NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: port-i386/59908: NOCARRIER_ROAMING wifi dissociation loop on NetBSD11-beta/i386



The following reply was made to PR port-i386/59908; it has been noted by GNATS.

From: "requiem." <rqm%0xde501a7a.net@localhost>
To: gnats-bugs%netbsd.org@localhost
Cc: 
Subject: Re: port-i386/59908: NOCARRIER_ROAMING wifi dissociation loop on
 NetBSD11-beta/i386
Date: Fri, 16 Jan 2026 00:14:22 +0000

 --MP_/SH=kq2FY5Z__V=+.bJB5vxi
 Content-Type: text/plain; charset=US-ASCII
 Content-Transfer-Encoding: 7bit
 Content-Disposition: inline
 
 On Sun, 11 Jan 2026 23:30:00 +0000 (UTC)
 gnats-admin%netbsd.org@localhost wrote:
 
 > Thank you very much for your problem report.
 > It has the internal identification `port-i386/59908'.
 > The individual assigned to look at your
 > report is: port-i386-maintainer. 
 > 
 > >Category:       port-i386
 > >Responsible:    port-i386-maintainer
 > >Synopsis:       NOCARRIER_ROAMING wifi dissociation loop on
 > >NetBSD11-beta/i386 Arrival-Date:   Sun Jan 11 23:30:00 +0000 2026  
 > 
 
 After some discussion of a similar-looking issue upon the suggestion of
 Michael van Elst I tried connecting with dhcpcd disabled. 
 
 It yielded some different logs, but no connection was made. Attached
 is a redacted verbose log from wpa_supplicant on the latest
 NetBSD11-beta for i386.
 
 It is far from my expertise but to my eyes it looks like before it
 starts to disconnect it enters the 4-way handshake and then drops
 out around stage 3 with some kind of a mismatch:
 
 > athn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key msg
 > 3/4
 
 
 --MP_/SH=kq2FY5Z__V=+.bJB5vxi
 Content-Type: text/x-log
 Content-Transfer-Encoding: 7bit
 Content-Disposition: attachment;
  filename=wpa_supplicant_athn0-NetBSD11-beta-i386-2015-01-15.log
 
 wpa_supplicant v2.11
 Successfully initialized wpa_supplicant
 Initializing interface 'athn0' conf '/etc/wpa_supplicant.conf' driver 'bsd' ctrl_interface 'N/A' bridge 'N/A'
 Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
 Reading configuration file '/etc/wpa_supplicant.conf'
 ctrl_interface='/var/run/wpa_supplicant'
 ctrl_interface_group='wheel'
 update_config=1
 Priority group 0
    id=0 ssid='MYWIFI'
 Add interface athn0 to a new radio N/A
 athn0: Failed to attach pkt_type filter
 athn0: Own MAC address: xx:xx:xx:xx:a9:b1
 bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0
 bsd_del_key: key_idx=0
 bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0
 bsd_del_key: key_idx=1
 bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0
 bsd_del_key: key_idx=2
 bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0
 bsd_del_key: key_idx=3
 bsd_set_key: alg=0 addr=0x0 key_idx=4 set_tx=0 seq_len=0 key_len=0
 bsd_del_key: key_idx=4
 ioctl[SIOCS80211, op=20, val=0, arg_len=7]: Invalid argument
 bsd_set_key: alg=0 addr=0x0 key_idx=5 set_tx=0 seq_len=0 key_len=0
 bsd_del_key: key_idx=5
 ioctl[SIOCS80211, op=20, val=0, arg_len=7]: Invalid argument
 wpa_driver_bsd_set_countermeasures: enabled=0
 athn0: RSN: flushing PMKID list in the driver
 athn0: Setting scan request: 0.100000 sec
 ENGINE: Loading builtin engines
 ENGINE: Loading builtin engines
 EAPOL: SUPP_PAE entering state DISCONNECTED
 EAPOL: Supplicant port status: Unauthorized
 EAPOL: KEY_RX entering state NO_KEY_RECEIVE
 EAPOL: SUPP_BE entering state INITIALIZE
 EAP: EAP entering state DISABLED
 Using existing control interface directory.
 ctrl_interface_group=0 (from group name 'wheel')
 athn0: Added interface athn0
 athn0: State: DISCONNECTED -> DISCONNECTED
 athn0: State: DISCONNECTED -> SCANNING
 athn0: Starting AP scan for wildcard SSID
 athn0: Add radio work 'scan'@0xacec3f40
 athn0: First radio work item in the queue - schedule start immediately
 athn0: Starting radio work 'scan'@0xacec3f40 after 0.000028 second wait
 wpa_driver_bsd_set_wpa: enabled=1
 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 EAPOL: disable timer tick
 athn0: Event SCAN_RESULTS (3) received
 Received 2100 bytes of scan results (26 BSSes)
 athn0: BSS: Start scan result update 1
 athn0: BSS: Add new id 0 xx:xx:xx:xx:3b:45 SSID 'MYWIFI' freq 5180
 athn0: BSS: Add new id 1 xx:xx:xx:xx:3b:43 SSID '' freq 5180
 athn0: BSS: Add new id 2 xx:xx:xx:xx:3b:44 SSID '' freq 2412
 athn0: BSS: Add new id 3 xx:xx:xx:xx:3b:46 SSID 'MYWIFI' freq 2412
 athn0: BSS: Add new id 4 xx:xx:xx:xx:a4:a3 SSID '' freq 5180
 athn0: BSS: Add new id 5 xx:xx:xx:xx:a4:a5 SSID 'MYWIFI' freq 5180
 athn0: BSS: Add new id 6 xx:xx:xx:xx:a4:a4 SSID '' freq 2412
 athn0: BSS: Add new id 7 xx:xx:xx:xx:a4:a6 SSID 'MYWIFI' freq 2412
 athn0: BSS: Add new id 8 xx:xx:xx:xx:a5:26 SSID 'MYWIFI' freq 2412
 athn0: BSS: Add new id 9 xx:xx:xx:xx:a5:24 SSID '' freq 2412
 athn0: BSS: Add new id 10 xx:xx:xx:xx:a5:25 SSID 'MYWIFI' freq 5180
 athn0: BSS: Add new id 11 xx:xx:xx:xx:a5:23 SSID '' freq 5180
 athn0: BSS: Add new id 12 xx:xx:xx:xx:05:62 SSID '' freq 2412
 athn0: BSS: Add new id 13 xx:xx:xx:xx:23:64 SSID '' freq 2412
 athn0: BSS: Add new id 14 xx:xx:xx:xx:05:63 SSID '' freq 5180
 athn0: BSS: Add new id 15 xx:xx:xx:xx:23:66 SSID 'MYWIFI' freq 2412
 athn0: BSS: Add new id 16 xx:xx:xx:xx:23:65 SSID 'MYWIFI' freq 5180
 athn0: BSS: Add new id 17 xx:xx:xx:xx:23:63 SSID '' freq 5180
 athn0: BSS: Add new id 18 xx:xx:xx:xx:3b:47 SSID '' freq 5180
 athn0: BSS: Add new id 19 xx:xx:xx:xx:3b:48 SSID '' freq 2412
 athn0: BSS: Add new id 20 xx:xx:xx:xx:a4:a7 SSID '' freq 5180
 athn0: BSS: Add new id 21 xx:xx:xx:xx:a4:a8 SSID '' freq 2412
 athn0: BSS: Add new id 22 xx:xx:xx:xx:a5:28 SSID '' freq 2412
 athn0: BSS: Add new id 23 xx:xx:xx:xx:a5:27 SSID '' freq 5180
 athn0: BSS: Add new id 24 xx:xx:xx:xx:23:68 SSID '' freq 2412
 athn0: BSS: Add new id 25 xx:xx:xx:xx:23:67 SSID '' freq 5180
 BSS: last_scan_res_used=26/32
 athn0: New scan results available (own=0 ext=0)
 athn0: Radio work 'scan'@0xacec3f40 done in 7.626212 seconds
 athn0: radio_work_free('scan'@0xacec3f40): num_active_works --> 0
 athn0: Selecting BSS from priority group 0
 athn0: 0: xx:xx:xx:xx:3b:45 ssid='MYWIFI' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=65 freq=5180 
 athn0:    selected based on RSN IE
 athn0: MLD: No Multi-Link element
 athn0:    selected BSS xx:xx:xx:xx:3b:45 ssid='MYWIFI'
 athn0: Considering connect request: reassociate: 0  selected: xx:xx:xx:xx:3b:45  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING  ssid=0xad049000  current_ssid=0x0
 athn0: Request association with xx:xx:xx:xx:3b:45
 athn0: No ongoing scan/p2p-scan found to abort
 athn0: Add radio work 'connect'@0xacec3f40
 athn0: First radio work item in the queue - schedule start immediately
 athn0: Starting radio work 'connect'@0xacec3f40 after 0.000079 second wait
 athn0: WPA: clearing own WPA/RSN IE
 athn0: RSN: clearing own RSNXE
 RSN: PMKSA cache search - network_ctx=0xad049000 try_opportunistic=0 akmp=0x0
 RSN: Search for xx:xx:xx:xx:3b:45
 RSN: No PMKSA cache entry found
 athn0: RSN: using IEEE 802.11i/D9.0
 athn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
 athn0: WPA: Selected mgmt group cipher 32
 athn0: WPA: clearing AP WPA IE
 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 08 8c 00
 athn0: WPA: clearing AP RSNXE
 athn0: WPA: AP group 0x10 network profile group 0x18; available group 0x10
 athn0: WPA: using GTK CCMP
 athn0: WPA: AP pairwise 0x10 network profile pairwise 0x18; available pairwise 0x10
 athn0: WPA: using PTK CCMP
 athn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available key_mgmt 0x2
 athn0: WPA: using KEY_MGMT WPA-PSK
 athn0: WPA: AP mgmt_group_cipher 0x20 network profile mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0
 athn0: WPA: not using MGMT group cipher
 WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
 RSN: Set own RSNXE default - hexdump(len=0):
 WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
 athn0: Automatic auth_alg selection: 0x1
 No supported operating classes IE to add
 athn0: Trying to associate with xx:xx:xx:xx:3b:45 (SSID='MYWIFI' freq=5180 MHz)
 athn0: Cancelling scan request
 athn0: State: SCANNING -> ASSOCIATING
 Limit connection to xx:xx:xx:xx:3b:45 freq=5180 MHz based on scan results (bssid_set=0 wps=0)
 wpa_driver_bsd_associate: ssid 'MYWIFI' wpa ie len 22 pairwise 16 group 16 key mgmt 2
 wpa_driver_bsd_set_drop_unencrypted: enabled=1
 wpa_driver_bsd_associate: set PRIVACY 1
 athn0: Setting authentication timeout: 10 sec 0 usec
 EAPOL: External notification - EAP success=0
 EAPOL: External notification - EAP fail=0
 EAPOL: External notification - portControl=Auto
 athn0: Event ASSOC (0) received
 athn0: State: ASSOCIATING -> ASSOCIATED
 athn0: Associated to a new BSS: BSSID=xx:xx:xx:xx:3b:45
 athn0: Associated with xx:xx:xx:xx:3b:45
 athn0: WPA: Association event - clear replay counter
 athn0: WPA: Clear old PTK
 EAPOL: External notification - portEnabled=0
 EAPOL: External notification - portValid=0
 EAPOL: External notification - EAP success=0
 EAPOL: External notification - portEnabled=1
 EAPOL: SUPP_PAE entering state CONNECTING
 EAPOL: enable timer tick
 EAPOL: SUPP_BE entering state IDLE
 athn0: Setting authentication timeout: 10 sec 0 usec
 athn0: Cancelling scan request
 athn0: RX EAPOL from xx:xx:xx:xx:3b:45 (encrypted=-1)
 athn0: Setting authentication timeout: 10 sec 0 usec
 athn0: IEEE 802.1X RX: version=2 type=3 length=95
 athn0:   EAPOL-Key type=2
 athn0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
 athn0:   key_length=16 key_data_length=0
   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
   key_nonce - hexdump(len=32): 57 [...] e6
   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 athn0: WPA: RX message 1 of 4-Way Handshake from xx:xx:xx:xx:3b:45 (ver=2)
 RSN: msg 1/4 key data - hexdump(len=0):
 athn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
 WPA: Renewed SNonce - hexdump(len=32): a4 [...] 79
 WPA: PTK derivation using PRF(SHA1)
 WPA: PTK derivation - A1=xx:xx:xx:xx:a9:b1 A2=xx:xx:xx:xx:3b:45
 WPA: Nonce1 - hexdump(len=32): a4 [...] 79
 WPA: Nonce2 - hexdump(len=32): 57 [...]  e6
 WPA: PMK - hexdump(len=32): [REMOVED]
 WPA: PTK - hexdump(len=48): [REMOVED]
 WPA: KCK - hexdump(len=16): [REMOVED]
 WPA: KEK - hexdump(len=16): [REMOVED]
 WPA: TK - hexdump(len=16): [REMOVED]
 WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
 athn0: WPA: Sending EAPOL-Key 2/4
 WPA: Send EAPOL-Key frame to xx:xx:xx:xx:3b:45 ver=2 mic_len=16 key_mgmt=0x2
 WPA: EAPOL-Key MIC using HMAC-SHA1
 WPA: KCK - hexdump(len=16): [REMOVED]
 WPA: Derived Key MIC - hexdump(len=16): bf 91 16 34 91 ff aa 2f 63 ea 11 e2 25 b8 0e 9d
 athn0: RX EAPOL from xx:xx:xx:xx:3b:45 (encrypted=-1)
 athn0: IEEE 802.1X RX: version=2 type=3 length=159
 athn0:   EAPOL-Key type=2
 athn0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
 athn0:   key_length=16 key_data_length=64
   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
   key_nonce - hexdump(len=32): 57 [...] e6
   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_mic - hexdump(len=16): fb f8 4b 83 d1 a3 fc d5 01 c8 43 73 28 6d 14 00
 WPA: EAPOL-Key MIC using HMAC-SHA1
 RSN: encrypted key data - hexdump(len=64): b9 [...] e7
 WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
 WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
 athn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
 athn0: RSN: RX message 3 of 4-Way Handshake from xx:xx:xx:xx:3b:45 (ver=2)
 WPA: IE KeyData - hexdump(len=56): 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 08 8c 00 f4 01 20 dd 16 00 0f ac 01 01 00 14 9f 38 41 d2 18 30 9e 07 77 dd 44 b4 87 dd f0 dd 00 00
 WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 08 8c 00
 WPA: RSNXE in EAPOL-Key - hexdump(len=3): f4 01 20
 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
 athn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key msg 3/4
 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
 RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): f4 01 20
 athn0: Request to deauthenticate - bssid=xx:xx:xx:xx:3b:45 pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS) state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 bsd_send_mlme_param: op=3 reason=17 addr=xx:xx:xx:xx:3b:45
 athn0: Event DEAUTH (11) received
 athn0: Deauthentication notification
 athn0:  * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
 Deauthentication frame IE(s) - hexdump(len=0): [NULL]
 athn0: CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:xx:3b:45 reason=17 locally_generated=1
 athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=7)
 athn0: Setting scan request: 0.100000 sec
 athn0: Radio work 'connect'@0xacec3f40 done in 0.070920 seconds
 athn0: radio_work_free('connect'@0xacec3f40): num_active_works --> 0
 athn0: Added xx:xx:xx:xx:3b:45 into ignore list, ignoring for 10 seconds
 athn0: Another BSS in this ESS has been seen; try it next
 athn0: xx:xx:xx:xx:3b:45 ignore list count incremented to 2, ignoring for 10 seconds
 athn0: Consecutive connection failures: 1 --> request scan in 100 ms
 athn0: Ignore new scan request for 0.100000 sec since an earlier request is scheduled to trigger sooner
 athn0: WPA: Clear old PMK and PTK
 athn0: Disconnect event - remove keys
 athn0: State: 4WAY_HANDSHAKE -> DISCONNECTED
 EAPOL: External notification - portEnabled=0
 EAPOL: SUPP_PAE entering state DISCONNECTED
 EAPOL: Supplicant port status: Unauthorized
 EAPOL: SUPP_BE entering state INITIALIZE
 EAPOL: External notification - portValid=0
 EAPOL: External notification - EAP success=0
 athn0: State: DISCONNECTED -> DISCONNECTED
 EAPOL: External notification - portEnabled=0
 EAPOL: External notification - portValid=0
 QM: Clear all active DSCP policies
 athn0: CTRL-EVENT-DSCP-POLICY clear_all
 athn0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner
 athn0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED) state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 athn0: State: DISCONNECTED -> DISCONNECTED
 EAPOL: External notification - portEnabled=0
 EAPOL: External notification - portValid=0
 QM: Clear all active DSCP policies
 athn0: CTRL-EVENT-DSCP-POLICY clear_all
 athn0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner
 athn0: Event DISASSOC (1) received
 athn0: Disassociation notification
 athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
 athn0: Do not request new immediate scan
 athn0: WPA: Clear old PMK and PTK
 athn0: Disconnect event - remove keys
 athn0: State: DISCONNECTED -> DISCONNECTED
 EAPOL: External notification - portEnabled=0
 EAPOL: External notification - portValid=0
 athn0: State: DISCONNECTED -> SCANNING
 athn0: Starting AP scan for wildcard SSID
 athn0: Optimize scan based on previously generated frequency list
 athn0: Add radio work 'scan'@0xacec3f40
 athn0: First radio work item in the queue - schedule start immediately
 athn0: Starting radio work 'scan'@0xacec3f40 after 0.002120 second wait
 wpa_driver_bsd_set_wpa: enabled=1
 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 EAPOL: startWhen --> 0
 EAPOL: disable timer tick
 athn0: Event SCAN_RESULTS (3) received
 Received 2100 bytes of scan results (26 BSSes)
 athn0: BSS: Start scan result update 2
 BSS: last_scan_res_used=26/32
 athn0: New scan results available (own=0 ext=0)
 athn0: Radio work 'scan'@0xacec3f40 done in 7.751528 seconds
 athn0: radio_work_free('scan'@0xacec3f40): num_active_works --> 0
 athn0: Selecting BSS from priority group 0
 athn0: 0: xx:xx:xx:xx:3b:43 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x10 level=70 freq=5180 
 athn0:    skip - SSID not known
 athn0: 1: xx:xx:xx:xx:3b:45 ssid='MYWIFI' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=69 freq=5180 
 athn0:    skip - BSSID ignored (count=2 limit=0)
 athn0: 2: xx:xx:xx:xx:3b:44 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x10 level=61 freq=2412 
 athn0:    skip - SSID not known
 athn0: 3: xx:xx:xx:xx:3b:46 ssid='MYWIFI' wpa_ie_len=0 rsn_ie_len=24 caps=0x31 level=59 freq=2412 
 athn0:    selected based on RSN IE
 athn0: MLD: No Multi-Link element
 athn0:    selected BSS xx:xx:xx:xx:3b:46 ssid='MYWIFI'
 athn0: Considering connect request: reassociate: 0  selected: xx:xx:xx:xx:3b:46  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING  ssid=0xad049000  current_ssid=0x0
 athn0: Request association with xx:xx:xx:xx:3b:46
 athn0: Re-association to the same ESS
 athn0: No ongoing scan/p2p-scan found to abort
 athn0: Add radio work 'connect'@0xacec3f40
 athn0: First radio work item in the queue - schedule start immediately
 athn0: Starting radio work 'connect'@0xacec3f40 after 0.000300 second wait
 athn0: WPA: clearing own WPA/RSN IE
 athn0: RSN: clearing own RSNXE
 RSN: PMKSA cache search - network_ctx=0xad049000 try_opportunistic=0 akmp=0x0
 RSN: Search for xx:xx:xx:xx:3b:46
 RSN: No PMKSA cache entry found
 athn0: RSN: using IEEE 802.11i/D9.0
 athn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
 athn0: WPA: Selected mgmt group cipher 32
 athn0: WPA: clearing AP WPA IE
 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 08 8c 00
 athn0: WPA: clearing AP RSNXE
 athn0: WPA: AP group 0x10 network profile group 0x18; available group 0x10
 athn0: WPA: using GTK CCMP
 athn0: WPA: AP pairwise 0x10 network profile pairwise 0x18; available pairwise 0x10
 athn0: WPA: using PTK CCMP
 athn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available key_mgmt 0x2
 athn0: WPA: using KEY_MGMT WPA-PSK
 athn0: WPA: AP mgmt_group_cipher 0x20 network profile mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0
 athn0: WPA: not using MGMT group cipher
 WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
 RSN: Set own RSNXE default - hexdump(len=0):
 WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
 athn0: Automatic auth_alg selection: 0x1
 No supported operating classes IE to add
 athn0: Trying to associate with xx:xx:xx:xx:3b:46 (SSID='MYWIFI' freq=2412 MHz)
 athn0: Cancelling scan request
 athn0: State: SCANNING -> ASSOCIATING
 Limit connection to xx:xx:xx:xx:3b:46 freq=2412 MHz based on scan results (bssid_set=0 wps=0)
 wpa_driver_bsd_associate: ssid 'MYWIFI' wpa ie len 22 pairwise 16 group 16 key mgmt 2
 wpa_driver_bsd_set_drop_unencrypted: enabled=1
 wpa_driver_bsd_associate: set PRIVACY 1
 athn0: Setting authentication timeout: 10 sec 0 usec
 EAPOL: External notification - EAP success=0
 EAPOL: External notification - EAP fail=0
 EAPOL: External notification - portControl=Auto
 athn0: Event ASSOC (0) received
 athn0: State: ASSOCIATING -> ASSOCIATED
 athn0: Associated to a new BSS: BSSID=xx:xx:xx:xx:3b:46
 athn0: Associated with xx:xx:xx:xx:3b:46
 athn0: WPA: Association event - clear replay counter
 athn0: WPA: Clear old PTK
 EAPOL: External notification - portEnabled=0
 EAPOL: External notification - portValid=0
 EAPOL: External notification - EAP success=0
 EAPOL: External notification - portEnabled=1
 EAPOL: SUPP_PAE entering state CONNECTING
 EAPOL: enable timer tick
 EAPOL: SUPP_BE entering state IDLE
 athn0: Setting authentication timeout: 10 sec 0 usec
 athn0: Cancelling scan request
 athn0: RX EAPOL from xx:xx:xx:xx:3b:46 (encrypted=-1)
 athn0: Setting authentication timeout: 10 sec 0 usec
 athn0: IEEE 802.1X RX: version=2 type=3 length=95
 athn0:   EAPOL-Key type=2
 athn0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
 athn0:   key_length=16 key_data_length=0
   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
   key_nonce - hexdump(len=32): 62 [...]  5a
   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 athn0: WPA: RX message 1 of 4-Way Handshake from xx:xx:xx:xx:3b:46 (ver=2)
 RSN: msg 1/4 key data - hexdump(len=0):
 athn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
 WPA: Renewed SNonce - hexdump(len=32): fd [...] 4b
 WPA: PTK derivation using PRF(SHA1)
 WPA: PTK derivation - A1=xx:xx:xx:xx:a9:b1 A2=xx:xx:xx:xx:3b:46
 WPA: Nonce1 - hexdump(len=32): fd [...] 4b
 WPA: Nonce2 - hexdump(len=32): 62 [...] 5a
 WPA: PMK - hexdump(len=32): [REMOVED]
 WPA: PTK - hexdump(len=48): [REMOVED]
 WPA: KCK - hexdump(len=16): [REMOVED]
 WPA: KEK - hexdump(len=16): [REMOVED]
 WPA: TK - hexdump(len=16): [REMOVED]
 WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
 athn0: WPA: Sending EAPOL-Key 2/4
 WPA: Send EAPOL-Key frame to xx:xx:xx:xx:3b:46 ver=2 mic_len=16 key_mgmt=0x2
 WPA: EAPOL-Key MIC using HMAC-SHA1
 WPA: KCK - hexdump(len=16): [REMOVED]
 WPA: Derived Key MIC - hexdump(len=16): 95 74 18 b7 ee a9 95 1e 07 36 e3 73 e4 63 98 a0
 athn0: RX EAPOL from xx:xx:xx:xx:3b:46 (encrypted=-1)
 athn0: IEEE 802.1X RX: version=2 type=3 length=159
 athn0:   EAPOL-Key type=2
 athn0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
 athn0:   key_length=16 key_data_length=64
   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
   key_nonce - hexdump(len=32): 62 [...] 5a
   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_mic - hexdump(len=16): c7 e5 6d 2d 46 f5 55 31 91 0a 2d 91 98 c2 20 2c
 WPA: EAPOL-Key MIC using HMAC-SHA1
 RSN: encrypted key data - hexdump(len=64): c6 [...] 06
 WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
 WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
 athn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
 athn0: RSN: RX message 3 of 4-Way Handshake from xx:xx:xx:xx:3b:46 (ver=2)
 WPA: IE KeyData - hexdump(len=56): 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 08 8c 00 f4 01 20 dd 16 00 0f ac 01 01 00 29 96 87 83 8e 9d 79 74 40 9c 6b f4 29 ab 82 80 dd 00 00
 WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 08 8c 00
 WPA: RSNXE in EAPOL-Key - hexdump(len=3): f4 01 20
 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
 athn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key msg 3/4
 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
 RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): f4 01 20
 athn0: Request to deauthenticate - bssid=xx:xx:xx:xx:3b:46 pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS) state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 bsd_send_mlme_param: op=3 reason=17 addr=xx:xx:xx:xx:3b:46
 athn0: Event DEAUTH (11) received
 athn0: Deauthentication notification
 athn0:  * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
 Deauthentication frame IE(s) - hexdump(len=0): [NULL]
 athn0: CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:xx:3b:46 reason=17 locally_generated=1
 athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=7)
 athn0: Setting scan request: 0.100000 sec
 athn0: Radio work 'connect'@0xacec3f40 done in 0.071402 seconds
 athn0: radio_work_free('connect'@0xacec3f40): num_active_works --> 0
 athn0: Added xx:xx:xx:xx:3b:46 into ignore list, ignoring for 10 seconds
 athn0: Another BSS in this ESS has been seen; try it next
 athn0: xx:xx:xx:xx:3b:46 ignore list count incremented to 2, ignoring for 10 seconds
 athn0: Consecutive connection failures: 2 --> request scan in 500 ms
 athn0: Ignore new scan request for 0.500000 sec since an earlier request is scheduled to trigger sooner
 athn0: WPA: Clear old PMK and PTK
 athn0: Disconnect event - remove keys
 athn0: State: 4WAY_HANDSHAKE -> DISCONNECTED
 EAPOL: External notification - portEnabled=0
 EAPOL: SUPP_PAE entering state DISCONNECTED
 EAPOL: Supplicant port status: Unauthorized
 EAPOL: SUPP_BE entering state INITIALIZE
 EAPOL: External notification - portValid=0
 EAPOL: External notification - EAP success=0
 athn0: State: DISCONNECTED -> DISCONNECTED
 EAPOL: External notification - portEnabled=0
 EAPOL: External notification - portValid=0
 QM: Clear all active DSCP policies
 athn0: CTRL-EVENT-DSCP-POLICY clear_all
 athn0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner
 athn0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED) state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 athn0: State: DISCONNECTED -> DISCONNECTED
 EAPOL: External notification - portEnabled=0
 EAPOL: External notification - portValid=0
 QM: Clear all active DSCP policies
 athn0: CTRL-EVENT-DSCP-POLICY clear_all
 athn0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner
 athn0: Event DISASSOC (1) received
 athn0: Disassociation notification
 athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
 athn0: Do not request new immediate scan
 athn0: WPA: Clear old PMK and PTK
 athn0: Disconnect event - remove keys
 athn0: State: DISCONNECTED -> DISCONNECTED
 EAPOL: External notification - portEnabled=0
 EAPOL: External notification - portValid=0
 athn0: State: DISCONNECTED -> SCANNING
 athn0: Starting AP scan for wildcard SSID
 athn0: Optimize scan based on previously generated frequency list
 athn0: Add radio work 'scan'@0xacec3f40
 athn0: First radio work item in the queue - schedule start immediately
 athn0: Starting radio work 'scan'@0xacec3f40 after 0.002100 second wait
 wpa_driver_bsd_set_wpa: enabled=1
 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 EAPOL: startWhen --> 0
 EAPOL: disable timer tick
 athn0: Event SCAN_RESULTS (3) received
 Received 2100 bytes of scan results (26 BSSes)
 athn0: BSS: Start scan result update 3
 BSS: last_scan_res_used=26/32
 athn0: New scan results available (own=0 ext=0)
 athn0: Radio work 'scan'@0xacec3f40 done in 7.748095 seconds
 athn0: radio_work_free('scan'@0xacec3f40): num_active_works --> 0
 athn0: Selecting BSS from priority group 0
 athn0: 0: xx:xx:xx:xx:3b:43 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x10 level=71 freq=5180 
 athn0:    skip - SSID not known
 athn0: 1: xx:xx:xx:xx:3b:45 ssid='MYWIFI' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=65 freq=5180 
 athn0:    selected based on RSN IE
 athn0: MLD: No Multi-Link element
 athn0:    selected BSS xx:xx:xx:xx:3b:45 ssid='MYWIFI'
 athn0: Considering connect request: reassociate: 0  selected: xx:xx:xx:xx:3b:45  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING  ssid=0xad049000  current_ssid=0x0
 athn0: Request association with xx:xx:xx:xx:3b:45
 athn0: Re-association to the same ESS
 athn0: No ongoing scan/p2p-scan found to abort
 athn0: Add radio work 'connect'@0xacec3f40
 athn0: First radio work item in the queue - schedule start immediately
 athn0: Starting radio work 'connect'@0xacec3f40 after 0.001937 second wait
 athn0: WPA: clearing own WPA/RSN IE
 athn0: RSN: clearing own RSNXE
 RSN: PMKSA cache search - network_ctx=0xad049000 try_opportunistic=0 akmp=0x0
 RSN: Search for xx:xx:xx:xx:3b:45
 RSN: No PMKSA cache entry found
 athn0: RSN: using IEEE 802.11i/D9.0
 athn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
 athn0: WPA: Selected mgmt group cipher 32
 athn0: WPA: clearing AP WPA IE
 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 08 8c 00
 athn0: WPA: clearing AP RSNXE
 athn0: WPA: AP group 0x10 network profile group 0x18; available group 0x10
 athn0: WPA: using GTK CCMP
 athn0: WPA: AP pairwise 0x10 network profile pairwise 0x18; available pairwise 0x10
 athn0: WPA: using PTK CCMP
 athn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available key_mgmt 0x2
 athn0: WPA: using KEY_MGMT WPA-PSK
 athn0: WPA: AP mgmt_group_cipher 0x20 network profile mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0
 athn0: WPA: not using MGMT group cipher
 WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
 RSN: Set own RSNXE default - hexdump(len=0):
 WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
 athn0: Automatic auth_alg selection: 0x1
 No supported operating classes IE to add
 athn0: Trying to associate with xx:xx:xx:xx:3b:45 (SSID='MYWIFI' freq=5180 MHz)
 athn0: Cancelling scan request
 athn0: State: SCANNING -> ASSOCIATING
 Limit connection to xx:xx:xx:xx:3b:45 freq=5180 MHz based on scan results (bssid_set=0 wps=0)
 wpa_driver_bsd_associate: ssid 'MYWIFI' wpa ie len 22 pairwise 16 group 16 key mgmt 2
 wpa_driver_bsd_set_drop_unencrypted: enabled=1
 wpa_driver_bsd_associate: set PRIVACY 1
 athn0: Setting authentication timeout: 10 sec 0 usec
 EAPOL: External notification - EAP success=0
 EAPOL: External notification - EAP fail=0
 EAPOL: External notification - portControl=Auto
 athn0: Event ASSOC (0) received
 athn0: State: ASSOCIATING -> ASSOCIATED
 athn0: Associated to a new BSS: BSSID=xx:xx:xx:xx:3b:45
 athn0: Associated with xx:xx:xx:xx:3b:45
 athn0: WPA: Association event - clear replay counter
 athn0: WPA: Clear old PTK
 EAPOL: External notification - portEnabled=0
 EAPOL: External notification - portValid=0
 EAPOL: External notification - EAP success=0
 EAPOL: External notification - portEnabled=1
 EAPOL: SUPP_PAE entering state CONNECTING
 EAPOL: enable timer tick
 EAPOL: SUPP_BE entering state IDLE
 athn0: Setting authentication timeout: 10 sec 0 usec
 athn0: Cancelling scan request
 athn0: RX EAPOL from xx:xx:xx:xx:3b:45 (encrypted=-1)
 athn0: Setting authentication timeout: 10 sec 0 usec
 athn0: IEEE 802.1X RX: version=2 type=3 length=95
 athn0:   EAPOL-Key type=2
 athn0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
 athn0:   key_length=16 key_data_length=0
   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
   key_nonce - hexdump(len=32): 30 [...] 7a
   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 athn0: WPA: RX message 1 of 4-Way Handshake from xx:xx:xx:xx:3b:45 (ver=2)
 RSN: msg 1/4 key data - hexdump(len=0):
 athn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
 WPA: Renewed SNonce - hexdump(len=32): 9e [...] 63
 WPA: PTK derivation using PRF(SHA1)
 WPA: PTK derivation - A1=xx:xx:xx:xx:a9:b1 A2=xx:xx:xx:xx:3b:45
 WPA: Nonce1 - hexdump(len=32): 9e [...] 63
 WPA: Nonce2 - hexdump(len=32): 30 [...] 7a
 WPA: PMK - hexdump(len=32): [REMOVED]
 WPA: PTK - hexdump(len=48): [REMOVED]
 WPA: KCK - hexdump(len=16): [REMOVED]
 WPA: KEK - hexdump(len=16): [REMOVED]
 WPA: TK - hexdump(len=16): [REMOVED]
 WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
 athn0: WPA: Sending EAPOL-Key 2/4
 WPA: Send EAPOL-Key frame to xx:xx:xx:xx:3b:45 ver=2 mic_len=16 key_mgmt=0x2
 WPA: EAPOL-Key MIC using HMAC-SHA1
 WPA: KCK - hexdump(len=16): [REMOVED]
 WPA: Derived Key MIC - hexdump(len=16): fb 74 17 49 46 4c 0b 8a 3c 1a 69 81 fd 3a 82 f1
 athn0: RX EAPOL from xx:xx:xx:xx:3b:45 (encrypted=-1)
 athn0: IEEE 802.1X RX: version=2 type=3 length=159
 athn0:   EAPOL-Key type=2
 athn0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
 athn0:   key_length=16 key_data_length=64
   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
   key_nonce - hexdump(len=32): 30 [...] 7a
   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_mic - hexdump(len=16): e6 96 1f cf bc 38 0a f3 52 21 28 01 cb c5 56 a1
 WPA: EAPOL-Key MIC using HMAC-SHA1
 RSN: encrypted key data - hexdump(len=64): 15 [...] 30
 WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
 WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
 athn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
 athn0: RSN: RX message 3 of 4-Way Handshake from xx:xx:xx:xx:3b:45 (ver=2)
 WPA: IE KeyData - hexdump(len=56): 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 08 8c 00 f4 01 20 dd 16 00 0f ac 01 01 00 14 9f 38 41 d2 18 30 9e 07 77 dd 44 b4 87 dd f0 dd 00 00
 WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 08 8c 00
 WPA: RSNXE in EAPOL-Key - hexdump(len=3): f4 01 20
 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
 athn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key msg 3/4
 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
 RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): f4 01 20
 athn0: Request to deauthenticate - bssid=xx:xx:xx:xx:3b:45 pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS) state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 bsd_send_mlme_param: op=3 reason=17 addr=xx:xx:xx:xx:3b:45
 athn0: Event DEAUTH (11) received
 athn0: Deauthentication notification
 athn0:  * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
 Deauthentication frame IE(s) - hexdump(len=0): [NULL]
 athn0: CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:xx:3b:45 reason=17 locally_generated=1
 athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=7)
 athn0: Setting scan request: 0.100000 sec
 athn0: Radio work 'connect'@0xacec3f40 done in 0.055674 seconds
 athn0: radio_work_free('connect'@0xacec3f40): num_active_works --> 0
 athn0: xx:xx:xx:xx:3b:45 ignore list count incremented to 3, ignoring for 60 seconds
 athn0: Consecutive connection failures: 3 --> request scan in 1000 ms
 athn0: Ignore new scan request for 1.000000 sec since an earlier request is scheduled to trigger sooner
 athn0: WPA: Clear old PMK and PTK
 athn0: Disconnect event - remove keys
 athn0: State: 4WAY_HANDSHAKE -> DISCONNECTED
 EAPOL: External notification - portEnabled=0
 EAPOL: SUPP_PAE entering state DISCONNECTED
 EAPOL: Supplicant port status: Unauthorized
 EAPOL: SUPP_BE entering state INITIALIZE
 EAPOL: External notification - portValid=0
 EAPOL: External notification - EAP success=0
 athn0: State: DISCONNECTED -> DISCONNECTED
 EAPOL: External notification - portEnabled=0
 EAPOL: External notification - portValid=0
 QM: Clear all active DSCP policies
 athn0: CTRL-EVENT-DSCP-POLICY clear_all
 athn0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner
 athn0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED) state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 athn0: State: DISCONNECTED -> DISCONNECTED
 EAPOL: External notification - portEnabled=0
 EAPOL: External notification - portValid=0
 QM: Clear all active DSCP policies
 athn0: CTRL-EVENT-DSCP-POLICY clear_all
 athn0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner
 athn0: Event DISASSOC (1) received
 athn0: Disassociation notification
 athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
 athn0: Do not request new immediate scan
 athn0: WPA: Clear old PMK and PTK
 athn0: Disconnect event - remove keys
 athn0: State: DISCONNECTED -> DISCONNECTED
 EAPOL: External notification - portEnabled=0
 EAPOL: External notification - portValid=0
 athn0: State: DISCONNECTED -> SCANNING
 athn0: Starting AP scan for wildcard SSID
 athn0: Add radio work 'scan'@0xacec3f40
 athn0: First radio work item in the queue - schedule start immediately
 athn0: Starting radio work 'scan'@0xacec3f40 after 0.000029 second wait
 wpa_driver_bsd_set_wpa: enabled=1
 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 EAPOL: startWhen --> 0
 EAPOL: disable timer tick
 athn0: Event SCAN_RESULTS (3) received
 Received 2100 bytes of scan results (26 BSSes)
 athn0: BSS: Start scan result update 4
 BSS: last_scan_res_used=26/32
 athn0: New scan results available (own=0 ext=0)
 athn0: Radio work 'scan'@0xacec3f40 done in 7.746204 seconds
 athn0: radio_work_free('scan'@0xacec3f40): num_active_works --> 0
 athn0: Selecting BSS from priority group 0
 athn0: 0: xx:xx:xx:xx:3b:45 ssid='MYWIFI' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=69 freq=5180 
 athn0:    skip - BSSID ignored (count=3 limit=0)
 athn0: 1: xx:xx:xx:xx:3b:43 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x10 level=64 freq=5180 
 athn0:    skip - SSID not known
 athn0: 2: xx:xx:xx:xx:3b:44 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x10 level=73 freq=2412 
 athn0:    skip - SSID not known
 athn0: 3: xx:xx:xx:xx:3b:46 ssid='MYWIFI' wpa_ie_len=0 rsn_ie_len=24 caps=0x31 level=72 freq=2412 
 athn0:    selected based on RSN IE
 athn0: MLD: No Multi-Link element
 athn0:    selected BSS xx:xx:xx:xx:3b:46 ssid='MYWIFI'
 athn0: Considering connect request: reassociate: 0  selected: xx:xx:xx:xx:3b:46  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING  ssid=0xad049000  current_ssid=0x0
 athn0: Request association with xx:xx:xx:xx:3b:46
 athn0: Re-association to the same ESS
 athn0: No ongoing scan/p2p-scan found to abort
 athn0: Add radio work 'connect'@0xacec3f40
 athn0: First radio work item in the queue - schedule start immediately
 athn0: Starting radio work 'connect'@0xacec3f40 after 0.000044 second wait
 athn0: WPA: clearing own WPA/RSN IE
 athn0: RSN: clearing own RSNXE
 RSN: PMKSA cache search - network_ctx=0xad049000 try_opportunistic=0 akmp=0x0
 RSN: Search for xx:xx:xx:xx:3b:46
 RSN: No PMKSA cache entry found
 athn0: RSN: using IEEE 802.11i/D9.0
 athn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
 athn0: WPA: Selected mgmt group cipher 32
 athn0: WPA: clearing AP WPA IE
 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 08 8c 00
 athn0: WPA: clearing AP RSNXE
 athn0: WPA: AP group 0x10 network profile group 0x18; available group 0x10
 athn0: WPA: using GTK CCMP
 athn0: WPA: AP pairwise 0x10 network profile pairwise 0x18; available pairwise 0x10
 athn0: WPA: using PTK CCMP
 athn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available key_mgmt 0x2
 athn0: WPA: using KEY_MGMT WPA-PSK
 athn0: WPA: AP mgmt_group_cipher 0x20 network profile mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0
 athn0: WPA: not using MGMT group cipher
 WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
 RSN: Set own RSNXE default - hexdump(len=0):
 WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
 athn0: Automatic auth_alg selection: 0x1
 No supported operating classes IE to add
 athn0: Trying to associate with xx:xx:xx:xx:3b:46 (SSID='MYWIFI' freq=2412 MHz)
 athn0: Cancelling scan request
 athn0: State: SCANNING -> ASSOCIATING
 Limit connection to xx:xx:xx:xx:3b:46 freq=2412 MHz based on scan results (bssid_set=0 wps=0)
 wpa_driver_bsd_associate: ssid 'MYWIFI' wpa ie len 22 pairwise 16 group 16 key mgmt 2
 wpa_driver_bsd_set_drop_unencrypted: enabled=1
 wpa_driver_bsd_associate: set PRIVACY 1
 athn0: Setting authentication timeout: 10 sec 0 usec
 EAPOL: External notification - EAP success=0
 EAPOL: External notification - EAP fail=0
 EAPOL: External notification - portControl=Auto
 athn0: Event ASSOC (0) received
 athn0: State: ASSOCIATING -> ASSOCIATED
 athn0: Associated to a new BSS: BSSID=xx:xx:xx:xx:3b:46
 athn0: Associated with xx:xx:xx:xx:3b:46
 athn0: WPA: Association event - clear replay counter
 athn0: WPA: Clear old PTK
 EAPOL: External notification - portEnabled=0
 EAPOL: External notification - portValid=0
 EAPOL: External notification - EAP success=0
 EAPOL: External notification - portEnabled=1
 EAPOL: SUPP_PAE entering state CONNECTING
 EAPOL: enable timer tick
 EAPOL: SUPP_BE entering state IDLE
 athn0: Setting authentication timeout: 10 sec 0 usec
 athn0: Cancelling scan request
 athn0: RX EAPOL from xx:xx:xx:xx:3b:46 (encrypted=-1)
 athn0: Setting authentication timeout: 10 sec 0 usec
 athn0: IEEE 802.1X RX: version=2 type=3 length=95
 athn0:   EAPOL-Key type=2
 athn0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
 athn0:   key_length=16 key_data_length=0
   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
   key_nonce - hexdump(len=32): 62 [...] b8
   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 athn0: WPA: RX message 1 of 4-Way Handshake from xx:xx:xx:xx:3b:46 (ver=2)
 RSN: msg 1/4 key data - hexdump(len=0):
 athn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
 WPA: Renewed SNonce - hexdump(len=32): d4 [...] c6
 WPA: PTK derivation using PRF(SHA1)
 WPA: PTK derivation - A1=xx:xx:xx:xx:a9:b1 A2=xx:xx:xx:xx:3b:46
 WPA: Nonce1 - hexdump(len=32): d4 [...] c6
 WPA: Nonce2 - hexdump(len=32): 62 [...] b8
 WPA: PMK - hexdump(len=32): [REMOVED]
 WPA: PTK - hexdump(len=48): [REMOVED]
 WPA: KCK - hexdump(len=16): [REMOVED]
 WPA: KEK - hexdump(len=16): [REMOVED]
 WPA: TK - hexdump(len=16): [REMOVED]
 WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
 athn0: WPA: Sending EAPOL-Key 2/4
 WPA: Send EAPOL-Key frame to xx:xx:xx:xx:3b:46 ver=2 mic_len=16 key_mgmt=0x2
 WPA: EAPOL-Key MIC using HMAC-SHA1
 WPA: KCK - hexdump(len=16): [REMOVED]
 WPA: Derived Key MIC - hexdump(len=16): 92 ae 08 11 cb 04 19 30 1a 0d 26 bf 05 1e c5 82
 athn0: RX EAPOL from xx:xx:xx:xx:3b:46 (encrypted=-1)
 athn0: IEEE 802.1X RX: version=2 type=3 length=159
 athn0:   EAPOL-Key type=2
 athn0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
 athn0:   key_length=16 key_data_length=64
   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
   key_nonce - hexdump(len=32): 62 [...] b8
   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_mic - hexdump(len=16): 12 a1 99 a9 9a a1 90 cb 7b 50 2f cf 56 7b 04 5e
 WPA: EAPOL-Key MIC using HMAC-SHA1
 RSN: encrypted key data - hexdump(len=64): 43 [...] 11
 WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
 WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
 athn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
 athn0: RSN: RX message 3 of 4-Way Handshake from xx:xx:xx:xx:3b:46 (ver=2)
 WPA: IE KeyData - hexdump(len=56): 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 08 8c 00 f4 01 20 dd 16 00 0f ac 01 01 00 29 96 87 83 8e 9d 79 74 40 9c 6b f4 29 ab 82 80 dd 00 00
 WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 08 8c 00
 WPA: RSNXE in EAPOL-Key - hexdump(len=3): f4 01 20
 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
 athn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key msg 3/4
 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
 RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): f4 01 20
 athn0: Request to deauthenticate - bssid=xx:xx:xx:xx:3b:46 pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS) state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 bsd_send_mlme_param: op=3 reason=17 addr=xx:xx:xx:xx:3b:46
 athn0: Event DEAUTH (11) received
 athn0: Deauthentication notification
 athn0:  * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
 Deauthentication frame IE(s) - hexdump(len=0): [NULL]
 athn0: CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:xx:3b:46 reason=17 locally_generated=1
 athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=7)
 athn0: Setting scan request: 0.100000 sec
 athn0: Radio work 'connect'@0xacec3f40 done in 0.048839 seconds
 athn0: radio_work_free('connect'@0xacec3f40): num_active_works --> 0
 athn0: xx:xx:xx:xx:3b:46 ignore list count incremented to 3, ignoring for 60 seconds
 Continuous association failures - consider temporary network disabling
 athn0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="MYWIFI" auth_failures=1 duration=10 reason=CONN_FAILED
 athn0: Consecutive connection failures: 4 --> request scan in 5000 ms
 athn0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner
 athn0: WPA: Clear old PMK and PTK
 athn0: Disconnect event - remove keys
 athn0: State: 4WAY_HANDSHAKE -> DISCONNECTED
 EAPOL: External notification - portEnabled=0
 EAPOL: SUPP_PAE entering state DISCONNECTED
 EAPOL: Supplicant port status: Unauthorized
 EAPOL: SUPP_BE entering state INITIALIZE
 EAPOL: External notification - portValid=0
 EAPOL: External notification - EAP success=0
 athn0: State: DISCONNECTED -> DISCONNECTED
 EAPOL: External notification - portEnabled=0
 EAPOL: External notification - portValid=0
 QM: Clear all active DSCP policies
 athn0: CTRL-EVENT-DSCP-POLICY clear_all
 athn0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner
 athn0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED) state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 athn0: State: DISCONNECTED -> DISCONNECTED
 EAPOL: External notification - portEnabled=0
 EAPOL: External notification - portValid=0
 QM: Clear all active DSCP policies
 athn0: CTRL-EVENT-DSCP-POLICY clear_all
 athn0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner
 athn0: Event DISASSOC (1) received
 athn0: Disassociation notification
 athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
 athn0: Do not request new immediate scan
 athn0: WPA: Clear old PMK and PTK
 athn0: Disconnect event - remove keys
 athn0: State: DISCONNECTED -> DISCONNECTED
 EAPOL: External notification - portEnabled=0
 EAPOL: External notification - portValid=0
 athn0: State: DISCONNECTED -> SCANNING
 athn0: Starting AP scan for wildcard SSID
 athn0: Add radio work 'scan'@0xacec3f40
 athn0: First radio work item in the queue - schedule start immediately
 athn0: Starting radio work 'scan'@0xacec3f40 after 0.000028 second wait
 wpa_driver_bsd_set_wpa: enabled=1
 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 EAPOL: startWhen --> 0
 EAPOL: disable timer tick
 athn0: Event SCAN_RESULTS (3) received
 Received 2100 bytes of scan results (26 BSSes)
 athn0: BSS: Start scan result update 5
 BSS: last_scan_res_used=26/32
 athn0: New scan results available (own=0 ext=0)
 athn0: Radio work 'scan'@0xacec3f40 done in 7.742962 seconds
 athn0: radio_work_free('scan'@0xacec3f40): num_active_works --> 0
 athn0: Postpone network selection by 2 seconds since all networks are disabled
 athn0: Try to associate due to network getting re-enabled
 athn0: CTRL-EVENT-SSID-REENABLED id=0 ssid="MYWIFI"
 Mark xx:xx:xx:xx:3b:46 ignored to allow a lower priority BSS, if any, to be tried next
 athn0: xx:xx:xx:xx:3b:46 ignore list count incremented to 4, ignoring for 120 seconds
 athn0: Selecting BSS from priority group 0
 athn0: 0: xx:xx:xx:xx:3b:43 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x10 level=65 freq=5180 
 athn0:    skip - SSID not known
 athn0: 1: xx:xx:xx:xx:3b:45 ssid='MYWIFI' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=64 freq=5180 
 athn0:    skip - BSSID ignored (count=3 limit=0)
 athn0: 2: xx:xx:xx:xx:3b:44 ssid='' wpa_ie_len=0 rsn_ie_len=20 caps=0x10 level=62 freq=2412 
 athn0:    skip - SSID not known
 athn0: 3: xx:xx:xx:xx:3b:46 ssid='MYWIFI' wpa_ie_len=0 rsn_ie_len=24 caps=0x31 level=61 freq=2412 
 athn0:    skip - BSSID ignored (count=4 limit=0)
 athn0: 4: xx:xx:xx:xx:a4:a5 ssid='MYWIFI' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=31 freq=5180 
 athn0:    selected based on RSN IE
 athn0: MLD: No Multi-Link element
 athn0:    selected BSS xx:xx:xx:xx:a4:a5 ssid='MYWIFI'
 athn0: Considering connect request: reassociate: 0  selected: xx:xx:xx:xx:a4:a5  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING  ssid=0xad049000  current_ssid=0x0
 athn0: Request association with xx:xx:xx:xx:a4:a5
 athn0: Re-association to the same ESS
 athn0: No ongoing scan/p2p-scan found to abort
 athn0: Add radio work 'connect'@0xacec3f40
 athn0: First radio work item in the queue - schedule start immediately
 athn0: Starting radio work 'connect'@0xacec3f40 after 0.000097 second wait
 athn0: WPA: clearing own WPA/RSN IE
 athn0: RSN: clearing own RSNXE
 RSN: PMKSA cache search - network_ctx=0xad049000 try_opportunistic=0 akmp=0x0
 RSN: Search for xx:xx:xx:xx:a4:a5
 RSN: No PMKSA cache entry found
 athn0: RSN: using IEEE 802.11i/D9.0
 athn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
 athn0: WPA: Selected mgmt group cipher 32
 athn0: WPA: clearing AP WPA IE
 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 08 8c 00
 athn0: WPA: clearing AP RSNXE
 athn0: WPA: AP group 0x10 network profile group 0x18; available group 0x10
 athn0: WPA: using GTK CCMP
 athn0: WPA: AP pairwise 0x10 network profile pairwise 0x18; available pairwise 0x10
 athn0: WPA: using PTK CCMP
 athn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available key_mgmt 0x2
 athn0: WPA: using KEY_MGMT WPA-PSK
 athn0: WPA: AP mgmt_group_cipher 0x20 network profile mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0
 athn0: WPA: not using MGMT group cipher
 WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
 RSN: Set own RSNXE default - hexdump(len=0):
 WPA: Set PMK based on external data - hexdump(len=32): [REMOVED]
 athn0: Automatic auth_alg selection: 0x1
 No supported operating classes IE to add
 athn0: Trying to associate with xx:xx:xx:xx:a4:a5 (SSID='MYWIFI' freq=5180 MHz)
 athn0: Cancelling scan request
 athn0: State: SCANNING -> ASSOCIATING
 Limit connection to xx:xx:xx:xx:a4:a5 freq=5180 MHz based on scan results (bssid_set=0 wps=0)
 wpa_driver_bsd_associate: ssid 'MYWIFI' wpa ie len 22 pairwise 16 group 16 key mgmt 2
 wpa_driver_bsd_set_drop_unencrypted: enabled=1
 wpa_driver_bsd_associate: set PRIVACY 1
 athn0: Setting authentication timeout: 10 sec 0 usec
 EAPOL: External notification - EAP success=0
 EAPOL: External notification - EAP fail=0
 EAPOL: External notification - portControl=Auto
 athn0: Event ASSOC (0) received
 athn0: State: ASSOCIATING -> ASSOCIATED
 athn0: Associated to a new BSS: BSSID=xx:xx:xx:xx:a4:a5
 athn0: Associated with xx:xx:xx:xx:a4:a5
 athn0: WPA: Association event - clear replay counter
 athn0: WPA: Clear old PTK
 EAPOL: External notification - portEnabled=0
 EAPOL: External notification - portValid=0
 EAPOL: External notification - EAP success=0
 EAPOL: External notification - portEnabled=1
 EAPOL: SUPP_PAE entering state CONNECTING
 EAPOL: enable timer tick
 EAPOL: SUPP_BE entering state IDLE
 athn0: Setting authentication timeout: 10 sec 0 usec
 athn0: Cancelling scan request
 athn0: RX EAPOL from xx:xx:xx:xx:a4:a5 (encrypted=-1)
 athn0: Setting authentication timeout: 10 sec 0 usec
 athn0: IEEE 802.1X RX: version=2 type=3 length=95
 athn0:   EAPOL-Key type=2
 athn0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
 athn0:   key_length=16 key_data_length=0
   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
   key_nonce - hexdump(len=32): 20 [...] dc
   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 athn0: WPA: RX message 1 of 4-Way Handshake from xx:xx:xx:xx:a4:a5 (ver=2)
 RSN: msg 1/4 key data - hexdump(len=0):
 athn0: State: ASSOCIATED -> 4WAY_HANDSHAKE
 WPA: Renewed SNonce - hexdump(len=32): 8f [...] 62
 WPA: PTK derivation using PRF(SHA1)
 WPA: PTK derivation - A1=xx:xx:xx:xx:a9:b1 A2=xx:xx:xx:xx:a4:a5
 WPA: Nonce1 - hexdump(len=32): 8f [...] 62
 WPA: Nonce2 - hexdump(len=32): 20 [...] dc
 WPA: PMK - hexdump(len=32): [REMOVED]
 WPA: PTK - hexdump(len=48): [REMOVED]
 WPA: KCK - hexdump(len=16): [REMOVED]
 WPA: KEK - hexdump(len=16): [REMOVED]
 WPA: TK - hexdump(len=16): [REMOVED]
 WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
 athn0: WPA: Sending EAPOL-Key 2/4
 WPA: Send EAPOL-Key frame to xx:xx:xx:xx:a4:a5 ver=2 mic_len=16 key_mgmt=0x2
 WPA: EAPOL-Key MIC using HMAC-SHA1
 WPA: KCK - hexdump(len=16): [REMOVED]
 WPA: Derived Key MIC - hexdump(len=16): f2 25 88 ea 9b 5b 4b fc 9a a3 ed 03 35 18 0d 23
 athn0: RX EAPOL from xx:xx:xx:xx:a4:a5 (encrypted=-1)
 athn0: IEEE 802.1X RX: version=2 type=3 length=159
 athn0:   EAPOL-Key type=2
 athn0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
 athn0:   key_length=16 key_data_length=64
   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
   key_nonce - hexdump(len=32): 20 [...] dc
   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_mic - hexdump(len=16): 9d 21 a5 58 9f 41 14 a2 27 28 14 2e 18 a3 67 e7
 WPA: EAPOL-Key MIC using HMAC-SHA1
 RSN: encrypted key data - hexdump(len=64): 4a [...] 05
 WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
 WPA: decrypted EAPOL-Key key data - hexdump(len=56): [REMOVED]
 athn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
 athn0: RSN: RX message 3 of 4-Way Handshake from xx:xx:xx:xx:a4:a5 (ver=2)
 WPA: IE KeyData - hexdump(len=56): 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 08 8c 00 f4 01 20 dd 16 00 0f ac 01 01 00 ee 2f e6 5e 61 8c 30 50 b6 95 de ac 76 e9 f3 af dd 00 00
 WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f ac 02 00 0f ac 08 8c 00
 WPA: RSNXE in EAPOL-Key - hexdump(len=3): f4 01 20
 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
 athn0: WPA: RSNXE mismatch between Beacon/ProbeResp and EAPOL-Key msg 3/4
 RSNXE in Beacon/ProbeResp - hexdump(len=0): [NULL]
 RSNXE in EAPOL-Key msg 3/4 - hexdump(len=3): f4 01 20
 athn0: Request to deauthenticate - bssid=xx:xx:xx:xx:a4:a5 pending_bssid=00:00:00:00:00:00 reason=17 (IE_IN_4WAY_DIFFERS) state=4WAY_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 bsd_send_mlme_param: op=3 reason=17 addr=xx:xx:xx:xx:a4:a5
 athn0: Event DEAUTH (11) received
 athn0: Deauthentication notification
 athn0:  * reason 17 (IE_IN_4WAY_DIFFERS) locally_generated=1
 Deauthentication frame IE(s) - hexdump(len=0): [NULL]
 athn0: CTRL-EVENT-DISCONNECTED bssid=xx:xx:xx:xx:a4:a5 reason=17 locally_generated=1
 athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=7)
 athn0: Setting scan request: 0.100000 sec
 athn0: Radio work 'connect'@0xacec3f40 done in 0.044721 seconds
 athn0: radio_work_free('connect'@0xacec3f40): num_active_works --> 0
 athn0: Added xx:xx:xx:xx:a4:a5 into ignore list, ignoring for 10 seconds
 athn0: Another BSS in this ESS has been seen; try it next
 athn0: xx:xx:xx:xx:a4:a5 ignore list count incremented to 2, ignoring for 10 seconds
 Continuous association failures - consider temporary network disabling
 athn0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="MYWIFI" auth_failures=2 duration=34 reason=CONN_FAILED
 athn0: Consecutive connection failures: 5 --> request scan in 10000 ms
 athn0: Ignore new scan request for 10.000000 sec since an earlier request is scheduled to trigger sooner
 athn0: WPA: Clear old PMK and PTK
 athn0: Disconnect event - remove keys
 athn0: State: 4WAY_HANDSHAKE -> DISCONNECTED
 EAPOL: External notification - portEnabled=0
 EAPOL: SUPP_PAE entering state DISCONNECTED
 EAPOL: Supplicant port status: Unauthorized
 EAPOL: SUPP_BE entering state INITIALIZE
 EAPOL: External notification - portValid=0
 EAPOL: External notification - EAP success=0
 athn0: State: DISCONNECTED -> DISCONNECTED
 EAPOL: External notification - portEnabled=0
 EAPOL: External notification - portValid=0
 QM: Clear all active DSCP policies
 athn0: CTRL-EVENT-DSCP-POLICY clear_all
 athn0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner
 athn0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED) state=DISCONNECTED valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
 athn0: State: DISCONNECTED -> DISCONNECTED
 EAPOL: External notification - portEnabled=0
 EAPOL: External notification - portValid=0
 QM: Clear all active DSCP policies
 athn0: CTRL-EVENT-DSCP-POLICY clear_all
 athn0: Ignore new scan request for 5.000000 sec since an earlier request is scheduled to trigger sooner
 athn0: Event DISASSOC (1) received
 athn0: Disassociation notification
 athn0: Auto connect enabled: try to reconnect (wps=0/0 wpa_state=0)
 athn0: Do not request new immediate scan
 athn0: WPA: Clear old PMK and PTK
 athn0: Disconnect event - remove keys
 athn0: State: DISCONNECTED -> DISCONNECTED
 EAPOL: External notification - portEnabled=0
 EAPOL: External notification - portValid=0
 athn0: State: DISCONNECTED -> SCANNING
 athn0: Starting AP scan for wildcard SSID
 athn0: Optimize scan based on previously generated frequency list
 athn0: Add radio work 'scan'@0xacec3f40
 athn0: First radio work item in the queue - schedule start immediately
 athn0: Starting radio work 'scan'@0xacec3f40 after 0.000027 second wait
 wpa_driver_bsd_set_wpa: enabled=1
 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 EAPOL: startWhen --> 0
 EAPOL: disable timer tick
 athn0: Event SCAN_RESULTS (3) received
 Received 2100 bytes of scan results (26 BSSes)
 athn0: BSS: Start scan result update 6
 BSS: last_scan_res_used=26/32
 athn0: New scan results available (own=0 ext=0)
 athn0: Radio work 'scan'@0xacec3f40 done in 7.746138 seconds
 athn0: radio_work_free('scan'@0xacec3f40): num_active_works --> 0
 athn0: Postpone network selection by 26 seconds since all networks are disabled
 
 --MP_/SH=kq2FY5Z__V=+.bJB5vxi--
 


Home | Main Index | Thread Index | Old Index