When I use wpa_supplicant to connect a AP without enc. wpa_supplicant first receive a Disassociation notification, and then a Association notification. connman indicate the second notification is invalid. But I tried it in ubuntu network-manager, it's ok.
Richard connman log: connmand[1908]: wlan0 scanning started connmand[1908]: plugins/supplicant.c:supplicant_filter() task 0x492e0 member Scanning connmand[1908]: wlan0 scanning finished connmand[1908]: plugins/supplicant.c:supplicant_filter() task 0x492e0 member StateChange connmand[1908]: wlan0 state change SCANNING -> ASSOCIATED (scanning) (network 0x54f18) connmand[1908]: plugins/supplicant.c:state_change() scanning state mismatch connmand[1908]: wlan0 invalid state change SCANNING -> ASSOCIATED connmand[1908]: plugins/supplicant.c:supplicant_filter() task 0x492e0 member StateChange connmand[1908]: wlan0 state change ASSOCIATED -> COMPLETED (network 0x54f18) connmand[1908]: src/network.c:connman_network_set_address() network 0x54f18 size 6 connmand[1908]: src/network.c:connman_network_set_string() network 0x54f18 key Address value 00:22:B0:98:59:97 connmand[1908]: src/element.c:set_static_property() element 0x54f18 name 0022b0985997 connmand[1908]: src/element.c:set_static_property() name Address type 115 value0xbe9d844c connmand[1908]: src/element.c:unregister_property() property 0x55300 wpa_supplicant log: selected non-WPA AP 00:22:b0:98:59:97 ssid='linux' Trying to associate with 00:22:b0:98:59:97 (SSID='linux' freq=2432 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 WPA: clearing AP WPA IE WPA: clearing AP RSN IE WPA: clearing own WPA/RSN IE No keys have been configured - skip key clearing State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=ForceAuthorized EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c02 len=14 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Disassociation notification Added BSSID 00:22:b0:98:59:97 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys State: ASSOCIATING -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c02 len=21 Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Starting AP scan for wildcard SSID Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c05 len=354 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c05 len=354 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c05 len=274 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c05 len=354 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c02 len=122 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8c02 len=89 Association info event req_ies - hexdump(len=32): 00 05 6c 69 6e 75 78 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 07 00 50 f2 02 00 01 00 WPA: clearing own WPA/RSN IE RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:22:b0:98:59:97 State: SCANNING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:22:b0:98:59:97 Associated with 00:22:b0:98:59:97 WPA: Association event - clear replay counter WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state S_FORCE_AUTH EAPOL: Supplicant port status: Authorized EAPOL: SUPP_BE entering state IDLE Cancelling authentication timeout Removed BSSID 00:22:b0:98:59:97 from blacklist State: ASSOCIATED -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:22:b0:98:59:97 completed (auth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) netlink: Operstate: linkmode=-1, operstate=6 _______________________________________________ connman mailing list [email protected] http://lists.connman.net/listinfo/connman
