 MLME: MLME-ASSOCIATE.indication(02:00:00:00:02:00) wln0: STA 02:00:00:00:02:00 MLME: MLME-DELETEKEYS.request(02:00:00:00:02:00) wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=0 addr=0x11b3f30 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20 nl80211: DEL_KEY addr=02:00:00:00:02:00 pairwise key nl80211: Set STA flags - ifname=wln0 addr=02:00:00:00:02:00 total_flags=0x6c flags_or=0xc flags_and=0xfffffffd authorized=0 wln0: STA 02:00:00:00:02:00 WPA: event 1 notification wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=0 addr=0x11b3f30 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20 nl80211: DEL_KEY addr=02:00:00:00:02:00 pairwise key wln0: STA 02:00:00:00:02:00 IEEE 802.1X: start authentication EAP: Server state machine created IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state IDLE IEEE 802.1X: 02:00:00:00:02:00 CTRL_DIR entering state FORCE_BOTH wln0: STA 02:00:00:00:02:00 WPA: start authentication WPA: 02:00:00:00:02:00 WPA_PTK entering state INITIALIZE wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=0 addr=0x11b3f30 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20 nl80211: DEL_KEY addr=02:00:00:00:02:00 pairwise key WPA: 02:00:00:00:02:00 WPA_PTK_GROUP entering state IDLE WPA: 02:00:00:00:02:00 WPA_PTK entering state AUTHENTICATION WPA: 02:00:00:00:02:00 WPA_PTK entering state AUTHENTICATION2 WPA: Re-initialize GMK/Counter on first station GMK - hexdump(len=32): [REMOVED] Key Counter - hexdump(len=32): [REMOVED] GTK - hexdump(len=16): [REMOVED] IGTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key WPA: Assign ANonce - hexdump(len=32): e9 3d 69 8e dc de 3c 99 77 00 92 d2 3a 5b 32 e9 7f dc b8 ff b8 6d b1 bc cc e7 1c 0e 6a 04 bc a8 wln0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 02:00:00:00:02:00 (300 seconds - ap_max_inactivity) IEEE 802.1X: 02:00:00:00:02:00 AUTH_PAE entering state DISCONNECTED nl80211: Set STA flags - ifname=wln0 addr=02:00:00:00:02:00 total_flags=0x6c flags_or=0x0 flags_and=0xfffffffe authorized=0 wln0: STA 02:00:00:00:02:00 IEEE 802.1X: unauthorizing port IEEE 802.1X: 02:00:00:00:02:00 AUTH_PAE entering state RESTART EAP: EAP entering state INITIALIZE wln0: CTRL-EVENT-EAP-STARTED 02:00:00:00:02:00 CTRL_IFACE monitor send /tmp/hostapd_1_0\x00 EAP: EAP entering state SELECT_ACTION EAP: getDecision: no identity known yet -> CONTINUE EAP: EAP entering state PROPOSE_METHOD EAP: getNextMethod: vendor 0 type 1 wln0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1 CTRL_IFACE monitor send /tmp/hostapd_1_0\x00 EAP: EAP entering state METHOD_REQUEST EAP: building EAP-Request: Identifier 89 EAP: EAP entering state SEND_REQUEST EAP: EAP entering state IDLE EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0) IEEE 802.1X: 02:00:00:00:02:00 AUTH_PAE entering state CONNECTING IEEE 802.1X: 02:00:00:00:02:00 AUTH_PAE entering state AUTHENTICATING IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state REQUEST wln0: STA 02:00:00:00:02:00 IEEE 802.1X: Sending EAP Packet (identifier 89) nl80211: Send over control port dest=02:00:00:00:02:00 proto=0x888e len=9 no_encrypt=1 nl80211: tx_control_port cookie=0x9 RTM_NEWLINK: ifi_index=12 ifname=wlan2 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Ignored event 38 (NL80211_CMD_ASSOCIATE) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 38 (NL80211_CMD_ASSOCIATE) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 46 (NL80211_CMD_CONNECT) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 46 (NL80211_CMD_CONNECT) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0) nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) received for wln0 nl80211: Control port TX status (ack=1), cookie=9 wln0: Event EAPOL_TX_STATUS (37) received IEEE 802.1X: 02:00:00:00:02:00 TX status - version=2 type=0 length=5 - ack=1 nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wln0 wln0: Event EAPOL_RX (23) received IEEE 802.1X: 24 bytes from 02:00:00:00:02:00 IEEE 802.1X: version=2 type=0 length=20 EAP: code=2 (response) identifier=89 length=20 wln0: STA 02:00:00:00:02:00 IEEE 802.1X: received EAP packet (code=2 id=89 len=20) from STA: EAP Response-Identity (1) IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state RESPONSE EAP: EAP entering state RECEIVED EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=89 respMethod=1 respVendor=0 respVendorMethod=0 EAP: EAP entering state INTEGRITY_CHECK EAP: EAP entering state METHOD_RESPONSE EAP-Identity: Peer identity - hexdump_ascii(len=15): 70 77 64 40 65 78 61 6d 70 6c 65 2e 63 6f 6d pwd@xxxxxxxxxxx EAP: EAP entering state SELECT_ACTION EAP: getDecision: -> PASSTHROUGH EAP: EAP entering state INITIALIZE_PASSTHROUGH EAP: EAP entering state AAA_REQUEST EAP: EAP entering state AAA_IDLE wln0: STA 02:00:00:00:02:00 IEEE 802.1X: STA identity 'pwd@xxxxxxxxxxx' Encapsulating EAP message into a RADIUS packet wln0: RADIUS Sending RADIUS message to authentication server wln0: RADIUS Next RADIUS client retransmit in 3 seconds nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0) RADIUS SRV: Received 224 bytes from 127.0.0.1:47133 RADIUS SRV: Creating a new session RADIUS SRV: Matching user entry found RADIUS SRV: Calling-Station-Id: 02:00:00:00:02:00 RADIUS SRV: [0x0 127.0.0.1] New session created EAP: Server state machine created RADIUS SRV: New session 0x0 initialized EAP: EAP entering state INITIALIZE EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=89 respMethod=1 respVendor=0 respVendorMethod=0 : CTRL-EVENT-EAP-STARTED 00:00:00:00:00:00 EAP: EAP entering state PICK_UP_METHOD : CTRL-EVENT-EAP-PROPOSED-METHOD method=1 EAP: EAP entering state METHOD_RESPONSE EAP-Identity: Peer identity - hexdump_ascii(len=15): 70 77 64 40 65 78 61 6d 70 6c 65 2e 63 6f 6d pwd@xxxxxxxxxxx RADIUS SRV: [0x0 127.0.0.1] EAP: EAP-Response/Identity 'pwd@xxxxxxxxxxx' EAP: EAP entering state SELECT_ACTION EAP: getDecision: another method available -> CONTINUE EAP: EAP entering state PROPOSE_METHOD EAP: getNextMethod: vendor 0 type 52 EAP-pwd: Selected group number 19 : CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=52 RADIUS SRV: [0x0 127.0.0.1] EAP: Propose EAP method vendor=0 method=52 EAP: EAP entering state METHOD_REQUEST EAP: building EAP-Request: Identifier 90 EAP-pwd: ID/Request EAP-pwd (server): password - hexdump(len=8): [REMOVED] EAP: EAP entering state SEND_REQUEST EAP: EAP entering state IDLE EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0) RADIUS SRV: Reply to 127.0.0.1:47133 wln0: RADIUS Received 67 bytes from RADIUS server wln0: RADIUS Received RADIUS message wln0: STA 02:00:00:00:02:00 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station 02:00:00:00:02:00 wln0: STA 02:00:00:00:02:00 IEEE 802.1X: decapsulated EAP packet (code=1 id=90 len=21) from RADIUS server: EAP-Request-PWD (52) EAP: EAP entering state AAA_RESPONSE EAP: getId: id=90 EAP: EAP entering state SEND_REQUEST2 EAP: EAP entering state IDLE2 EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0) IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state REQUEST wln0: STA 02:00:00:00:02:00 IEEE 802.1X: Sending EAP Packet (identifier 90) nl80211: Send over control port dest=02:00:00:00:02:00 proto=0x888e len=25 no_encrypt=1 nl80211: tx_control_port cookie=0xa nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0) nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) received for wln0 nl80211: Control port TX status (ack=1), cookie=10 wln0: Event EAPOL_TX_STATUS (37) received IEEE 802.1X: 02:00:00:00:02:00 TX status - version=2 type=0 length=21 - ack=1 nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wln0 wln0: Event EAPOL_RX (23) received IEEE 802.1X: 34 bytes from 02:00:00:00:02:00 IEEE 802.1X: version=2 type=0 length=30 EAP: code=2 (response) identifier=90 length=30 wln0: STA 02:00:00:00:02:00 IEEE 802.1X: received EAP packet (code=2 id=90 len=30) from STA: EAP Response-PWD (52) IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state RESPONSE EAP: EAP entering state RECEIVED2 EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=90 respMethod=52 respVendor=0 respVendorMethod=0 EAP: EAP entering state AAA_REQUEST EAP: EAP entering state AAA_IDLE Encapsulating EAP message into a RADIUS packet Copied RADIUS State Attribute wln0: RADIUS Sending RADIUS message to authentication server wln0: RADIUS Next RADIUS client retransmit in 3 seconds nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0) RADIUS SRV: Received 240 bytes from 127.0.0.1:47133 RADIUS SRV: Request for session 0x0 EAP: EAP entering state RECEIVED EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=90 respMethod=52 respVendor=0 respVendorMethod=0 EAP: EAP entering state INTEGRITY_CHECK EAP-pwd: Received frame: exch = 1, len = 25 EAP: EAP entering state METHOD_RESPONSE EAP-PWD (server): peer sent id of - hexdump_ascii(len=15): 70 77 64 40 65 78 61 6d 70 6c 65 2e 63 6f 6d pwd@xxxxxxxxxxx EAP-pwd: provisioned group 19 EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: x_candidate - hexdump(len=32): [REMOVED] EAP-pwd: found a PWE in 01 tries EAP-PWD (server): computed 256 bit PWE... EAP-pwd: PWD-ID-Req -> PWD-Commit-Req EAP: EAP entering state METHOD_REQUEST EAP: building EAP-Request: Identifier 91 EAP-pwd: Commit/Request EAP: EAP entering state SEND_REQUEST EAP: EAP entering state IDLE EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0) RADIUS SRV: Reply to 127.0.0.1:47133 wln0: RADIUS Received 148 bytes from RADIUS server wln0: RADIUS Received RADIUS message wln0: STA 02:00:00:00:02:00 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.01 sec RADIUS packet matching with station 02:00:00:00:02:00 wln0: STA 02:00:00:00:02:00 IEEE 802.1X: decapsulated EAP packet (code=1 id=91 len=102) from RADIUS server: EAP-Request-PWD (52) EAP: EAP entering state AAA_RESPONSE EAP: getId: id=91 EAP: EAP entering state SEND_REQUEST2 EAP: EAP entering state IDLE2 EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0) IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state REQUEST wln0: STA 02:00:00:00:02:00 IEEE 802.1X: Sending EAP Packet (identifier 91) nl80211: Send over control port dest=02:00:00:00:02:00 proto=0x888e len=106 no_encrypt=1 nl80211: tx_control_port cookie=0xb nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0) nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) received for wln0 nl80211: Control port TX status (ack=1), cookie=11 wln0: Event EAPOL_TX_STATUS (37) received IEEE 802.1X: 02:00:00:00:02:00 TX status - version=2 type=0 length=102 - ack=1 nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0) nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wln0 wln0: Event EAPOL_RX (23) received IEEE 802.1X: 106 bytes from 02:00:00:00:02:00 IEEE 802.1X: version=2 type=0 length=102 EAP: code=2 (response) identifier=91 length=102 wln0: STA 02:00:00:00:02:00 IEEE 802.1X: received EAP packet (code=2 id=91 len=102) from STA: EAP Response-PWD (52) IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state RESPONSE EAP: EAP entering state RECEIVED2 EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=91 respMethod=52 respVendor=0 respVendorMethod=0 EAP: EAP entering state AAA_REQUEST EAP: EAP entering state AAA_IDLE Encapsulating EAP message into a RADIUS packet Copied RADIUS State Attribute wln0: RADIUS Sending RADIUS message to authentication server wln0: RADIUS Next RADIUS client retransmit in 3 seconds RADIUS SRV: Received 312 bytes from 127.0.0.1:47133 RADIUS SRV: Request for session 0x0 EAP: EAP entering state RECEIVED EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=91 respMethod=52 respVendor=0 respVendorMethod=0 EAP: EAP entering state INTEGRITY_CHECK EAP-pwd: Received frame: exch = 2, len = 97 EAP: EAP entering state METHOD_RESPONSE EAP-pwd: Received commit response EAP-pwd: PWD-Commit-Req -> PWD-Confirm-Req EAP: EAP entering state METHOD_REQUEST EAP: building EAP-Request: Identifier 92 EAP-pwd: Confirm/Request EAP: EAP entering state SEND_REQUEST EAP: EAP entering state IDLE EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0) RADIUS SRV: Reply to 127.0.0.1:47133 wln0: RADIUS Received 84 bytes from RADIUS server wln0: RADIUS Received RADIUS message wln0: STA 02:00:00:00:02:00 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station 02:00:00:00:02:00 wln0: STA 02:00:00:00:02:00 IEEE 802.1X: decapsulated EAP packet (code=1 id=92 len=38) from RADIUS server: EAP-Request-PWD (52) EAP: EAP entering state AAA_RESPONSE EAP: getId: id=92 EAP: EAP entering state SEND_REQUEST2 EAP: EAP entering state IDLE2 EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0) IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state REQUEST wln0: STA 02:00:00:00:02:00 IEEE 802.1X: Sending EAP Packet (identifier 92) nl80211: Send over control port dest=02:00:00:00:02:00 proto=0x888e len=42 no_encrypt=1 nl80211: tx_control_port cookie=0xc nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0) nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) received for wln0 nl80211: Control port TX status (ack=1), cookie=12 wln0: Event EAPOL_TX_STATUS (37) received IEEE 802.1X: 02:00:00:00:02:00 TX status - version=2 type=0 length=38 - ack=1 nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wln0 wln0: Event EAPOL_RX (23) received IEEE 802.1X: 42 bytes from 02:00:00:00:02:00 IEEE 802.1X: version=2 type=0 length=38 EAP: code=2 (response) identifier=92 length=38 wln0: STA 02:00:00:00:02:00 IEEE 802.1X: received EAP packet (code=2 id=92 len=38) from STA: EAP Response-PWD (52) IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state RESPONSE EAP: EAP entering state RECEIVED2 EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=92 respMethod=52 respVendor=0 respVendorMethod=0 EAP: EAP entering state AAA_REQUEST EAP: EAP entering state AAA_IDLE Encapsulating EAP message into a RADIUS packet Copied RADIUS State Attribute wln0: RADIUS Sending RADIUS message to authentication server wln0: RADIUS Next RADIUS client retransmit in 3 seconds nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0) RADIUS SRV: Received 248 bytes from 127.0.0.1:47133 RADIUS SRV: Request for session 0x0 EAP: EAP entering state RECEIVED EAP: parseEapResp: rxResp=1 rxInitiate=0 respId=92 respMethod=52 respVendor=0 respVendorMethod=0 EAP: EAP entering state INTEGRITY_CHECK EAP-pwd: Received frame: exch = 3, len = 33 EAP: EAP entering state METHOD_RESPONSE EAP-pwd (server): confirm verified EAP-pwd: PWD-Confirm-Req -> SUCCESS EAP: Session-Id - hexdump(len=33): 34 4d 7d c6 98 31 f0 51 65 c5 a6 90 c2 c6 6e 0e d6 b5 a0 ed 7f c0 bb 02 92 58 cd d3 3c 7c de a3 3b EAP: EMSK - hexdump(len=64): [REMOVED] EAP: EMSKname - hexdump(len=8): 8d 48 e6 37 1a 5b ad 7e EAP: ERP rRK - hexdump(len=64): [REMOVED] EAP: ERP rIK - hexdump(len=64): [REMOVED] EAP: Stored ERP keys 8d48e6371a5bad7e@xxxxxxxxxxx EAP: EAP entering state SELECT_ACTION EAP: getDecision: method succeeded -> SUCCESS EAP: EAP entering state SUCCESS EAP: Building EAP-Success (id=92) : CTRL-EVENT-EAP-SUCCESS 00:00:00:00:00:00 RADIUS SRV: [0x0 127.0.0.1] EAP authentication succeeded RADIUS SRV: Reply to 127.0.0.1:47133 RADIUS SRV: [0x0 127.0.0.1] Sending Access-Accept RADIUS SRV: Removing completed session 0x0 after timeout wln0: RADIUS Received 195 bytes from RADIUS server wln0: RADIUS Received RADIUS message wln0: STA 02:00:00:00:02:00 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station 02:00:00:00:02:00 MS-MPPE-Send-Key - hexdump(len=32): [REMOVED] MS-MPPE-Recv-Key - hexdump(len=32): [REMOVED] EAP-Key Name - hexdump(len=33): 34 4d 7d c6 98 31 f0 51 65 c5 a6 90 c2 c6 6e 0e d6 b5 a0 ed 7f c0 bb 02 92 58 cd d3 3c 7c de a3 3b wln0: STA 02:00:00:00:02:00 IEEE 802.1X: decapsulated EAP packet (code=3 id=92 len=4) from RADIUS server: EAP Success EAP: EAP entering state SUCCESS2 wln0: CTRL-EVENT-EAP-SUCCESS2 02:00:00:00:02:00 CTRL_IFACE monitor send /tmp/hostapd_1_0\x00 IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state SUCCESS wln0: STA 02:00:00:00:02:00 IEEE 802.1X: Sending EAP Packet (identifier 92) nl80211: Send over control port dest=02:00:00:00:02:00 proto=0x888e len=8 no_encrypt=1 nl80211: tx_control_port cookie=0xd IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state IDLE WPA: 02:00:00:00:02:00 WPA_PTK entering state INITPMK WPA: PMK from EAPOL state machine (MSK len=64 PMK len=32) WPA: 02:00:00:00:02:00 WPA_PTK entering state PTKSTART wln0: STA 02:00:00:00:02:00 WPA: sending 1/4 msg of 4-Way Handshake RSN: Derive PMKID using HMAC-SHA-1 RSN: Derived PMKID - hexdump(len=16): 6f e8 67 59 8c 89 16 02 4d a8 75 50 43 74 e8 9f RSN: Message 1/4 PMKID derived from PMK - hexdump(len=16): 6f e8 67 59 8c 89 16 02 4d a8 75 50 43 74 e8 9f WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=22 keyidx=0 encr=0) WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 nl80211: Send over control port dest=02:00:00:00:02:00 proto=0x888e len=121 no_encrypt=1 nl80211: tx_control_port cookie=0xe WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1) nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0) nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) received for wln0 nl80211: Control port TX status (ack=1), cookie=13 wln0: Event EAPOL_TX_STATUS (37) received IEEE 802.1X: 02:00:00:00:02:00 TX status - version=2 type=0 length=4 - ack=1 nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0) nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) received for wln0 nl80211: Control port TX status (ack=1), cookie=14 wln0: Event EAPOL_TX_STATUS (37) received IEEE 802.1X: 02:00:00:00:02:00 TX status - version=2 type=3 length=117 - ack=1 WPA: EAPOL-Key TX status for STA 02:00:00:00:02:00 ack=1 WPA: Increase initial EAPOL-Key 1/4 timeout by 1000 ms because of acknowledged frame nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wln0 wln0: Event EAPOL_RX (23) received IEEE 802.1X: 121 bytes from 02:00:00:00:02:00 IEEE 802.1X: version=2 type=3 length=117 WPA: Received EAPOL-Key from 02:00:00:00:02:00 key_info=0x10a type=2 mic_len=16 key_data_length=22 WPA: Received Key Nonce - hexdump(len=32): 56 dc ba 09 76 53 29 45 6e 20 2d 2d fa 2b 1a fc a9 db 1b ad 27 37 5e 6a 23 24 c2 2d 1f 57 8d d2 WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 wln0: STA 02:00:00:00:02:00 WPA: received EAPOL-Key frame (2/4 Pairwise) WPA: 02:00:00:00:02:00 WPA_PTK entering state PTKCALCNEGOTIATING WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=12:00:00:00:00:01 A2=02:00:00:00:02:00 WPA: Nonce1 - hexdump(len=32): e9 3d 69 8e dc de 3c 99 77 00 92 d2 3a 5b 32 e9 7f dc b8 ff b8 6d b1 bc cc e7 1c 0e 6a 04 bc a8 WPA: Nonce2 - hexdump(len=32): 56 dc ba 09 76 53 29 45 6e 20 2d 2d fa 2b 1a fc a9 db 1b ad 27 37 5e 6a 23 24 c2 2d 1f 57 8d d2 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 80 00 WPA: 02:00:00:00:02:00 WPA_PTK entering state PTKCALCNEGOTIATING2 WPA: 02:00:00:00:02:00 WPA_PTK entering state PTKINITNEGOTIATING wln0: STA 02:00:00:00:02:00 WPA: sending 3/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=80 keyidx=0 encr=1) WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 Plaintext EAPOL-Key Key Data - hexdump(len=88): [REMOVED] WPA: Encrypt Key Data using AES-WRAP (KEK length 16) WPA: EAPOL-Key MIC using HMAC-SHA1 nl80211: Send over control port dest=02:00:00:00:02:00 proto=0x888e len=187 no_encrypt=1 nl80211: tx_control_port cookie=0xf WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1) nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0) nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) received for wln0 nl80211: Control port TX status (ack=1), cookie=15 wln0: Event EAPOL_TX_STATUS (37) received IEEE 802.1X: 02:00:00:00:02:00 TX status - version=2 type=3 length=183 - ack=1 WPA: EAPOL-Key TX status for STA 02:00:00:00:02:00 ack=1 nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wln0 wln0: Event EAPOL_RX (23) received IEEE 802.1X: 99 bytes from 02:00:00:00:02:00 IEEE 802.1X: version=2 type=3 length=95 WPA: Received EAPOL-Key from 02:00:00:00:02:00 key_info=0x30a type=2 mic_len=16 key_data_length=0 WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 wln0: STA 02:00:00:00:02:00 WPA: received EAPOL-Key frame (4/4 Pairwise) WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: 02:00:00:00:02:00 WPA_PTK entering state PTKINITDONE wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=3 addr=0x11b3f30 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] addr=02:00:00:00:02:00 pairwise key WPA: Start PTK rekeying timer for 02:00:00:00:02:00 (30 seconds) wln0: STA 02:00:00:00:02:00 WPA: pairwise key handshake completed (RSN) wln0: EAPOL-4WAY-HS-COMPLETED 02:00:00:00:02:00 CTRL_IFACE monitor send /tmp/hostapd_1_0\x00 IEEE 802.1X: 02:00:00:00:02:00 AUTH_PAE entering state AUTHENTICATED wln0: AP-STA-CONNECTED 02:00:00:00:02:00 CTRL_IFACE monitor send /tmp/hostapd_1_0\x00 nl80211: Set STA flags - ifname=wln0 addr=02:00:00:00:02:00 total_flags=0x6d flags_or=0x1 flags_and=0xffffffff authorized=1 wln0: STA 02:00:00:00:02:00 IEEE 802.1X: authorizing port wln0: STA 02:00:00:00:02:00 RADIUS: starting accounting session 5B2949818BBBAD49 wln0: STA 02:00:00:00:02:00 IEEE 802.1X: authenticated - EAP type: 52 (PWD) nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0) RTM_NEWLINK: ifi_index=12 ifname=wlan2 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln0 nl80211: RX frame da=12:00:00:00:00:01 sa=02:00:00:00:02:00 bssid=12:00:00:00:00:01 freq=2412 ssi_signal=-30 fc=0x40d0 seq_ctrl=0x90 stype=13 (WLAN_FC_STYPE_ACTION) len=27 wln0: Event RX_MGMT (18) received mgmt::action RX_ACTION category 5 action 4 sa 02:00:00:00:02:00 da 12:00:00:00:00:01 len 27 freq 2412 Radio measurement frame, action 4 from 02:00:00:00:02:00 nl80211: Send Action frame (ifindex=9, freq=2412 MHz wait=0 ms no_cck=0 offchanok=0) nl80211: send_mlme - da=02:00:00:00:02:00 noack=0 freq=2412 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xd0 (WLAN_FC_STYPE_ACTION) nlmode=3 nl80211: send_mlme -> send_frame_cmd nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0) nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln0 nl80211: Frame TX status event A1=02:00:00:00:02:00 stype=13 cookie=0x10 ack=1 wln0: Event TX_STATUS (16) received mgmt::action cb ok=1 nl80211: Ignored event 64 (NL80211_CMD_NOTIFY_CQM) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 64 (NL80211_CMD_NOTIFY_CQM) for foreign interface (ifindex 12 wdev 0x0) RX ctrl_iface - hexdump_ascii(len=9): 53 54 41 2d 46 49 52 53 54 STA-FIRST RX ctrl_iface - hexdump_ascii(len=26): 53 54 41 2d 4e 45 58 54 20 30 32 3a 30 30 3a 30 STA-NEXT 02:00:0 30 3a 30 30 3a 30 32 3a 30 30 0:00:02:00 RX ctrl_iface - hexdump_ascii(len=9): 53 54 41 2d 4e 45 58 54 20 STA-NEXT RX ctrl_iface - hexdump_ascii(len=9): 53 54 41 2d 46 49 52 53 54 STA-FIRST RX ctrl_iface - hexdump_ascii(len=9): 53 54 41 2d 4e 45 58 54 20 STA-NEXT RTM_NEWLINK: ifi_index=12 ifname=wlan2 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln0 nl80211: RX frame da=12:00:00:00:00:01 sa=02:00:00:00:02:00 bssid=12:00:00:00:00:01 freq=2412 ssi_signal=-30 fc=0x40c0 seq_ctrl=0xf0 stype=12 (WLAN_FC_STYPE_DEAUTH) len=26 wln0: Event RX_MGMT (18) received wln0: mgmt::deauth wln0: deauthentication: STA=02:00:00:00:02:00 reason_code=3 wln0: AP-STA-DISCONNECTED 02:00:00:00:02:00 CTRL_IFACE monitor send /tmp/hostapd_1_0\x00 nl80211: Set STA flags - ifname=wln0 addr=02:00:00:00:02:00 total_flags=0xc flags_or=0xc flags_and=0xfffffffd authorized=0 wln0: STA 02:00:00:00:02:00 WPA: event 3 notification wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=0 addr=0x11b3f30 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20 nl80211: DEL_KEY addr=02:00:00:00:02:00 pairwise key WPA: 02:00:00:00:02:00 WPA_PTK entering state DISCONNECTED WPA: 02:00:00:00:02:00 WPA_PTK entering state INITIALIZE wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=0 addr=0x11b3f30 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20 nl80211: DEL_KEY addr=02:00:00:00:02:00 pairwise key wln0: STA 02:00:00:00:02:00 IEEE 802.11: deauthenticated wln0: STA 02:00:00:00:02:00 MLME: MLME-DEAUTHENTICATE.indication(02:00:00:00:02:00, 3) wln0: STA 02:00:00:00:02:00 MLME: MLME-DELETEKEYS.request(02:00:00:00:02:00) wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=0 addr=0x11b3f30 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20 nl80211: DEL_KEY addr=02:00:00:00:02:00 pairwise key nl80211: Set STA flags - ifname=wln0 addr=02:00:00:00:02:00 total_flags=0xc flags_or=0xc flags_and=0xfffffffd authorized=0 nl80211: sta_remove -> DEL_STATION wln0 02:00:00:00:02:00 --> 0 (Success) ap_free_sta: cancel ap_handle_timer for 02:00:00:00:02:00 EAP: Server state machine removed nl80211: Ignored event 20 (NL80211_CMD_DEL_STATION) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 20 (NL80211_CMD_DEL_STATION) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 39 (NL80211_CMD_DEAUTHENTICATE) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 39 (NL80211_CMD_DEAUTHENTICATE) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 48 (NL80211_CMD_DISCONNECT) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 48 (NL80211_CMD_DISCONNECT) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 20 (NL80211_CMD_DEL_STATION) for foreign interface (ifindex 9 wdev 0x0) nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wln0 nl80211: Delete station 02:00:00:00:02:00 RX ctrl_iface - hexdump_ascii(len=6): 53 54 41 54 55 53 STATUS nl80211: Ignored event 19 (NL80211_CMD_NEW_STATION) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 19 (NL80211_CMD_NEW_STATION) for foreign interface (ifindex 12 wdev 0x0) nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln0 nl80211: RX frame da=12:00:00:00:00:01 sa=02:00:00:00:02:00 bssid=12:00:00:00:00:01 freq=2412 ssi_signal=-30 fc=0xb0 seq_ctrl=0x100 stype=11 (WLAN_FC_STYPE_AUTH) len=140 wln0: Event RX_MGMT (18) received mgmt::auth authentication: STA=02:00:00:00:02:00 auth_alg=4 auth_transaction=1 status_code=0 wep=0 seq_ctrl=0x100 New STA ap_sta_add: register ap_handle_timer timeout for 02:00:00:00:02:00 (300 seconds - ap_max_inactivity) nl80211: sta_remove -> DEL_STATION wln0 02:00:00:00:02:00 --> -2 (No such file or directory) nl80211: Add STA 02:00:00:00:02:00 * supported rates - hexdump(len=4): 02 04 0b 16 * capability=0x0 * aid=1 (UNASSOC_STA workaround) * listen_interval=0 * flags set=0x0 mask=0xa0 FILS: Authentication frame fields - hexdump(len=110): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00 ff 11 0d 80 7e 2b 13 9c ff f1 62 93 7d 6f c8 c8 c9 f6 4d ff 09 04 f1 4e 8e cf 6e e0 0c 5b ff 38 08 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40 FILS: Remaining IEs - hexdump(len=110): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00 ff 11 0d 80 7e 2b 13 9c ff f1 62 93 7d 6f c8 c8 c9 f6 4d ff 09 04 f1 4e 8e cf 6e e0 0c 5b ff 38 08 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40 FILS: RSN element - hexdump(len=20): 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00 FILS: SNonce - hexdump(len=16): 80 7e 2b 13 9c ff f1 62 93 7d 6f c8 c8 c9 f6 4d FILS: FILS Session - hexdump(len=8): f1 4e 8e cf 6e e0 0c 5b FILS: Wrapped Data - hexdump(len=55): 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40 EAP: Server state machine created IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state IDLE IEEE 802.1X: 02:00:00:00:02:00 CTRL_DIR entering state FORCE_BOTH FILS: Forward EAP-Initiate/Re-auth to authentication server EAP: Update identity based on EAP-Initiate/Re-auth keyName-NAI - hexdump_ascii(len=28): 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 8d48e6371a5bad7e 40 65 78 61 6d 70 6c 65 2e 63 6f 6d @example.com wln0: STA 02:00:00:00:02:00 IEEE 802.1X: STA identity '8d48e6371a5bad7e@xxxxxxxxxxx' Encapsulating EAP message into a RADIUS packet wln0: RADIUS Sending RADIUS message to authentication server wln0: RADIUS Next RADIUS client retransmit in 3 seconds FILS: Will send Authentication frame once the response from authentication server is available FILS: PMKID - hexdump(len=16): 32 a2 7c ab 30 0e af e7 cd 5e 3a 96 9e 0c fb aa nl80211: Ignored event 19 (NL80211_CMD_NEW_STATION) for foreign interface (ifindex 9 wdev 0x0) nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wln0 nl80211: New station 02:00:00:00:02:00 RADIUS SRV: Received 266 bytes from 127.0.0.1:47133 RADIUS SRV: Creating a new session hostapd_radius_get_eap_user: Failed to find user RADIUS SRV: Matching user entry found RADIUS SRV: Calling-Station-Id: 02:00:00:00:02:00 RADIUS SRV: [0x1 127.0.0.1] New session created EAP: Server state machine created RADIUS SRV: New session 0x1 initialized EAP: EAP entering state INITIALIZE EAP: parseEapResp: rxResp=0 rxInitiate=1 respId=0 respMethod=2 respVendor=0 respVendorMethod=0 : CTRL-EVENT-EAP-STARTED 00:00:00:00:00:00 EAP: EAP entering state SELECT_ACTION EAP: getDecision: no identity known yet -> CONTINUE EAP: EAP entering state INITIATE_RECEIVED EAP: EAP-Initiate/Re-Auth - hexdump(len=50): 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40 EAP: Flags=0x0 SEQ=0 EAP: EAP-Initiate/Re-auth - keyName-NAI - hexdump_ascii(len=28): 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 8d48e6371a5bad7e 40 65 78 61 6d 70 6c 65 2e 63 6f 6d @example.com EAP: Authentication Tag match using HMAC-SHA256-128 EAP: EAP-Initiate/Re-Auth TVs/TLVs - hexdump(len=30): 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d EAP: ERP key 8d48e6371a5bad7e@xxxxxxxxxxx SEQ updated to 0 EAP: Send EAP-Finish/Re-auth (success) EAP: ERP rMSK - hexdump(len=64): [REMOVED] : CTRL-EVENT-EAP-SUCCESS 00:00:00:00:00:00 RADIUS SRV: [0x1 127.0.0.1] EAP authentication succeeded RADIUS SRV: Reply to 127.0.0.1:47133 RADIUS SRV: [0x1 127.0.0.1] Sending Access-Accept RADIUS SRV: Removing completed session 0x1 after timeout wln0: RADIUS Received 211 bytes from RADIUS server wln0: RADIUS Received RADIUS message wln0: STA 02:00:00:00:02:00 RADIUS: Received RADIUS packet matched with a pending request, round trip time 0.00 sec RADIUS packet matching with station 02:00:00:00:02:00 MS-MPPE-Send-Key - hexdump(len=32): [REMOVED] MS-MPPE-Recv-Key - hexdump(len=32): [REMOVED] wln0: STA 02:00:00:00:02:00 IEEE 802.1X: decapsulated EAP packet (code=6 id=0 len=55) from RADIUS server: unknown EAP code RSN: Generated FILS Nonce - hexdump(len=16): 12 1c 0b 60 d7 1b 0c 62 6c 1a a8 40 70 fc 78 d3 FILS: rMSK to PMK derivation FILS: rMSK - hexdump(len=64): [REMOVED] FILS: SNonce - hexdump(len=16): 80 7e 2b 13 9c ff f1 62 93 7d 6f c8 c8 c9 f6 4d FILS: ANonce - hexdump(len=16): 12 1c 0b 60 d7 1b 0c 62 6c 1a a8 40 70 fc 78 d3 FILS: DHss - hexdump(len=0): [NULL] FILS: PMK - hexdump(len=32): [REMOVED] FILS: PTK derivation using PRF(SHA256) FILS: PTK derivation - SPA=02:00:00:00:02:00 AA=12:00:00:00:00:01 FILS: SNonce - hexdump(len=16): 80 7e 2b 13 9c ff f1 62 93 7d 6f c8 c8 c9 f6 4d FILS: ANonce - hexdump(len=16): 12 1c 0b 60 d7 1b 0c 62 6c 1a a8 40 70 fc 78 d3 FILS: PMK - hexdump(len=32): [REMOVED] FILS: FILS-Key-Data - hexdump(len=80): [REMOVED] FILS: ICK - hexdump(len=32): [REMOVED] FILS: KEK - hexdump(len=32): [REMOVED] FILS: TK - hexdump(len=16): [REMOVED] FILS: Key-Auth derivation: STA-MAC=02:00:00:00:02:00 AP-BSSID=12:00:00:00:00:01 FILS: ICK - hexdump(len=32): [REMOVED] FILS: SNonce - hexdump(len=16): 80 7e 2b 13 9c ff f1 62 93 7d 6f c8 c8 c9 f6 4d FILS: ANonce - hexdump(len=16): 12 1c 0b 60 d7 1b 0c 62 6c 1a a8 40 70 fc 78 d3 FILS: gSTA - hexdump(len=0): [NULL] FILS: gAP - hexdump(len=0): [NULL] FILS: Key-Auth (STA) - hexdump(len=32): 95 7c 45 a9 cd 22 4a b3 60 87 3e e9 8b 7b 24 79 c0 09 de d4 e6 dc 5e 03 8b ed 52 8e 7d 4a 4f 95 FILS: Key-Auth (AP) - hexdump(len=32): 1d bb e1 04 ce 37 22 1c 64 25 95 e9 38 f2 48 31 b5 4e ca 38 20 8e 02 89 03 42 f9 f0 50 07 9e 42 authentication reply: STA=02:00:00:00:02:00 auth_alg=4 auth_transaction=2 resp=0 (IE len=114) (dbg=auth-fils-finish) nl80211: send_mlme - da=02:00:00:00:02:00 noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xb0 (WLAN_FC_STYPE_AUTH) nlmode=3 nl80211: send_mlme - Use bss->freq=2412 nl80211: send_mlme -> send_frame_cmd wln0: STA 02:00:00:00:02:00 IEEE 802.11: authentication OK (FILS) wln0: STA 02:00:00:00:02:00 WPA: event 0 notification wln0: STA 02:00:00:00:02:00 MLME: MLME-AUTHENTICATE.indication(02:00:00:00:02:00, unknown) nl80211: Ignored event 37 (NL80211_CMD_AUTHENTICATE) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 37 (NL80211_CMD_AUTHENTICATE) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0) nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln0 nl80211: Frame TX status event A1=02:00:00:00:02:00 stype=11 cookie=0x11 ack=1 wln0: Event TX_STATUS (16) received mgmt::auth cb nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln0 nl80211: RX frame da=12:00:00:00:00:01 sa=02:00:00:00:02:00 bssid=12:00:00:00:00:01 freq=2412 ssi_signal=-30 fc=0x0 seq_ctrl=0x110 stype=0 (WLAN_FC_STYPE_ASSOC_REQ) len=159 wln0: Event RX_MGMT (18) received mgmt::assoc_req association request: STA=02:00:00:00:02:00 capab_info=0x1431 listen_interval=5 seq_ctrl=0x110 FILS: Decrypted Association Request elements - hexdump(len=115): 00 06 54 65 73 74 46 54 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 21 02 00 14 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00 46 05 70 00 00 00 00 7f 0a 04 00 48 00 01 00 00 40 00 01 ff 21 03 95 7c 45 a9 cd 22 4a b3 60 87 3e e9 8b 7b 24 79 c0 09 de d4 e6 dc 5e 03 8b ed 52 8e 7d 4a 4f 95 ff 09 04 f1 4e 8e cf 6e e0 0c 5b new AID 1 wln0: STA 02:00:00:00:02:00 IEEE 802.11: association OK (aid 1) Add associated STA 02:00:00:00:02:00 (added_unassoc=1 auth_alg=4 ft_over_ds=0 reassoc=0 authorized=0 ft_tk=0 fils_tk=0) nl80211: Set STA 02:00:00:00:02:00 * supported rates - hexdump(len=12): 02 04 0b 16 0c 12 18 24 30 48 60 6c * capability=0x1431 * aid=1 * listen_interval=5 * flags set=0xb4 mask=0xb4 FILS: Association Response frame before FILS processing - hexdump(len=107): 10 00 00 00 02 00 00 00 02 00 12 00 00 00 00 01 12 00 00 00 00 01 00 00 11 14 00 00 01 c0 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c 46 05 02 00 00 00 00 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 01 00 0f ac 0e 80 00 7f 0a 04 00 40 02 00 00 01 40 00 01 5a 03 24 01 00 ff 09 04 f1 4e 8e cf 6e e0 0c 5b FILS: Association Response plaintext - hexdump(len=100): [REMOVED] FILS: Encrypted Association Response elements - hexdump(len=116): f9 5e 58 80 4e 5c 32 2c 1e 1c 98 78 c7 a6 c0 2c e7 4f 63 fc ad 28 98 25 4e 90 ad 26 2e 6d 5c c6 a2 51 89 50 9e c0 ff ae 4b 64 89 9c 0d 38 34 db a9 04 50 e0 9a d3 d3 a0 48 6a 92 0e 06 60 b4 64 e6 08 be bf 99 03 cd 9d 56 3b 25 da 76 60 ae bb f6 11 63 06 1f 38 29 07 c0 50 0c b5 b8 c1 58 4d ee ed c1 b6 bb cd 8f ce 60 59 24 b0 15 91 8e 25 5e b0 5f 5e nl80211: send_mlme - da=02:00:00:00:02:00 noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0x10 (WLAN_FC_STYPE_ASSOC_RESP) nlmode=3 nl80211: send_mlme - Use bss->freq=2412 nl80211: send_mlme -> send_frame_cmd nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0) nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln0 nl80211: Frame TX status event A1=02:00:00:00:02:00 stype=1 cookie=0x12 ack=1 wln0: Event TX_STATUS (16) received mgmt::assoc_resp cb wln0: STA 02:00:00:00:02:00 IEEE 802.11: associated (aid 1) wln0: AP-STA-CONNECTED 02:00:00:00:02:00 CTRL_IFACE monitor send /tmp/hostapd_1_0\x00 wln0: STA 02:00:00:00:02:00 MLME: MLME-ASSOCIATE.indication(02:00:00:00:02:00) nl80211: Set STA flags - ifname=wln0 addr=02:00:00:00:02:00 total_flags=0x6d flags_or=0xc flags_and=0xfffffffd authorized=1 wln0: STA 02:00:00:00:02:00 WPA: event 1 notification wln0: STA 02:00:00:00:02:00 IEEE 802.1X: PMK from FILS - skip IEEE 802.1X/EAP WPA: Start PTK rekeying timer for 02:00:00:00:02:00 (30 seconds) wln0: STA 02:00:00:00:02:00 WPA: FILS authentication already completed - do not start 4-way handshake wln0: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 02:00:00:00:02:00 (300 seconds - ap_max_inactivity) FILS: Configure TK to the driver wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=3 addr=0x11cc9c0 key_idx=0 set_tx=1 seq_len=0 key_len=16 key_flag=0x2c nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] addr=02:00:00:00:02:00 pairwise key IEEE 802.1X: 02:00:00:00:02:00 AUTH_PAE entering state AUTHENTICATED nl80211: Set STA flags - ifname=wln0 addr=02:00:00:00:02:00 total_flags=0x6d flags_or=0x1 flags_and=0xffffffff authorized=1 wln0: STA 02:00:00:00:02:00 IEEE 802.1X: authorizing port wln0: STA 02:00:00:00:02:00 RADIUS: starting accounting session 84C437E0F004CD29 wln0: STA 02:00:00:00:02:00 IEEE 802.1X: authenticated - EAP type: 0 (unknown) IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state IDLE RTM_NEWLINK: ifi_index=12 ifname=wlan2 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x11003 ([UP][LOWER_UP]) nl80211: Ignored event 38 (NL80211_CMD_ASSOCIATE) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 38 (NL80211_CMD_ASSOCIATE) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 46 (NL80211_CMD_CONNECT) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 46 (NL80211_CMD_CONNECT) for foreign interface (ifindex 12 wdev 0x0) RTM_NEWLINK: ifi_index=12 ifname=wlan2 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln0 nl80211: RX frame da=12:00:00:00:00:01 sa=02:00:00:00:02:00 bssid=12:00:00:00:00:01 freq=2412 ssi_signal=-30 fc=0x40d0 seq_ctrl=0x120 stype=13 (WLAN_FC_STYPE_ACTION) len=27 wln0: Event RX_MGMT (18) received mgmt::action RX_ACTION category 5 action 4 sa 02:00:00:00:02:00 da 12:00:00:00:00:01 len 27 freq 2412 Radio measurement frame, action 4 from 02:00:00:00:02:00 nl80211: Send Action frame (ifindex=9, freq=2412 MHz wait=0 ms no_cck=0 offchanok=0) nl80211: send_mlme - da=02:00:00:00:02:00 noack=0 freq=2412 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xd0 (WLAN_FC_STYPE_ACTION) nlmode=3 nl80211: send_mlme -> send_frame_cmd nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 60 (NL80211_CMD_FRAME_TX_STATUS) for foreign interface (ifindex 9 wdev 0x0) nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wln0 nl80211: Frame TX status event A1=02:00:00:00:02:00 stype=13 cookie=0x13 ack=1 wln0: Event TX_STATUS (16) received mgmt::action cb ok=1 nl80211: Ignored event 64 (NL80211_CMD_NOTIFY_CQM) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 64 (NL80211_CMD_NOTIFY_CQM) for foreign interface (ifindex 12 wdev 0x0) RX ctrl_iface - hexdump_ascii(len=9): 53 54 41 2d 46 49 52 53 54 STA-FIRST RX ctrl_iface - hexdump_ascii(len=26): 53 54 41 2d 4e 45 58 54 20 30 32 3a 30 30 3a 30 STA-NEXT 02:00:0 30 3a 30 30 3a 30 32 3a 30 30 0:00:02:00 RX ctrl_iface - hexdump_ascii(len=9): 53 54 41 2d 4e 45 58 54 20 STA-NEXT RX ctrl_iface - hexdump_ascii(len=9): 53 54 41 2d 46 49 52 53 54 STA-FIRST RX ctrl_iface - hexdump_ascii(len=9): 53 54 41 2d 4e 45 58 54 20 STA-NEXT RX ctrl_iface - hexdump_ascii(len=6): 53 54 41 54 55 53 STATUS RTM_NEWLINK: ifi_index=12 ifname=wlan2 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Ignored event 20 (NL80211_CMD_DEL_STATION) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 20 (NL80211_CMD_DEL_STATION) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 39 (NL80211_CMD_DEAUTHENTICATE) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 39 (NL80211_CMD_DEAUTHENTICATE) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 48 (NL80211_CMD_DISCONNECT) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 48 (NL80211_CMD_DISCONNECT) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 19 (NL80211_CMD_NEW_STATION) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 19 (NL80211_CMD_NEW_STATION) for foreign interface (ifindex 12 wdev 0x0) nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln1 nl80211: RX frame da=12:00:00:00:00:02 sa=02:00:00:00:02:00 bssid=12:00:00:00:00:02 freq=2417 ssi_signal=-30 fc=0xb0 seq_ctrl=0x170 stype=11 (WLAN_FC_STYPE_AUTH) len=140 wln1: Event RX_MGMT (18) received mgmt::auth authentication: STA=02:00:00:00:02:00 auth_alg=4 auth_transaction=1 status_code=0 wep=0 seq_ctrl=0x170 New STA ap_sta_add: register ap_handle_timer timeout for 02:00:00:00:02:00 (300 seconds - ap_max_inactivity) nl80211: sta_remove -> DEL_STATION wln1 02:00:00:00:02:00 --> -2 (No such file or directory) nl80211: Add STA 02:00:00:00:02:00 * supported rates - hexdump(len=4): 02 04 0b 16 * capability=0x0 * aid=1 (UNASSOC_STA workaround) * listen_interval=0 * flags set=0x0 mask=0xa0 FILS: Authentication frame fields - hexdump(len=110): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00 ff 11 0d e1 2a 3a 98 71 71 1b 72 85 ce 04 6d fd 33 0a e5 ff 09 04 d5 7c 3c fc cc ce 62 7f ff 38 08 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40 FILS: Remaining IEs - hexdump(len=110): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00 ff 11 0d e1 2a 3a 98 71 71 1b 72 85 ce 04 6d fd 33 0a e5 ff 09 04 d5 7c 3c fc cc ce 62 7f ff 38 08 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40 FILS: RSN element - hexdump(len=20): 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00 FILS: SNonce - hexdump(len=16): e1 2a 3a 98 71 71 1b 72 85 ce 04 6d fd 33 0a e5 FILS: FILS Session - hexdump(len=8): d5 7c 3c fc cc ce 62 7f FILS: Wrapped Data - hexdump(len=55): 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40 EAP: Server state machine created IEEE 802.1X: 02:00:00:00:02:00 BE_AUTH entering state IDLE IEEE 802.1X: 02:00:00:00:02:00 CTRL_DIR entering state FORCE_BOTH FILS: Forward EAP-Initiate/Re-auth to authentication server EAP: Update identity based on EAP-Initiate/Re-auth keyName-NAI - hexdump_ascii(len=28): 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 8d48e6371a5bad7e 40 65 78 61 6d 70 6c 65 2e 63 6f 6d @example.com wln1: STA 02:00:00:00:02:00 IEEE 802.1X: STA identity '8d48e6371a5bad7e@xxxxxxxxxxx' Encapsulating EAP message into a RADIUS packet wln1: RADIUS Sending RADIUS message to authentication server wln1: RADIUS Next RADIUS client retransmit in 3 seconds FILS: Will send Authentication frame once the response from authentication server is available FILS: PMKID - hexdump(len=16): 32 a2 7c ab 30 0e af e7 cd 5e 3a 96 9e 0c fb aa nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wln1 nl80211: New station 02:00:00:00:02:00 RADIUS SRV: Received 266 bytes from 127.0.0.1:42289 RADIUS SRV: Creating a new session hostapd_radius_get_eap_user: Failed to find user RADIUS SRV: Matching user entry found RADIUS SRV: Calling-Station-Id: 02:00:00:00:02:00 RADIUS SRV: [0x2 127.0.0.1] New session created EAP: Server state machine created RADIUS SRV: New session 0x2 initialized EAP: EAP entering state INITIALIZE EAP: parseEapResp: rxResp=0 rxInitiate=1 respId=0 respMethod=2 respVendor=0 respVendorMethod=0 : CTRL-EVENT-EAP-STARTED 00:00:00:00:00:00 EAP: EAP entering state SELECT_ACTION EAP: getDecision: no identity known yet -> CONTINUE EAP: EAP entering state INITIATE_RECEIVED EAP: EAP-Initiate/Re-Auth - hexdump(len=50): 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40 EAP: Flags=0x0 SEQ=0 EAP: EAP-Initiate/Re-auth - keyName-NAI - hexdump_ascii(len=28): 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 8d48e6371a5bad7e 40 65 78 61 6d 70 6c 65 2e 63 6f 6d @example.com EAP: SEQ=0 replayed (already received SEQ=0) RADIUS SRV: No EAP data from the state machine - ignore this Access-Request silently (assuming it was a duplicate) nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln1 nl80211: RX frame da=12:00:00:00:00:02 sa=02:00:00:00:02:00 bssid=12:00:00:00:00:02 freq=2417 ssi_signal=-30 fc=0xb0 seq_ctrl=0x180 stype=11 (WLAN_FC_STYPE_AUTH) len=140 wln1: Event RX_MGMT (18) received mgmt::auth authentication: STA=02:00:00:00:02:00 auth_alg=4 auth_transaction=1 status_code=0 wep=0 seq_ctrl=0x180 FILS: Authentication frame fields - hexdump(len=110): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00 ff 11 0d e1 2a 3a 98 71 71 1b 72 85 ce 04 6d fd 33 0a e5 ff 09 04 d5 7c 3c fc cc ce 62 7f ff 38 08 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40 FILS: Remaining IEs - hexdump(len=110): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00 ff 11 0d e1 2a 3a 98 71 71 1b 72 85 ce 04 6d fd 33 0a e5 ff 09 04 d5 7c 3c fc cc ce 62 7f ff 38 08 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40 FILS: RSN element - hexdump(len=20): 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00 FILS: SNonce - hexdump(len=16): e1 2a 3a 98 71 71 1b 72 85 ce 04 6d fd 33 0a e5 FILS: FILS Session - hexdump(len=8): d5 7c 3c fc cc ce 62 7f FILS: Wrapped Data - hexdump(len=55): 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40 FILS: Forward EAP-Initiate/Re-auth to authentication server EAP: Update identity based on EAP-Initiate/Re-auth keyName-NAI - hexdump_ascii(len=28): 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 8d48e6371a5bad7e 40 65 78 61 6d 70 6c 65 2e 63 6f 6d @example.com wln1: STA 02:00:00:00:02:00 IEEE 802.1X: STA identity '8d48e6371a5bad7e@xxxxxxxxxxx' Encapsulating EAP message into a RADIUS packet wln1: RADIUS Sending RADIUS message to authentication server wln1: RADIUS Next RADIUS client retransmit in 2 seconds FILS: Will send Authentication frame once the response from authentication server is available FILS: PMKID - hexdump(len=16): 32 a2 7c ab 30 0e af e7 cd 5e 3a 96 9e 0c fb aa RADIUS SRV: Received 266 bytes from 127.0.0.1:42289 RADIUS SRV: Creating a new session hostapd_radius_get_eap_user: Failed to find user RADIUS SRV: Matching user entry found RADIUS SRV: Calling-Station-Id: 02:00:00:00:02:00 RADIUS SRV: [0x3 127.0.0.1] New session created EAP: Server state machine created RADIUS SRV: New session 0x3 initialized EAP: EAP entering state INITIALIZE EAP: parseEapResp: rxResp=0 rxInitiate=1 respId=0 respMethod=2 respVendor=0 respVendorMethod=0 : CTRL-EVENT-EAP-STARTED 00:00:00:00:00:00 EAP: EAP entering state SELECT_ACTION EAP: getDecision: no identity known yet -> CONTINUE EAP: EAP entering state INITIATE_RECEIVED EAP: EAP-Initiate/Re-Auth - hexdump(len=50): 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40 EAP: Flags=0x0 SEQ=0 EAP: EAP-Initiate/Re-auth - keyName-NAI - hexdump_ascii(len=28): 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 8d48e6371a5bad7e 40 65 78 61 6d 70 6c 65 2e 63 6f 6d @example.com EAP: SEQ=0 replayed (already received SEQ=0) RADIUS SRV: No EAP data from the state machine - ignore this Access-Request silently (assuming it was a duplicate) nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln1 nl80211: RX frame da=12:00:00:00:00:02 sa=02:00:00:00:02:00 bssid=12:00:00:00:00:02 freq=2417 ssi_signal=-30 fc=0xb0 seq_ctrl=0x190 stype=11 (WLAN_FC_STYPE_AUTH) len=140 wln1: Event RX_MGMT (18) received mgmt::auth authentication: STA=02:00:00:00:02:00 auth_alg=4 auth_transaction=1 status_code=0 wep=0 seq_ctrl=0x190 FILS: Authentication frame fields - hexdump(len=110): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00 ff 11 0d e1 2a 3a 98 71 71 1b 72 85 ce 04 6d fd 33 0a e5 ff 09 04 d5 7c 3c fc cc ce 62 7f ff 38 08 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40 FILS: Remaining IEs - hexdump(len=110): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00 ff 11 0d e1 2a 3a 98 71 71 1b 72 85 ce 04 6d fd 33 0a e5 ff 09 04 d5 7c 3c fc cc ce 62 7f ff 38 08 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40 FILS: RSN element - hexdump(len=20): 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 0e 80 00 FILS: SNonce - hexdump(len=16): e1 2a 3a 98 71 71 1b 72 85 ce 04 6d fd 33 0a e5 FILS: FILS Session - hexdump(len=8): d5 7c 3c fc cc ce 62 7f FILS: Wrapped Data - hexdump(len=55): 05 00 00 37 02 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40 FILS: Forward EAP-Initiate/Re-auth to authentication server EAP: Update identity based on EAP-Initiate/Re-auth keyName-NAI - hexdump_ascii(len=28): 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 8d48e6371a5bad7e 40 65 78 61 6d 70 6c 65 2e 63 6f 6d @example.com wln1: STA 02:00:00:00:02:00 IEEE 802.1X: STA identity '8d48e6371a5bad7e@xxxxxxxxxxx' Encapsulating EAP message into a RADIUS packet wln1: RADIUS Sending RADIUS message to authentication server wln1: RADIUS Next RADIUS client retransmit in 2 seconds FILS: Will send Authentication frame once the response from authentication server is available FILS: PMKID - hexdump(len=16): 32 a2 7c ab 30 0e af e7 cd 5e 3a 96 9e 0c fb aa RADIUS SRV: Received 266 bytes from 127.0.0.1:42289 RADIUS SRV: Creating a new session hostapd_radius_get_eap_user: Failed to find user RADIUS SRV: Matching user entry found RADIUS SRV: Calling-Station-Id: 02:00:00:00:02:00 RADIUS SRV: [0x4 127.0.0.1] New session created EAP: Server state machine created RADIUS SRV: New session 0x4 initialized EAP: EAP entering state INITIALIZE EAP: parseEapResp: rxResp=0 rxInitiate=1 respId=0 respMethod=2 respVendor=0 respVendorMethod=0 : CTRL-EVENT-EAP-STARTED 00:00:00:00:00:00 EAP: EAP entering state SELECT_ACTION EAP: getDecision: no identity known yet -> CONTINUE EAP: EAP entering state INITIATE_RECEIVED EAP: EAP-Initiate/Re-Auth - hexdump(len=50): 00 00 00 01 1c 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 40 65 78 61 6d 70 6c 65 2e 63 6f 6d 02 7c 0e 08 1c c8 36 9e f6 ab 73 1e 24 7a 09 a6 40 EAP: Flags=0x0 SEQ=0 EAP: EAP-Initiate/Re-auth - keyName-NAI - hexdump_ascii(len=28): 38 64 34 38 65 36 33 37 31 61 35 62 61 64 37 65 8d48e6371a5bad7e 40 65 78 61 6d 70 6c 65 2e 63 6f 6d @example.com EAP: SEQ=0 replayed (already received SEQ=0) RADIUS SRV: No EAP data from the state machine - ignore this Access-Request silently (assuming it was a duplicate) nl80211: Ignored event 20 (NL80211_CMD_DEL_STATION) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 20 (NL80211_CMD_DEL_STATION) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 37 (NL80211_CMD_AUTHENTICATE) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 37 (NL80211_CMD_AUTHENTICATE) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0) nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln0 nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=02:00:00:00:02:00 bssid=ff:ff:ff:ff:ff:ff freq=2412 ssi_signal=-30 fc=0x40 seq_ctrl=0x2070 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=109 nl80211: send_mlme - da=02:00:00:00:02:00 noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3 nl80211: send_mlme - Use bss->freq=2412 nl80211: send_mlme -> send_frame_cmd nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wln1 nl80211: RX frame da=ff:ff:ff:ff:ff:ff sa=02:00:00:00:02:00 bssid=ff:ff:ff:ff:ff:ff freq=2417 ssi_signal=-30 fc=0x40 seq_ctrl=0x11a0 stype=4 (WLAN_FC_STYPE_PROBE_REQ) len=109 nl80211: send_mlme - da=02:00:00:00:02:00 noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0x50 (WLAN_FC_STYPE_PROBE_RESP) nlmode=3 nl80211: send_mlme - Use bss->freq=2417 nl80211: send_mlme -> send_frame_cmd nl80211: Ignored event 34 (NL80211_CMD_NEW_SCAN_RESULTS) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 34 (NL80211_CMD_NEW_SCAN_RESULTS) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 33 (NL80211_CMD_TRIGGER_SCAN) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 20 (NL80211_CMD_DEL_STATION) for foreign interface (ifindex 9 wdev 0x0) nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wln0 nl80211: Delete station 02:00:00:00:02:00 nl80211: Ignored event 16 (NL80211_CMD_STOP_AP) for foreign interface (ifindex 9 wdev 0x0) nl80211: Drv Event 16 (NL80211_CMD_STOP_AP) received for wln0 wln0: Event INTERFACE_UNAVAILABLE (28) received Interface wln0 is unavailable -- stopped RTM_NEWLINK: ifi_index=9 ifname=wln0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1002 () nl80211: Interface down (wln0/wln0) wln0: Event INTERFACE_DISABLED (26) received wln0: STA 02:00:00:00:02:00 MLME: MLME-DEAUTHENTICATE.indication(02:00:00:00:02:00, 1) wln0: STA 02:00:00:00:02:00 MLME: MLME-DELETEKEYS.request(02:00:00:00:02:00) wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=0 addr=0x11cc9c0 key_idx=0 set_tx=1 seq_len=0 key_len=0 key_flag=0x20 nl80211: DEL_KEY addr=02:00:00:00:02:00 pairwise key nl80211: set_key failed; err=-100 Network is down RSN: PTK removal from the driver failed Removing station 02:00:00:00:02:00 wln0: AP-STA-DISCONNECTED 02:00:00:00:02:00 CTRL_IFACE monitor send /tmp/hostapd_1_0\x00 nl80211: Set STA flags - ifname=wln0 addr=02:00:00:00:02:00 total_flags=0x6c flags_or=0xc flags_and=0xfffffffd authorized=0 nl80211: sta_remove -> DEL_STATION wln0 02:00:00:00:02:00 --> -100 (Network is down) ap_free_sta: cancel ap_handle_timer for 02:00:00:00:02:00 EAP: Server state machine removed wln0: INTERFACE-DISABLED CTRL_IFACE monitor send /tmp/hostapd_1_0\x00 nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wln1 nl80211: Delete station 02:00:00:00:02:00 nl80211: Drv Event 16 (NL80211_CMD_STOP_AP) received for wln1 wln1: Event INTERFACE_UNAVAILABLE (28) received Interface wln1 is unavailable -- stopped RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1002 () nl80211: Interface down (wln1/wln1) wln1: Event INTERFACE_DISABLED (26) received Removing station 02:00:00:00:02:00 nl80211: Set STA flags - ifname=wln1 addr=02:00:00:00:02:00 total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0 nl80211: sta_remove -> DEL_STATION wln1 02:00:00:00:02:00 --> -100 (Network is down) ap_free_sta: cancel ap_handle_timer for 02:00:00:00:02:00 EAP: Server state machine removed wln1: STA 02:00:00:00:02:00 RADIUS: Removing pending RADIUS authentication message for removed client wln1: STA 02:00:00:00:02:00 RADIUS: Removing pending RADIUS authentication message for removed client wln1: STA 02:00:00:00:02:00 RADIUS: Removing pending RADIUS authentication message for removed client wln1: INTERFACE-DISABLED CTRL_IFACE monitor send /tmp/hostapd_1_1\x00 nl80211: Ignored event 36 (NL80211_CMD_REG_CHANGE) for foreign interface (ifindex -1 wdev 0x0) nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wln0 nl80211: Regulatory domain change * initiator=0 * type=1 wln0: Event CHANNEL_LIST_CHANGED (27) received RTM_NEWLINK: ifi_index=9 ifname=wln0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) nl80211: Interface up (wln0/wln0) wln0: Event INTERFACE_ENABLED (25) received wln0: INTERFACE-ENABLED CTRL_IFACE monitor send /tmp/hostapd_1_0\x00 wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key wpa_driver_nl80211_set_key: ifindex=9 (wln0) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key nl80211: Set beacon (beacon_set=0) nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 12 00 00 00 00 01 12 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 01 nl80211: Beacon tail - hexdump(len=66): 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 01 00 0f ac 0e 80 00 46 05 02 00 00 00 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: ifindex=9 nl80211: beacon_int=100 nl80211: beacon_rate=0 nl80211: rate_type=0 nl80211: dtim_period=2 nl80211: ssid=TestFT * beacon_int=100 * dtim_period=2 nl80211: hidden SSID not in use nl80211: privacy=2 nl80211: auth_algs=0x1 nl80211: wpa_version=0x2 nl80211: key_mgmt_suites=0x40001 nl80211: pairwise_ciphers=0x10 nl80211: group_cipher=0x10 nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01 nl80211: multicast to unicast disabled on interface wln0 RTM_NEWLINK: ifi_index=9 ifname=wln0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1003 ([UP]) nl80211: Interface up (wln1/wln1) wln1: Event INTERFACE_ENABLED (25) received wln1: INTERFACE-ENABLED CTRL_IFACE monitor send /tmp/hostapd_1_1\x00 wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=3 addr=0x507b01 key_idx=1 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key wpa_driver_nl80211_set_key: ifindex=10 (wln1) alg=4 addr=0x507b01 key_idx=4 set_tx=1 seq_len=0 key_len=16 key_flag=0x1a nl80211: NEW_KEY nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key nl80211: NL80211_CMD_SET_KEY - default key nl80211: Set beacon (beacon_set=0) nl80211: Beacon head - hexdump(len=57): 80 00 00 00 ff ff ff ff ff ff 12 00 00 00 00 02 12 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 64 00 11 14 00 06 54 65 73 74 46 54 01 08 82 84 8b 96 0c 12 18 24 03 01 02 nl80211: Beacon tail - hexdump(len=66): 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 01 00 0f ac 0e 80 00 46 05 02 00 00 00 00 3b 02 51 00 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: ifindex=10 nl80211: beacon_int=100 nl80211: beacon_rate=0 nl80211: rate_type=0 nl80211: dtim_period=2 nl80211: ssid=TestFT * beacon_int=100 * dtim_period=2 nl80211: hidden SSID not in use nl80211: privacy=2 nl80211: auth_algs=0x1 nl80211: wpa_version=0x2 nl80211: key_mgmt_suites=0x40001 nl80211: pairwise_ciphers=0x10 nl80211: group_cipher=0x10 nl80211: beacon_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: proberesp_ies - hexdump(len=20): 7f 0a 04 00 40 02 00 00 01 40 00 01 f0 06 00 02 a3 79 a3 79 nl80211: assocresp_ies - hexdump(len=12): 7f 0a 04 00 40 02 00 00 01 40 00 01 nl80211: multicast to unicast disabled on interface wln1 RTM_NEWLINK: ifi_index=12 ifname=wlan2 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1002 () nl80211: Ignored event 35 (NL80211_CMD_SCAN_ABORTED) for foreign interface (ifindex 12 wdev 0x0) nl80211: Ignored event 35 (NL80211_CMD_SCAN_ABORTED) for foreign interface (ifindex 12 wdev 0x0) RTM_NEWLINK: ifi_index=10 ifname=wln1 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RADIUS SRV: Removing completed session 0x0 EAP: Server state machine removed RTM_DELLINK: ifi_index=12 ifname=wlan2 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1002 () RTM_DELLINK: Interface 'wlan2' removed RTM_NEWLINK: ifi_index=1 ifname=lo operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x8 () nl80211: Ignored event 16 (NL80211_CMD_STOP_AP) for foreign interface (ifindex 9 wdev 0x0) nl80211: Drv Event 16 (NL80211_CMD_STOP_AP) received for wln0 wln0: Event INTERFACE_UNAVAILABLE (28) received Interface wln0 is unavailable -- stopped RTM_NEWLINK: ifi_index=9 ifname=wln0 operstate=2 linkmode=0 ifi_family=0 ifi_flags=0x1002 () nl80211: Interface down (wln0/wln0) wln0: Event INTERFACE_DISABLED (26) received wln0: INTERFACE-DISABLED CTRL_IFACE monitor send /tmp/hostapd_1_0\x00 CTRL_IFACE monitor[0]: 2 - No such file or directory CTRL_IFACE monitor detached /tmp/hostapd_1_0\x00 Signal 15 received - terminating Control interface directory not empty - leaving it behind hostapd_interface_deinit_free(0x118cde0) hostapd_interface_deinit_free: num_bss=1 conf->num_bss=1 hostapd_interface_deinit(0x118cde0) wln0: interface state ENABLED->DISABLED hostapd_bss_deinit: deinit bss wln0 wln0: Deauthenticate all stations nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3 nl80211: send_mlme - Use bss->freq=2412 nl80211: send_mlme -> send_frame_cmd nl80211: Frame command failed: ret=-100 (Network is down) (freq=2412 wait=0) wln0: AP-DISABLED hostapd_cleanup(hapd=0x118e3a0 (wln0)) wln0: CTRL-EVENT-TERMINATING Control interface directory not empty - leaving it behind hostapd_free_hapd_data(wln0) hostapd_interface_deinit_free: driver=0x521a80 drv_priv=0x11a1680 -> hapd_deinit nl80211: deinit ifname=wln0 disabled_11b_rates=0 nl80211: Remove monitor interface: refcount=0 nl80211: Remove beacon (ifindex=9) netlink: Operstate: ifindex=9 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP) nl80211: Set mode ifindex 9 iftype 2 (STATION) nl80211: Teardown AP(wln0) - device_ap_sme=0 use_monitor=0 nl80211: Unsubscribe mgmt frames handle 0x888888888992ad99 (AP teardown) hostapd_interface_free(0x118cde0) hostapd_interface_free: free hapd 0x118e3a0 hostapd_cleanup_iface(0x118cde0) hostapd_cleanup_iface_partial(0x118cde0) hostapd_cleanup_iface: free iface=0x118cde0 hostapd_interface_deinit_free(0x118fb60) hostapd_interface_deinit_free: num_bss=1 conf->num_bss=1 hostapd_interface_deinit(0x118fb60) wln1: interface state ENABLED->DISABLED hostapd_bss_deinit: deinit bss wln1 wln1: Deauthenticate all stations nl80211: send_mlme - da=ff:ff:ff:ff:ff:ff noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 no_encrypt=0 fc=0xc0 (WLAN_FC_STYPE_DEAUTH) nlmode=3 nl80211: send_mlme - Use bss->freq=2417 nl80211: send_mlme -> send_frame_cmd wln1: AP-DISABLED CTRL_IFACE monitor send /tmp/hostapd_1_1\x00 CTRL_IFACE monitor[0]: 2 - No such file or directory CTRL_IFACE monitor detached /tmp/hostapd_1_1\x00 hostapd_cleanup(hapd=0x1191060 (wln1)) wln1: CTRL-EVENT-TERMINATING hostapd_free_hapd_data(wln1) hostapd_interface_deinit_free: driver=0x521a80 drv_priv=0x11a7230 -> hapd_deinit nl80211: deinit ifname=wln1 disabled_11b_rates=0 nl80211: Remove monitor interface: refcount=0 nl80211: Remove beacon (ifindex=10) netlink: Operstate: ifindex=10 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP) nl80211: Set mode ifindex 10 iftype 2 (STATION) nl80211: Teardown AP(wln1) - device_ap_sme=0 use_monitor=0 nl80211: Unsubscribe mgmt frames handle 0x88888888899162d9 (AP teardown) hostapd_interface_free(0x118fb60) hostapd_interface_free: free hapd 0x1191060 hostapd_cleanup_iface(0x118fb60) hostapd_cleanup_iface_partial(0x118fb60) hostapd_cleanup_iface: free iface=0x118fb60 hostapd_interface_deinit_free(0x11924b0) hostapd_interface_deinit_free: num_bss=1 conf->num_bss=1 hostapd_interface_deinit(0x11924b0) : interface state ENABLED->DISABLED hostapd_bss_deinit: deinit bss : AP-DISABLED hostapd_cleanup(hapd=0x1195c10 ()) : CTRL-EVENT-TERMINATING hostapd_free_hapd_data() EAP: Server state machine removed EAP: Server state machine removed EAP: Server state machine removed EAP: Server state machine removed hostapd_interface_deinit_free: driver=0x526940 drv_priv=0x11a79b0 -> hapd_deinit hostapd_interface_free(0x11924b0) hostapd_interface_free: free hapd 0x1195c10 hostapd_cleanup_iface(0x11924b0) hostapd_cleanup_iface_partial(0x11924b0) hostapd_cleanup_iface: free iface=0x11924b0
Wireless daemon version 1.17 src/main.c:main() Using configuration directory /tmp Loaded configuration from /tmp/main.conf src/storage.c:storage_create_dirs() Using state directory /tmp/iwd src/main.c:nl80211_appeared() Found nl80211 interface src/module.c:iwd_modules_init() station: Network configuration is disabled. src/wsc.c:wsc_init() src/knownnetworks.c:known_network_frequencies_load() No known frequency file found. src/eap.c:__eap_method_enable() src/eap-wsc.c:eap_wsc_init() src/eap-md5.c:eap_md5_init() src/eap-tls.c:eap_tls_init() src/eap-ttls.c:eap_ttls_init() src/eap-mschapv2.c:eap_mschapv2_init() src/eap-sim.c:eap_sim_init() src/eap-aka.c:eap_aka_prime_init() src/eap-aka.c:eap_aka_init() src/eap-peap.c:eap_peap_init() src/eap-gtc.c:eap_gtc_init() src/eap-pwd.c:eap_pwd_init() src/manager.c:manager_wiphy_dump_callback() New wiphy rad2 added (2) src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad1 src/wiphy.c:wiphy_is_managed() whitelist filtered phy: rad0 Wiphy: 2, Name: rad2 Permanent Address: 02:00:00:00:02:00 2.4Ghz Band: Bitrates (non-HT): 1.0 Mbps 2.0 Mbps 5.5 Mbps 11.0 Mbps 6.0 Mbps 9.0 Mbps 12.0 Mbps 18.0 Mbps 24.0 Mbps 36.0 Mbps 48.0 Mbps 54.0 Mbps HT Capabilities: HT40 Short GI for 20Mhz Short GI for 40Mhz HT RX MCS indexes: 0-15 5Ghz Band: Bitrates (non-HT): 6.0 Mbps 9.0 Mbps 12.0 Mbps 18.0 Mbps 24.0 Mbps 36.0 Mbps 48.0 Mbps 54.0 Mbps HT Capabilities: HT40 Short GI for 20Mhz Short GI for 40Mhz HT RX MCS indexes: 0-15 VHT Capabilities: 160 Mhz, 80+80 Mhz operation Short GI for 80Mhz Short GI for 160 and 80 + 80 Mhz Max RX MCS: 0-9 for NSS: 8 Max TX MCS: 0-9 for NSS: 8 Ciphers: CCMP TKIP BIP Supported iftypes: ad-hoc station ap p2p-client p2p-go p2p-device src/manager.c:manager_interface_dump_callback() src/manager.c:manager_get_interface_cb() src/manager.c:manager_get_interface_cb() src/manager.c:manager_interface_dump_callback() src/manager.c:manager_interface_dump_callback() src/manager.c:manager_interface_dump_callback() src/manager.c:manager_interface_dump_callback() src/wiphy.c:wiphy_update_reg_domain() New reg domain country code for (global) is 00 src/manager.c:manager_config_notify() Notification of command Del Interface(8) src/netdev.c:netdev_link_notify() event 17 on ifindex 8 src/manager.c:manager_del_interface_cb() src/manager.c:manager_create_interfaces() creating wlan2 src/manager.c:manager_create_interfaces() creating wlan2-p2p src/manager.c:manager_config_notify() Notification of command New Interface(7) src/netdev.c:netdev_link_notify() event 16 on ifindex 12 src/manager.c:manager_new_station_interface_cb() src/netdev.c:netdev_create_from_genl() Created interface wlan2[12 200000002] src/manager.c:manager_config_notify() Notification of command New Interface(7) src/manager.c:manager_new_p2p_interface_cb() src/p2p.c:p2p_device_update_from_genl() Created P2P device 200000003 src/netdev.c:netdev_link_notify() event 16 on ifindex 12 src/netdev.c:netdev_set_4addr() netdev: 12 use_4addr: 0 src/netdev.c:netdev_initial_up_cb() Interface 12 initialized src/rrm.c:rrm_add_frame_watches() src/netdev.c:netdev_link_notify() event 16 on ifindex 12 src/netdev.c:netdev_link_notify() event 16 on ifindex 12 src/manager.c:manager_config_notify() Notification of command Set Interface(6) src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60) src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60) src/manager.c:manager_config_notify() Notification of command Set Interface(6) src/manager.c:manager_config_notify() Notification of command Set Interface(6) src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60) src/netdev.c:netdev_link_notify() event 16 on ifindex 9 src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60) src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60) src/manager.c:manager_config_notify() Notification of command Set Interface(6) src/manager.c:manager_config_notify() Notification of command Set Interface(6) src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60) src/netdev.c:netdev_link_notify() event 16 on ifindex 10 src/station.c:station_dbus_scan() Scan called from DBus src/wiphy.c:wiphy_radio_work_insert() Inserting work item 1 src/wiphy.c:wiphy_radio_work_next() Starting work item 1 src/scan.c:scan_notify() Scan notification Trigger Scan(33) src/scan.c:scan_request_triggered() Active scan triggered for wdev 200000002 src/station.c:station_dbus_scan_triggered() station_scan_triggered: 0 src/station.c:station_dbus_scan_triggered() Scan triggered for wlan2 subset 0 src/scan.c:scan_notify() Scan notification New Scan Results(34) src/scan.c:get_scan_callback() get_scan_callback src/scan.c:get_scan_done() get_scan_done src/station.c:station_add_seen_bss() Processing BSS '12:00:00:00:00:01' with SSID: TestFT, freq: 2412, rank: 1512, strength: -3000, data_rate: 54.0 src/station.c:station_add_seen_bss() Added new Network "TestFT" security 8021x src/wiphy.c:wiphy_radio_work_insert() Inserting work item 2 src/wiphy.c:wiphy_radio_work_done() Work item 1 done src/wiphy.c:wiphy_radio_work_next() Starting work item 2 src/scan.c:scan_notify() Scan notification Trigger Scan(33) src/scan.c:scan_request_triggered() Active scan triggered for wdev 200000002 src/station.c:station_dbus_scan_triggered() station_scan_triggered: 0 src/station.c:station_dbus_scan_triggered() Scan triggered for wlan2 subset 1 src/scan.c:scan_notify() Scan notification New Scan Results(34) src/scan.c:get_scan_done() get_scan_done src/station.c:station_add_seen_bss() Processing BSS '12:00:00:00:00:01' with SSID: TestFT, freq: 2412, rank: 1512, strength: -3000, data_rate: 54.0 src/wiphy.c:wiphy_radio_work_insert() Inserting work item 3 src/wiphy.c:wiphy_radio_work_done() Work item 2 done src/wiphy.c:wiphy_radio_work_next() Starting work item 3 src/scan.c:scan_notify() Scan notification Trigger Scan(33) src/scan.c:scan_request_triggered() Active scan triggered for wdev 200000002 src/station.c:station_dbus_scan_triggered() station_scan_triggered: 0 src/station.c:station_dbus_scan_triggered() Scan triggered for wlan2 subset 2 src/scan.c:scan_notify() Scan notification New Scan Results(34) src/scan.c:get_scan_callback() get_scan_callback src/scan.c:get_scan_done() get_scan_done src/station.c:station_add_seen_bss() Processing BSS '12:00:00:00:00:02' with SSID: TestFT, freq: 2417, rank: 1512, strength: -3000, data_rate: 54.0 src/station.c:station_add_seen_bss() Processing BSS '12:00:00:00:00:01' with SSID: TestFT, freq: 2412, rank: 1512, strength: -3000, data_rate: 54.0 src/wiphy.c:wiphy_radio_work_done() Work item 3 done src/station.c:station_force_connect_bssid() Attempting forced connection to BSS 12:00:00:00:00:01 src/network.c:network_connect_8021x() src/network.c:network_connect_8021x() supplied 0 secrets, 0 more needed for EAP src/netdev.c:netdev_cqm_rssi_update() src/wiphy.c:wiphy_radio_work_insert() Inserting work item 4 src/wiphy.c:wiphy_radio_work_next() Starting work item 4 src/station.c:__station_connect_network() connecting to BSS 12:00:00:00:00:01 src/station.c:station_enter_state() Old State: disconnected, new state: connecting src/scan.c:scan_notify() Scan notification Trigger Scan(33) src/station.c:station_netdev_event() Associating src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60) src/scan.c:scan_notify() Scan notification New Scan Results(34) src/netdev.c:netdev_mlme_notify() MLME notification New Station(19) src/netdev.c:netdev_mlme_notify() MLME notification New Station(19) src/netdev.c:netdev_mlme_notify() MLME notification Authenticate(37) src/netdev.c:netdev_authenticate_event() src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60) src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60) src/netdev.c:netdev_mlme_notify() MLME notification Associate(38) src/netdev.c:netdev_associate_event() src/netdev.c:netdev_link_notify() event 16 on ifindex 12 src/netdev.c:netdev_mlme_notify() MLME notification Connect(46) src/netdev.c:netdev_connect_event() src/netdev.c:netdev_unicast_notify() Unicast notification 129 src/netdev.c:netdev_control_port_frame_event() src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139) src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139) src/netdev.c:netdev_unicast_notify() Unicast notification 129 src/netdev.c:netdev_control_port_frame_event() src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139) src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139) src/netdev.c:netdev_unicast_notify() Unicast notification 129 src/netdev.c:netdev_control_port_frame_event() src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139) src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139) src/netdev.c:netdev_unicast_notify() Unicast notification 129 src/netdev.c:netdev_control_port_frame_event() src/eapol.c:eapol_eap_results_cb() EAP key material received src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139) src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139) src/netdev.c:netdev_unicast_notify() Unicast notification 129 src/netdev.c:netdev_control_port_frame_event() EAP completed with eapSuccess src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139) src/netdev.c:netdev_unicast_notify() Unicast notification 129 src/netdev.c:netdev_control_port_frame_event() src/eapol.c:eapol_handle_ptk_1_of_4() ifindex=12 src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139) src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139) src/netdev.c:netdev_unicast_notify() Unicast notification 129 src/netdev.c:netdev_control_port_frame_event() src/eapol.c:eapol_handle_ptk_3_of_4() ifindex=12 src/netdev.c:netdev_set_gtk() 12 src/netdev.c:netdev_set_igtk() 12 src/station.c:station_handshake_event() Setting keys src/netdev.c:netdev_set_tk() 12 src/netdev.c:netdev_set_rekey_offload() 12 src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139) src/netdev.c:netdev_mlme_notify() MLME notification Control Port TX Status(139) hardware_rekey not supported src/station.c:station_connect_cb() 12, result: 0 src/station.c:station_connect_ok() src/station.c:station_enter_state() Old State: connecting, new state: connected src/wiphy.c:wiphy_radio_work_done() Work item 4 done src/netdev.c:netdev_link_notify() event 16 on ifindex 12 src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60) src/netdev.c:netdev_unicast_notify() Unicast notification 59 src/station.c:station_early_neighbor_report_cb() ifindex: 12, error: 0() src/station.c:parse_neighbor_report() Neighbor report received for 12:00:00:00:00:01: ch 1 (oper class 81), MD not set src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60) src/netdev.c:netdev_mlme_notify() MLME notification Notify CQM(64) src/station.c:station_dbus_disconnect() src/station.c:station_enter_state() Old State: connected, new state: disconnecting src/netdev.c:netdev_mlme_notify() MLME notification Del Station(20) src/netdev.c:netdev_link_notify() event 16 on ifindex 12 src/netdev.c:netdev_mlme_notify() MLME notification Deauthenticate(39) src/netdev.c:netdev_deauthenticate_event() src/netdev.c:netdev_mlme_notify() MLME notification Disconnect(48) src/netdev.c:netdev_disconnect_event() src/netdev.c:netdev_mlme_notify() MLME notification Del Station(20) src/station.c:station_disconnect_cb() 12, success: 1 src/station.c:station_enter_state() Old State: disconnecting, new state: disconnected src/station.c:station_force_connect_bssid() Attempting forced connection to BSS 12:00:00:00:00:01 src/network.c:network_connect_8021x() src/network.c:network_connect_8021x() supplied 0 secrets, 0 more needed for EAP src/netdev.c:netdev_cqm_rssi_update() src/wiphy.c:wiphy_radio_work_insert() Inserting work item 5 src/wiphy.c:wiphy_radio_work_next() Starting work item 5 src/station.c:__station_connect_network() connecting to BSS 12:00:00:00:00:01 src/station.c:station_enter_state() Old State: disconnected, new state: connecting src/netdev.c:netdev_mlme_notify() MLME notification New Station(19) src/netdev.c:netdev_mlme_notify() MLME notification New Station(19) src/netdev.c:netdev_mlme_notify() MLME notification Authenticate(37) src/netdev.c:netdev_authenticate_event() src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60) src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60) src/netdev.c:netdev_mlme_notify() MLME notification Associate(38) src/netdev.c:netdev_associate_event() src/netdev.c:netdev_set_gtk() 12 src/netdev.c:netdev_set_igtk() 12 src/station.c:station_handshake_event() Setting keys src/netdev.c:netdev_set_tk() 12 src/netdev.c:netdev_mlme_notify() MLME notification Connect(46) src/netdev.c:netdev_connect_event() src/netdev.c:netdev_link_notify() event 16 on ifindex 12 src/station.c:station_connect_cb() 12, result: 0 src/station.c:station_connect_ok() src/station.c:station_enter_state() Old State: connecting, new state: connected src/wiphy.c:wiphy_radio_work_done() Work item 5 done src/netdev.c:netdev_link_notify() event 16 on ifindex 12 src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60) src/netdev.c:netdev_unicast_notify() Unicast notification 59 src/station.c:station_early_neighbor_report_cb() ifindex: 12, error: 0() src/station.c:parse_neighbor_report() Neighbor report received for 12:00:00:00:00:01: ch 1 (oper class 81), MD not set src/netdev.c:netdev_mlme_notify() MLME notification Frame TX Status(60) src/netdev.c:netdev_mlme_notify() MLME notification Notify CQM(64) src/station.c:station_force_roam() Attempting forced roam to BSS 12:00:00:00:00:02 src/station.c:station_transition_start() 12, target 12:00:00:00:00:02 src/netdev.c:netdev_cqm_rssi_update() src/wiphy.c:wiphy_radio_work_insert() Inserting work item 6 src/wiphy.c:wiphy_radio_work_next() Starting work item 6 src/station.c:station_enter_state() Old State: connected, new state: roaming src/netdev.c:netdev_mlme_notify() MLME notification Del Station(20) src/netdev.c:netdev_link_notify() event 16 on ifindex 12 src/netdev.c:netdev_mlme_notify() MLME notification Deauthenticate(39) src/netdev.c:netdev_deauthenticate_event() src/netdev.c:netdev_mlme_notify() MLME notification Disconnect(48) src/netdev.c:netdev_disconnect_event() src/netdev.c:netdev_mlme_notify() MLME notification New Station(19) src/netdev.c:netdev_mlme_notify() MLME notification New Station(19) src/netdev.c:netdev_mlme_notify() MLME notification Del Station(20) src/netdev.c:netdev_mlme_notify() MLME notification Authenticate(37) src/netdev.c:netdev_authenticate_event() authentication timed out src/wiphy.c:wiphy_radio_work_done() Work item 6 done src/station.c:station_reassociate_cb() 12, result: 1 src/station.c:station_roam_failed() 12 src/station.c:station_disassociated() 12 src/station.c:station_enter_state() Old State: roaming, new state: disconnected src/station.c:station_enter_state() Old State: disconnected, new state: autoconnect_quick src/wiphy.c:wiphy_radio_work_insert() Inserting work item 7 src/wiphy.c:wiphy_radio_work_next() Starting work item 7 src/scan.c:scan_notify() Scan notification Trigger Scan(33) src/scan.c:scan_request_triggered() Active scan triggered for wdev 200000002 src/station.c:station_quick_scan_triggered() Quick scan triggered for wlan2 src/scan.c:scan_notify() Scan notification New Scan Results(34) src/scan.c:get_scan_callback() get_scan_callback src/scan.c:get_scan_callback() get_scan_callback src/scan.c:get_scan_done() get_scan_done src/station.c:station_add_seen_bss() Processing BSS '12:00:00:00:00:02' with SSID: TestFT, freq: 2417, rank: 1512, strength: -3000, data_rate: 54.0 src/station.c:station_add_seen_bss() Processing BSS '12:00:00:00:00:01' with SSID: TestFT, freq: 2412, rank: 1512, strength: -3000, data_rate: 54.0 src/station.c:station_autoconnect_next() autoconnect: Trying SSID: TestFT src/station.c:station_autoconnect_next() autoconnect: '12:00:00:00:00:01' freq: 2412, rank: 1512, strength: -3000 src/station.c:station_autoconnect_next() autoconnect: network_autoconnect: Operation not permitted (-1) src/station.c:station_enter_state() Old State: autoconnect_quick, new state: autoconnect_full src/scan.c:scan_periodic_start() Starting periodic scan for wdev 200000002 src/wiphy.c:wiphy_radio_work_insert() Inserting work item 8 src/wiphy.c:wiphy_radio_work_done() Work item 7 done src/wiphy.c:wiphy_radio_work_next() Starting work item 8 src/scan.c:scan_notify() Scan notification Trigger Scan(33) src/scan.c:scan_request_triggered() Passive scan triggered for wdev 200000002 src/scan.c:scan_periodic_triggered() Periodic scan triggered for wdev 200000002 src/netdev.c:netdev_mlme_notify() MLME notification Del Station(20) src/netdev.c:netdev_mlme_notify() MLME notification Stop AP(16) src/netdev.c:netdev_link_notify() event 16 on ifindex 9 src/netdev.c:netdev_mlme_notify() MLME notification Del Station(20) src/netdev.c:netdev_mlme_notify() MLME notification Stop AP(16) src/netdev.c:netdev_link_notify() event 16 on ifindex 10 src/wiphy.c:wiphy_reg_notify() Notification of command Reg Change(36) src/wiphy.c:wiphy_update_reg_domain() New reg domain country code for (global) is XX src/netdev.c:netdev_link_notify() event 16 on ifindex 9 src/netdev.c:netdev_link_notify() event 16 on ifindex 9 src/netdev.c:netdev_link_notify() event 16 on ifindex 10 Terminate src/netdev.c:netdev_free() Freeing netdev wlan2[12] src/device.c:device_free() src/station.c:station_free() src/scan.c:scan_periodic_stop() Stopping periodic scan for wdev 200000002 src/scan.c:scan_cancel() Trying to cancel scan id 8 for wdev 200000002 src/scan.c:scan_cancel() Scan is at the top of the queue and triggered Removing scan context for wdev 200000002 src/scan.c:scan_context_free() sc: 0x1041e70 src/wiphy.c:wiphy_radio_work_done() Work item 8 done src/netdev.c:netdev_link_notify() event 16 on ifindex 12 src/scan.c:scan_notify() Scan notification Scan Aborted(35) src/netdev.c:netdev_link_notify() event 16 on ifindex 10 src/module.c:iwd_modules_exit() src/eap.c:__eap_method_disable() src/eap-wsc.c:eap_wsc_exit() src/eap-md5.c:eap_md5_exit() src/eap-tls.c:eap_tls_exit() src/eap-ttls.c:eap_ttls_exit() src/eap-mschapv2.c:eap_mschapv2_exit() src/eap-sim.c:eap_sim_exit() src/eap-aka.c:eap_aka_prime_exit() src/eap-aka.c:eap_aka_exit() src/eap-peap.c:eap_peap_exit() src/eap-gtc.c:eap_gtc_exit() src/eap-pwd.c:eap_pwd_exit() Removing scan context for wdev 200000003 src/scan.c:scan_context_free() sc: 0x1036560 src/wsc.c:wsc_exit() src/wiphy.c:wiphy_free() Freeing wiphy rad0[0] src/wiphy.c:wiphy_free() Freeing wiphy rad1[1] src/wiphy.c:wiphy_free() Freeing wiphy rad2[2] D-Bus disconnected, quitting...
hw_mode=g channel=2 ssid=TestFT utf8_ssid=1 ctrl_interface=/var/run/hostapd r1_key_holder=000000000002 nas_identifier=dummy2 wpa=2 # Can support WPA-EAP and FT-EAP (space separated list) at the same # time but we want to force FT wpa_key_mgmt=WPA-EAP FILS-SHA256 wpa_pairwise=CCMP ieee8021x=1 fils_realm=example.com wpa_ptk_rekey=30 wpa_group_rekey=80 ieee80211w=1 rsn_preauth=0 disable_pmksa_caching=1 # Allow PMK cache to be shared opportunistically among configured interfaces # and BSSes (i.e., all configurations within a single hostapd process). okc=1 mobility_domain=1234 reassociation_deadline=60000 r0kh=12:00:00:00:00:01 nas1.w1.fi 000102030405060708090a0b0c0d0e0f r0kh=12:00:00:00:00:02 nas2.w1.fi 000102030405060708090a0b0c0d0e0f r1kh=12:00:00:00:00:01 00:00:00:00:00:01 000102030405060708090a0b0c0d0e0f r1kh=12:00:00:00:00:02 00:00:00:00:00:02 000102030405060708090a0b0c0d0e0f # Push mode only needed for 8021x, not PSK mode since msk already known pmk_r1_push=1 ft_over_ds=0 ap_table_expiration_time=36000 ap_table_max_size=10 rrm_neighbor_report=1 auth_server_addr=127.0.0.1 auth_server_port=1812 auth_server_shared_secret=secret nas_identifier=nas2.w1.fi
hw_mode=g channel=1 ssid=TestFT utf8_ssid=1 ctrl_interface=/var/run/hostapd r1_key_holder=000000000001 nas_identifier=dummy1 wpa=2 # Can support WPA-EAP and FT-EAP (space separated list) at the same # time but we want to force FT wpa_key_mgmt=WPA-EAP FILS-SHA256 wpa_pairwise=CCMP ieee8021x=1 fils_realm=example.com wpa_ptk_rekey=30 wpa_group_rekey=80 ieee80211w=1 rsn_preauth=0 disable_pmksa_caching=1 # Allow PMK cache to be shared opportunistically among configured interfaces # and BSSes (i.e., all configurations within a single hostapd process). okc=1 mobility_domain=1234 reassociation_deadline=60000 r0kh=12:00:00:00:00:01 nas1.w1.fi 000102030405060708090a0b0c0d0e0f r0kh=12:00:00:00:00:02 nas2.w1.fi 000102030405060708090a0b0c0d0e0f r1kh=12:00:00:00:00:01 00:00:00:00:00:01 000102030405060708090a0b0c0d0e0f r1kh=12:00:00:00:00:02 00:00:00:00:00:02 000102030405060708090a0b0c0d0e0f # Push mode only needed for 8021x, not PSK mode since msk already known pmk_r1_push=1 ft_over_ds=0 ap_table_expiration_time=36000 ap_table_max_size=10 rrm_neighbor_report=1 auth_server_addr=127.0.0.1 auth_server_port=1812 auth_server_shared_secret=secret nas_identifier=nas1.w1.fi
driver=none radius_server_clients=/tmp/certs/radius-clients.text radius_server_auth_port=1812 eap_user_file=/tmp/secrets/eap-user.text eap_server=0 eap_server_erp=1 erp_send_reauth_start=1 erp_domain=example.com fils_realm=example.com disable_pmksa_caching=1 pwd_group=19 wpa_group_rekey=30 wpa_ptk_rekey=30
_______________________________________________ Hostap mailing list Hostap@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/hostap