NetBSD-Bugs archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: kern/51797: iwm(4) does not work after if_iwm.c rev. 1.45
The following reply was made to PR kern/51797; it has been noted by GNATS.
From: Ryo ONODERA <ryo_on%yk.rim.or.jp@localhost>
To: nonakap%gmail.com@localhost
Cc: gnats-bugs%netbsd.org@localhost
Subject: Re: kern/51797: iwm(4) does not work after if_iwm.c rev. 1.45
Date: Thu, 19 Jan 2017 23:46:23 +0900 (JST)
Hi,
From: Kimihiro Nonaka <nonakap%gmail.com@localhost>, Date: Thu, 19 Jan 2017 20:31:35 +0900
> 2017-01-14 5:07 GMT+09:00 Ryo ONODERA <ryo_on%yk.rim.or.jp@localhost>:
>
>> However it seems that it is less stable.
>> I have gotten 'iwm0: fatal firmware error' in some case.
>
> Could you try if_iwm.c r1.65?
I have
iwm0: fatal firmware error
too.
Here is the output from wpa_supplicant:
$ sudo wpa_supplicant -dd -i iwm0 -c /opt/share/wpa_supplicant-xperia.conf
sudo password:
wpa_supplicant v2.6
Successfully initialized wpa_supplicant
Initializing interface 'iwm0' conf '/opt/share/wpa_supplicant-xperia.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/opt/share/wpa_supplicant-xperia.conf' -> '/opt/share/wpa_supplicant-xperia.conf'
Reading configuration file '/opt/share/wpa_supplicant-xperia.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group='wheel'
Line: 3 - start of a new network block
ssid - hexdump_ascii(len=5):
78 74 65 72 6d xterm
key_mgmt: 0x2
PSK (ASCII passphrase) - hexdump_ascii(len=13): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
id=0 ssid='xterm'
Add interface iwm0 to a new radio N/A
iwm0: Own MAC address: 5c:e0:c5:a8:88:ab
bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=0
bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=1
bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=2
bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0
bsd_del_key: key_idx=3
wpa_driver_bsd_set_countermeasures: enabled=0
iwm0: RSN: flushing PMKID list in the driver
iwm0: Setting scan request: 0.100000 sec
ENGINE: Loading dynamic engine
ENGINE: Loading dynamic engine
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
ctrl_interface_group=0 (from group name 'wheel')
iwm0: Added interface iwm0
iwm0: State: DISCONNECTED -> DISCONNECTED
iwm0: State: DISCONNECTED -> SCANNING
iwm0: Starting AP scan for wildcard SSID
iwm0: Add radio work 'scan'@0x7d42cc9f2140
iwm0: First radio work item in the queue - schedule start immediately
iwm0: Starting radio work 'scan'@0x7d42cc9f2140 after 0.000006 second wait
wpa_driver_bsd_set_wpa: enabled=1
wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
EAPOL: disable timer tick
iwm0: Event SCAN_RESULTS (3) received
Received 520 bytes of scan results (6 BSSes)
iwm0: BSS: Start scan result update 1
iwm0: BSS: Add new id 0 BSSID a4:12:42:67:d4:32 SSID 'SWEETS3' freq 2457
iwm0: BSS: Add new id 1 BSSID 10:6f:3f:28:dc:d5 SSID '' freq 5200
iwm0: BSS: Add new id 2 BSSID 10:6f:3f:28:dc:d4 SSID 'SWEETS2' freq 2417
iwm0: BSS: Add new id 3 BSSID bc:6e:64:88:25:0b SSID 'xterm' freq 2417
iwm0: BSS: Add new id 4 BSSID b6:12:42:67:d4:32 SSID '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' freq 2452
iwm0: BSS: Add new id 5 BSSID 00:00:00:00:00:00 SSID '' freq 5200
BSS: last_scan_res_used=6/32
iwm0: New scan results available (own=0 ext=0)
iwm0: Radio work 'scan'@0x7d42cc9f2140 done in 5.542282 seconds
iwm0: radio_work_free('scan'@0x7d42cc9f2140: num_active_works --> 0
iwm0: Selecting BSS from priority group 0
iwm0: 0: a4:12:42:67:d4:32 ssid='SWEETS3' wpa_ie_len=22 rsn_ie_len=0 caps=0x31 level=83 freq=2457
iwm0: skip - SSID mismatch
iwm0: 1: 10:6f:3f:28:dc:d5 ssid='' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 level=71 freq=5200
iwm0: skip - SSID not known
iwm0: 2: 10:6f:3f:28:dc:d4 ssid='SWEETS2' wpa_ie_len=26 rsn_ie_len=0 caps=0x31 level=47 freq=2417
iwm0: skip - SSID mismatch
iwm0: 3: bc:6e:64:88:25:0b ssid='xterm' wpa_ie_len=0 rsn_ie_len=20 caps=0x31 level=29 freq=2417
iwm0: selected based on RSN IE
iwm0: selected BSS bc:6e:64:88:25:0b ssid='xterm'
iwm0: Considering connect request: reassociate: 0 selected: bc:6e:64:88:25:0b bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x7d42cc919800 current_ssid=0x0
iwm0: Request association with bc:6e:64:88:25:0b
iwm0: Add radio work 'connect'@0x7d42cc9f2140
iwm0: First radio work item in the queue - schedule start immediately
iwm0: Starting radio work 'connect'@0x7d42cc9f2140 after 0.000014 second wait
iwm0: Trying to associate with bc:6e:64:88:25:0b (SSID='xterm' freq=2417 MHz)
iwm0: Cancelling scan request
iwm0: WPA: clearing own WPA/RSN IE
iwm0: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=0x7d42cc919800 try_opportunistic=0
RSN: Search for BSSID bc:6e:64:88:25:0b
RSN: No PMKSA cache entry found
iwm0: RSN: using IEEE 802.11i/D9.0
iwm0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
iwm0: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
iwm0: WPA: using GTK CCMP
iwm0: WPA: using PTK CCMP
iwm0: WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
iwm0: State: SCANNING -> ASSOCIATING
Limit connection to BSSID bc:6e:64:88:25:0b freq=2417 MHz based on scan results (bssid_set=0)
wpa_driver_bsd_associate: ssid 'xterm' wpa ie len 22 pairwise 16 group 16 key mgmt 2
wpa_driver_bsd_set_drop_unencrypted: enabled=1
wpa_driver_bsd_associate: set PRIVACY 1
iwm0: Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
iwm0: Event ASSOC (0) received
iwm0: State: ASSOCIATING -> ASSOCIATED
iwm0: Associated to a new BSS: BSSID=bc:6e:64:88:25:0b
iwm0: Associated with bc:6e:64:88:25:0b
iwm0: WPA: Association event - clear replay counter
iwm0: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
iwm0: Setting authentication timeout: 10 sec 0 usec
iwm0: Cancelling scan request
iwm0: RX EAPOL from bc:6e:64:88:25:0b
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 e4 7d 28 dc b9 f9 88 01 2d fc e0 e0 20 4b 86 74 da 82 fd c4 21 a3 2d 54 aa 85 d5 0d 3c 30 67 8a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
iwm0: Setting authentication timeout: 10 sec 0 usec
iwm0: IEEE 802.1X RX: version=2 type=3 length=95
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 e4 7d 28 dc b9 f9 88 01 2d fc e0 e0 20 4b 86 74 da 82 fd c4 21 a3 2d 54 aa 85 d5 0d 3c 30 67 8a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
iwm0: EAPOL-Key type=2
iwm0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
iwm0: key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): e4 7d 28 dc b9 f9 88 01 2d fc e0 e0 20 4b 86 74 da 82 fd c4 21 a3 2d 54 aa 85 d5 0d 3c 30 67 8a
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
iwm0: State: ASSOCIATED -> 4WAY_HANDSHAKE
iwm0: WPA: RX message 1 of 4-Way Handshake from bc:6e:64:88:25:0b (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
Get randomness: len=32 entropy=7
WPA: Renewed SNonce - hexdump(len=32): 01 fb 3b 43 e1 15 58 7d 50 da 77 b4 2c 33 d3 8d 79 4c 4f 5d 2c 33 cd c1 ec 53 7e 39 af a6 ce 43
WPA: PTK derivation - A1=5c:e0:c5:a8:88:ab A2=bc:6e:64:88:25:0b
WPA: Nonce1 - hexdump(len=32): 01 fb 3b 43 e1 15 58 7d 50 da 77 b4 2c 33 d3 8d 79 4c 4f 5d 2c 33 cd c1 ec 53 7e 39 af a6 ce 43
WPA: Nonce2 - hexdump(len=32): e4 7d 28 dc b9 f9 88 01 2d fc e0 e0 20 4b 86 74 da 82 fd c4 21 a3 2d 54 aa 85 d5 0d 3c 30 67 8a
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
iwm0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): e2 71 b3 25 30 1d 0b cd dd 54 76 d5 6a 69 8d f9
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 01 fb 3b 43 e1 15 58 7d 50 da 77 b4 2c 33 d3 8d 79 4c 4f 5d 2c 33 cd c1 ec 53 7e 39 af a6 ce 43 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e2 71 b3 25 30 1d 0b cd dd 54 76 d5 6a 69 8d f9 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
iwm0: Event DISASSOC (1) received
iwm0: Disassociation notification
iwm0: CTRL-EVENT-DISCONNECTED bssid=bc:6e:64:88:25:0b reason=0
iwm0: WPA: 4-Way Handshake failed - pre-shared key may be incorrect
iwm0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="xterm" auth_failures=1 duration=10 reason=WRONG_KEY
iwm0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=7)
iwm0: Setting scan request: 0.100000 sec
iwm0: Radio work 'connect'@0x7d42cc9f2140 done in 1.149477 seconds
iwm0: radio_work_free('connect'@0x7d42cc9f2140: num_active_works --> 0
Added BSSID bc:6e:64:88:25:0b into blacklist
iwm0: Blacklist count 1 --> request scan in 100 ms
iwm0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner
iwm0: WPA: Clear old PMK and PTK
iwm0: Disconnect event - remove keys
iwm0: State: 4WAY_HANDSHAKE -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
iwm0: State: DISCONNECTED -> SCANNING
iwm0: Starting AP scan for wildcard SSID
iwm0: Add radio work 'scan'@0x7d42cc9f2140
iwm0: First radio work item in the queue - schedule start immediately
iwm0: Starting radio work 'scan'@0x7d42cc9f2140 after 0.000004 second wait
wpa_driver_bsd_set_wpa: enabled=1
wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
EAPOL: startWhen --> 0
EAPOL: disable timer tick
iwm0: Event SCAN_RESULTS (3) received
Received 520 bytes of scan results (6 BSSes)
iwm0: BSS: Start scan result update 2
BSS: a4:12:42:67:d4:32 changed freq 2457 --> 2452
BSS: b6:12:42:67:d4:32 changed freq 2452 --> 2457
BSS: last_scan_res_used=6/32
iwm0: New scan results available (own=0 ext=0)
iwm0: Radio work 'scan'@0x7d42cc9f2140 done in 5.535155 seconds
iwm0: radio_work_free('scan'@0x7d42cc9f2140: num_active_works --> 0
iwm0: Postpone network selection by 4 seconds since all networks are disabled
iwm0: Try to associate due to network getting re-enabled
iwm0: CTRL-EVENT-SSID-REENABLED id=0 ssid="xterm"
iwm0: Selecting BSS from priority group 0
iwm0: 0: a4:12:42:67:d4:32 ssid='SWEETS3' wpa_ie_len=22 rsn_ie_len=0 caps=0x31 level=83 freq=2452
iwm0: skip - SSID mismatch
iwm0: 1: 10:6f:3f:28:dc:d5 ssid='' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 level=70 freq=5200
iwm0: skip - SSID not known
iwm0: 2: 10:6f:3f:28:dc:d4 ssid='SWEETS2' wpa_ie_len=26 rsn_ie_len=0 caps=0x31 level=51 freq=2417
iwm0: skip - SSID mismatch
iwm0: 3: bc:6e:64:88:25:0b ssid='xterm' wpa_ie_len=0 rsn_ie_len=20 caps=0x31 level=28 freq=2417
iwm0: skip - blacklisted (count=1 limit=0)
iwm0: 4: b6:12:42:67:d4:32 ssid='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' wpa_ie_len=0 rsn_ie_len=0 caps=0x31 level=84 freq=2457
iwm0: skip - SSID mismatch
iwm0: 5: 00:00:00:00:00:00 ssid='' wpa_ie_len=0 rsn_ie_len=0 caps=0x0 level=0 freq=5200
iwm0: skip - SSID not known
iwm0: No APs found - clear blacklist and try again
Removed BSSID bc:6e:64:88:25:0b from blacklist (clear)
iwm0: Selecting BSS from priority group 0
iwm0: 0: a4:12:42:67:d4:32 ssid='SWEETS3' wpa_ie_len=22 rsn_ie_len=0 caps=0x31 level=83 freq=2452
iwm0: skip - SSID mismatch
iwm0: 1: 10:6f:3f:28:dc:d5 ssid='' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 level=70 freq=5200
iwm0: skip - SSID not known
iwm0: 2: 10:6f:3f:28:dc:d4 ssid='SWEETS2' wpa_ie_len=26 rsn_ie_len=0 caps=0x31 level=51 freq=2417
iwm0: skip - SSID mismatch
iwm0: 3: bc:6e:64:88:25:0b ssid='xterm' wpa_ie_len=0 rsn_ie_len=20 caps=0x31 level=28 freq=2417
iwm0: selected based on RSN IE
iwm0: selected BSS bc:6e:64:88:25:0b ssid='xterm'
iwm0: Considering connect request: reassociate: 0 selected: bc:6e:64:88:25:0b bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x7d42cc919800 current_ssid=0x0
iwm0: Request association with bc:6e:64:88:25:0b
iwm0: Re-association to the same ESS
iwm0: Add radio work 'connect'@0x7d42cc9f2140
iwm0: First radio work item in the queue - schedule start immediately
iwm0: Starting radio work 'connect'@0x7d42cc9f2140 after 0.000007 second wait
iwm0: Trying to associate with bc:6e:64:88:25:0b (SSID='xterm' freq=2417 MHz)
iwm0: Cancelling scan request
iwm0: WPA: clearing own WPA/RSN IE
iwm0: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=0x7d42cc919800 try_opportunistic=0
RSN: Search for BSSID bc:6e:64:88:25:0b
RSN: No PMKSA cache entry found
iwm0: RSN: using IEEE 802.11i/D9.0
iwm0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
iwm0: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
iwm0: WPA: using GTK CCMP
iwm0: WPA: using PTK CCMP
iwm0: WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
iwm0: State: SCANNING -> ASSOCIATING
Limit connection to BSSID bc:6e:64:88:25:0b freq=2417 MHz based on scan results (bssid_set=0)
wpa_driver_bsd_associate: ssid 'xterm' wpa ie len 22 pairwise 16 group 16 key mgmt 2
wpa_driver_bsd_set_drop_unencrypted: enabled=1
wpa_driver_bsd_associate: set PRIVACY 1
iwm0: Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
iwm0: Event ASSOC (0) received
iwm0: State: ASSOCIATING -> ASSOCIATED
iwm0: Associated to a new BSS: BSSID=bc:6e:64:88:25:0b
iwm0: Associated with bc:6e:64:88:25:0b
iwm0: WPA: Association event - clear replay counter
iwm0: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
iwm0: Setting authentication timeout: 10 sec 0 usec
iwm0: Cancelling scan request
iwm0: RX EAPOL from bc:6e:64:88:25:0b
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 2e c8 a3 8c 60 5a df ac bc 47 ea ba fc 6a 77 a1 a2 0e 99 01 d3 c4 40 6b de b0 91 b4 53 00 97 93 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
iwm0: Setting authentication timeout: 10 sec 0 usec
iwm0: IEEE 802.1X RX: version=2 type=3 length=95
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 2e c8 a3 8c 60 5a df ac bc 47 ea ba fc 6a 77 a1 a2 0e 99 01 d3 c4 40 6b de b0 91 b4 53 00 97 93 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
iwm0: EAPOL-Key type=2
iwm0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
iwm0: key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 2e c8 a3 8c 60 5a df ac bc 47 ea ba fc 6a 77 a1 a2 0e 99 01 d3 c4 40 6b de b0 91 b4 53 00 97 93
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
iwm0: State: ASSOCIATED -> 4WAY_HANDSHAKE
iwm0: WPA: RX message 1 of 4-Way Handshake from bc:6e:64:88:25:0b (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
Get randomness: len=32 entropy=7
WPA: Renewed SNonce - hexdump(len=32): 9f e1 10 2d 8a cf 9b 55 10 ca 82 52 ad 93 b3 3f 8c 39 dc b2 ee 55 d3 af 59 e8 ae f3 d7 a9 4a 66
WPA: PTK derivation - A1=5c:e0:c5:a8:88:ab A2=bc:6e:64:88:25:0b
WPA: Nonce1 - hexdump(len=32): 9f e1 10 2d 8a cf 9b 55 10 ca 82 52 ad 93 b3 3f 8c 39 dc b2 ee 55 d3 af 59 e8 ae f3 d7 a9 4a 66
WPA: Nonce2 - hexdump(len=32): 2e c8 a3 8c 60 5a df ac bc 47 ea ba fc 6a 77 a1 a2 0e 99 01 d3 c4 40 6b de b0 91 b4 53 00 97 93
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
iwm0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 79 11 27 d2 5f 50 38 04 8c e4 49 ea e0 a2 7c c5
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 9f e1 10 2d 8a cf 9b 55 10 ca 82 52 ad 93 b3 3f 8c 39 dc b2 ee 55 d3 af 59 e8 ae f3 d7 a9 4a 66 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 79 11 27 d2 5f 50 38 04 8c e4 49 ea e0 a2 7c c5 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
iwm0: RX EAPOL from bc:6e:64:88:25:0b
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 2e c8 a3 8c 60 5a df ac bc 47 ea ba fc 6a 77 a1 a2 0e 99 01 d3 c4 40 6b de b0 91 b4 53 00 97 93 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
iwm0: IEEE 802.1X RX: version=2 type=3 length=95
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 2e c8 a3 8c 60 5a df ac bc 47 ea ba fc 6a 77 a1 a2 0e 99 01 d3 c4 40 6b de b0 91 b4 53 00 97 93 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
iwm0: EAPOL-Key type=2
iwm0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
iwm0: key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 2e c8 a3 8c 60 5a df ac bc 47 ea ba fc 6a 77 a1 a2 0e 99 01 d3 c4 40 6b de b0 91 b4 53 00 97 93
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
iwm0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
iwm0: WPA: RX message 1 of 4-Way Handshake from bc:6e:64:88:25:0b (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=5c:e0:c5:a8:88:ab A2=bc:6e:64:88:25:0b
WPA: Nonce1 - hexdump(len=32): 9f e1 10 2d 8a cf 9b 55 10 ca 82 52 ad 93 b3 3f 8c 39 dc b2 ee 55 d3 af 59 e8 ae f3 d7 a9 4a 66
WPA: Nonce2 - hexdump(len=32): 2e c8 a3 8c 60 5a df ac bc 47 ea ba fc 6a 77 a1 a2 0e 99 01 d3 c4 40 6b de b0 91 b4 53 00 97 93
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: KEK - hexdump(len=16): [REMOVED]
WPA: TK - hexdump(len=16): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
iwm0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 61 9d 96 62 a9 3b 2f c5 29 1d 92 9d c0 17 b8 b5
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 9f e1 10 2d 8a cf 9b 55 10 ca 82 52 ad 93 b3 3f 8c 39 dc b2 ee 55 d3 af 59 e8 ae f3 d7 a9 4a 66 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 61 9d 96 62 a9 3b 2f c5 29 1d 92 9d c0 17 b8 b5 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
iwm0: Event DISASSOC (1) received
iwm0: Disassociation notification
iwm0: CTRL-EVENT-DISCONNECTED bssid=bc:6e:64:88:25:0b reason=0
iwm0: WPA: 4-Way Handshake failed - pre-shared key may be incorrect
iwm0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="xterm" auth_failures=2 duration=20 reason=WRONG_KEY
iwm0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=7)
iwm0: Setting scan request: 0.100000 sec
iwm0: Radio work 'connect'@0x7d42cc9f2140 done in 1.159002 seconds
iwm0: radio_work_free('connect'@0x7d42cc9f2140: num_active_works --> 0
Added BSSID bc:6e:64:88:25:0b into blacklist
iwm0: Blacklist count 2 --> request scan in 500 ms
iwm0: Ignore new scan request for 0.500000 sec since an earlier request is scheduled to trigger sooner
iwm0: WPA: Clear old PMK and PTK
iwm0: Disconnect event - remove keys
iwm0: State: 4WAY_HANDSHAKE -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
iwm0: State: DISCONNECTED -> SCANNING
iwm0: Starting AP scan for wildcard SSID
iwm0: Add radio work 'scan'@0x7d42cc9f2140
iwm0: First radio work item in the queue - schedule start immediately
iwm0: Starting radio work 'scan'@0x7d42cc9f2140 after 0.000025 second wait
wpa_driver_bsd_set_wpa: enabled=1
wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
EAPOL: startWhen --> 0
EAPOL: disable timer tick
^Ciwm0: Removing interface iwm0
iwm0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=SCANNING
iwm0: State: SCANNING -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_bsd_set_countermeasures: enabled=0
iwm0: WPA: Clear old PMK and PTK
Removed BSSID bc:6e:64:88:25:0b from blacklist (clear)
iwm0: BSS: Remove id 0 BSSID a4:12:42:67:d4:32 SSID 'SWEETS3' due to wpa_bss_flush
iwm0: BSS: Remove id 1 BSSID 10:6f:3f:28:dc:d5 SSID '' due to wpa_bss_flush
iwm0: BSS: Remove id 2 BSSID 10:6f:3f:28:dc:d4 SSID 'SWEETS2' due to wpa_bss_flush
iwm0: BSS: Remove id 3 BSSID bc:6e:64:88:25:0b SSID 'xterm' due to wpa_bss_flush
iwm0: BSS: Remove id 4 BSSID b6:12:42:67:d4:32 SSID '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' due to wpa_bss_flush
iwm0: BSS: Remove id 5 BSSID 00:00:00:00:00:00 SSID '' due to wpa_bss_flush
iwm0: Cancelling scan request
iwm0: Cancelling authentication timeout
Remove interface iwm0 from radio
iwm0: Remove radio work 'scan'@0x7d42cc9f2140 (started)
iwm0: radio_work_free('scan'@0x7d42cc9f2140: num_active_works --> 0
Remove radio
wpa_driver_bsd_set_wpa: enabled=0
wpa_driver_bsd_set_wpa_internal: wpa=0 privacy=0
wpa_driver_bsd_set_wpa_internal: wpa=0 privacy=0
iwm0: CTRL-EVENT-TERMINATING
> Regards,
> --
> Kimihiro Nonaka
--
Ryo ONODERA // ryo_on%yk.rim.or.jp@localhost
PGP fingerprint = 82A2 DC91 76E0 A10A 8ABB FD1B F404 27FA C7D1 15F3
Home |
Main Index |
Thread Index |
Old Index