mirror of
https://github.com/uhi22/pyPLC.git
synced 2024-12-20 01:31:52 +00:00
1366 lines
No EOL
56 KiB
Text
1366 lines
No EOL
56 KiB
Text
|
|
C:\UwesTechnik\pyPLC>python pyPlc.py P
|
|
starting in PEV_MODE
|
|
initializing pyPlcWorker
|
|
[addressManager] we have local MAC DC:0E:A1:11:67:08. Todo: find this out dynamically.
|
|
[addressManager] Found 1 link-local IPv6 addresses.
|
|
fe80::c690:83f3:fbcb:980e%15
|
|
[addressManager] Local IPv6 is fe80::c690:83f3:fbcb:980e%15
|
|
[addressManager] Found 1 link-local IPv6 addresses.
|
|
fe80::c690:83f3:fbcb:980e%15
|
|
[addressManager] Local IPv6 is fe80::c690:83f3:fbcb:980e%15
|
|
index match at 0 dev name=b'\\Device\\NPF_Loopback' dev.description=b'Adapter for loopback traffic capture'
|
|
index match at 1 dev name=b'\\Device\\NPF_{0DFD428E-B132-4188-8EBC-38C13B0C89CF}' dev.description=b'Broadcom 802.11n-Netzwerkadapter'
|
|
index match at 2 dev name=b'\\Device\\NPF_{A541C45F-EDAC-4242-ABF6-B4337228BBFF}' dev.description=b'Microsoft Wi-Fi Direct Virtual Adapter'
|
|
index match at 3 dev name=b'\\Device\\NPF_{68936D7B-F0E7-46E7-A047-3C07A24E03B9}' dev.description=b'Microsoft Wi-Fi Direct Virtual Adapter #2'
|
|
index match at 4 dev name=b'\\Device\\NPF_{E4B8176C-8516-4D48-88BC-85225ABCF259}' dev.description=b'Broadcom NetLink (TM) Gigabit Ethernet'
|
|
index match at 5 dev name=b'\\Device\\NPF_{F2DFA311-B486-461A-A3F4-0DBA998BF9F9}' dev.description=b'WAN Miniport (IP)'
|
|
index match at 6 dev name=b'\\Device\\NPF_{7105741E-F8FC-46AD-9BCD-95F7CDCC76B0}' dev.description=b'WAN Miniport (IPv6)'
|
|
index match at 7 dev name=b'\\Device\\NPF_{CF245078-25B1-4487-AE2A-1763158ACD5F}' dev.description=b'WAN Miniport (Network Monitor)'
|
|
index match at 4 dev name=b'\\Device\\NPF_{E4B8176C-8516-4D48-88BC-85225ABCF259}' dev.description=b'Broadcom NetLink (TM) Gigabit Ethernet'
|
|
[addressManager] will give local MAC DC:0E:A1:11:67:08
|
|
[addressManager] will give local MAC DC:0E:A1:11:67:08
|
|
pyPlcIpv6 started with ownMac DC:0E:A1:11:67:08
|
|
[addressManager] will give local MAC DC:0E:A1:11:67:08
|
|
udplog started with ownMac DC:0E:A1:11:67:08
|
|
sniffer created at eth4
|
|
[pyPlcWorker] Software version v0.2-9-ga9b6e82
|
|
[PEV] initializing fsmPev
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 1(NOK)
|
|
From GetKeyCnf, got network ID (NID) 0xb4 0x99 0x60 0xd8 0x8b 0xe0 0x1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] local modem not yet identified.
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 1 entering 1
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 0(OK)
|
|
The local modem has key 0x31 0x75 0x6b 0xe8 0xd2 0x3f 0x71 0x6e 0x58 0xf4 0xc2 0xef 0x73 0x5a 0xd2 0xd4
|
|
This is NOT the developer NMK.
|
|
From GetKeyCnf, got network ID (NID) 0xb4 0x99 0x60 0xd8 0x8b 0xe0 0x1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] setting the default developer key...
|
|
[PEVSLAC] from 1 entering 3
|
|
received SET_KEY.CNF
|
|
SetKeyCnf says 1, this is formally 'rejected', but indeed ok.
|
|
[PEVSLAC] Assuming the modem is up again.
|
|
[PEVSLAC] from 3 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
[PEVSLAC] Timeout while waiting for SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 0
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 1(NOK)
|
|
From GetKeyCnf, got network ID (NID) 0x0 0x0 0x0 0x0 0x0 0x0 0x0
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] local modem not yet identified.
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 1 entering 1
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 1(NOK)
|
|
From GetKeyCnf, got network ID (NID) 0xb4 0x99 0x60 0xd8 0x8b 0xe0 0x1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] local modem not yet identified.
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 1 entering 1
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 0(OK)
|
|
The local modem has key 0x1 0x2 0x3 0x4 0x5 0x6 0x7 0x8 0x9 0xa 0xb 0xc 0xd 0xe 0xf 0x10
|
|
This is the developer NMK.
|
|
From GetKeyCnf, got network ID (NID) 0xb4 0x99 0x60 0xd8 0x8b 0xe0 0x1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
[PEVSLAC] Timeout while waiting for SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 0
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 0(OK)
|
|
The local modem has key 0x1 0x2 0x3 0x4 0x5 0x6 0x7 0x8 0x9 0xa 0xb 0xc 0xd 0xe 0xf 0x10
|
|
This is the developer NMK.
|
|
From GetKeyCnf, got network ID (NID) 0xb4 0x99 0x60 0xd8 0x8b 0xe0 0x1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
[PEVSLAC] Timeout while waiting for SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 0
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 0(OK)
|
|
The local modem has key 0x1 0x2 0x3 0x4 0x5 0x6 0x7 0x8 0x9 0xa 0xb 0xc 0xd 0xe 0xf 0x10
|
|
This is the developer NMK.
|
|
From GetKeyCnf, got network ID (NID) 0xb4 0x99 0x60 0xd8 0x8b 0xe0 0x1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
[PEVSLAC] Timeout while waiting for SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 0
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 0(OK)
|
|
The local modem has key 0x1 0x2 0x3 0x4 0x5 0x6 0x7 0x8 0x9 0xa 0xb 0xc 0xd 0xe 0xf 0x10
|
|
This is the developer NMK.
|
|
From GetKeyCnf, got network ID (NID) 0xb4 0x99 0x60 0xd8 0x8b 0xe0 0x1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
[PEVSLAC] Timeout while waiting for SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 0
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 0(OK)
|
|
The local modem has key 0x1 0x2 0x3 0x4 0x5 0x6 0x7 0x8 0x9 0xa 0xb 0xc 0xd 0xe 0xf 0x10
|
|
This is the developer NMK.
|
|
From GetKeyCnf, got network ID (NID) 0xb4 0x99 0x60 0xd8 0x8b 0xe0 0x1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
[PEVSLAC] Timeout while waiting for SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 0
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 0(OK)
|
|
The local modem has key 0x1 0x2 0x3 0x4 0x5 0x6 0x7 0x8 0x9 0xa 0xb 0xc 0xd 0xe 0xf 0x10
|
|
This is the developer NMK.
|
|
From GetKeyCnf, got network ID (NID) 0xb4 0x99 0x60 0xd8 0x8b 0xe0 0x1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
[PEVSLAC] Timeout while waiting for SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 0
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 0(OK)
|
|
The local modem has key 0x1 0x2 0x3 0x4 0x5 0x6 0x7 0x8 0x9 0xa 0xb 0xc 0xd 0xe 0xf 0x10
|
|
This is the developer NMK.
|
|
From GetKeyCnf, got network ID (NID) 0xb4 0x99 0x60 0xd8 0x8b 0xe0 0x1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
[PEVSLAC] Timeout while waiting for SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 0
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 0(OK)
|
|
The local modem has key 0x1 0x2 0x3 0x4 0x5 0x6 0x7 0x8 0x9 0xa 0xb 0xc 0xd 0xe 0xf 0x10
|
|
This is the developer NMK.
|
|
From GetKeyCnf, got network ID (NID) 0xb4 0x99 0x60 0xd8 0x8b 0xe0 0x1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
[PEVSLAC] Timeout while waiting for SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 0
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 0(OK)
|
|
The local modem has key 0x1 0x2 0x3 0x4 0x5 0x6 0x7 0x8 0x9 0xa 0xb 0xc 0xd 0xe 0xf 0x10
|
|
This is the developer NMK.
|
|
From GetKeyCnf, got network ID (NID) 0xb4 0x99 0x60 0xd8 0x8b 0xe0 0x1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
[PEVSLAC] Timeout while waiting for SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 0
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] No modem connected. We assume, we run in a simulation environment.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
[PEVSLAC] Timeout while waiting for SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 0
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] No modem connected. We assume, we run in a simulation environment.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
[PEVSLAC] Timeout while waiting for SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 0
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] No modem connected. We assume, we run in a simulation environment.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
[PEVSLAC] Timeout while waiting for SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 0
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] No modem connected. We assume, we run in a simulation environment.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
[PEVSLAC] Timeout while waiting for SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 0
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] No modem connected. We assume, we run in a simulation environment.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
[PEVSLAC] Timeout while waiting for SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 0
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] No modem connected. We assume, we run in a simulation environment.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
[PEVSLAC] Timeout while waiting for SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 0
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] No modem connected. We assume, we run in a simulation environment.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
|
|
C:\UwesTechnik\pyPLC>python pyPlc.py P
|
|
starting in PEV_MODE
|
|
initializing pyPlcWorker
|
|
[addressManager] we have local MAC DC:0E:A1:11:67:08. Todo: find this out dynamically.
|
|
[addressManager] Found 1 link-local IPv6 addresses.
|
|
fe80::c690:83f3:fbcb:980e%15
|
|
[addressManager] Local IPv6 is fe80::c690:83f3:fbcb:980e%15
|
|
[addressManager] Found 1 link-local IPv6 addresses.
|
|
fe80::c690:83f3:fbcb:980e%15
|
|
[addressManager] Local IPv6 is fe80::c690:83f3:fbcb:980e%15
|
|
index match at 0 dev name=b'\\Device\\NPF_Loopback' dev.description=b'Adapter for loopback traffic capture'
|
|
index match at 1 dev name=b'\\Device\\NPF_{0DFD428E-B132-4188-8EBC-38C13B0C89CF}' dev.description=b'Broadcom 802.11n-Netzwerkadapter'
|
|
index match at 2 dev name=b'\\Device\\NPF_{A541C45F-EDAC-4242-ABF6-B4337228BBFF}' dev.description=b'Microsoft Wi-Fi Direct Virtual Adapter'
|
|
index match at 3 dev name=b'\\Device\\NPF_{68936D7B-F0E7-46E7-A047-3C07A24E03B9}' dev.description=b'Microsoft Wi-Fi Direct Virtual Adapter #2'
|
|
index match at 4 dev name=b'\\Device\\NPF_{E4B8176C-8516-4D48-88BC-85225ABCF259}' dev.description=b'Broadcom NetLink (TM) Gigabit Ethernet'
|
|
index match at 5 dev name=b'\\Device\\NPF_{F2DFA311-B486-461A-A3F4-0DBA998BF9F9}' dev.description=b'WAN Miniport (IP)'
|
|
index match at 6 dev name=b'\\Device\\NPF_{7105741E-F8FC-46AD-9BCD-95F7CDCC76B0}' dev.description=b'WAN Miniport (IPv6)'
|
|
index match at 7 dev name=b'\\Device\\NPF_{CF245078-25B1-4487-AE2A-1763158ACD5F}' dev.description=b'WAN Miniport (Network Monitor)'
|
|
index match at 4 dev name=b'\\Device\\NPF_{E4B8176C-8516-4D48-88BC-85225ABCF259}' dev.description=b'Broadcom NetLink (TM) Gigabit Ethernet'
|
|
[addressManager] will give local MAC DC:0E:A1:11:67:08
|
|
[addressManager] will give local MAC DC:0E:A1:11:67:08
|
|
pyPlcIpv6 started with ownMac DC:0E:A1:11:67:08
|
|
[addressManager] will give local MAC DC:0E:A1:11:67:08
|
|
udplog started with ownMac DC:0E:A1:11:67:08
|
|
sniffer created at eth4
|
|
[pyPlcWorker] Software version v0.2-9-ga9b6e82
|
|
[PEV] initializing fsmPev
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] No modem connected. We assume, we run in a simulation environment.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
[PEVSLAC] Timeout while waiting for SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 0
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] No modem connected. We assume, we run in a simulation environment.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
[PEVSLAC] Timeout while waiting for SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 0
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] No modem connected. We assume, we run in a simulation environment.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
[PEVSLAC] Timeout while waiting for SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 0
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] No modem connected. We assume, we run in a simulation environment.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
[PEVSLAC] Timeout while waiting for SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 0
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] No modem connected. We assume, we run in a simulation environment.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
[PEVSLAC] Timeout while waiting for SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 0
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] No modem connected. We assume, we run in a simulation environment.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
[PEVSLAC] Timeout while waiting for SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 0
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] No modem connected. We assume, we run in a simulation environment.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
[PEVSLAC] Timeout while waiting for SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 0
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] No modem connected. We assume, we run in a simulation environment.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
|
|
C:\UwesTechnik\pyPLC>python pyPlc.py P
|
|
starting in PEV_MODE
|
|
initializing pyPlcWorker
|
|
[addressManager] we have local MAC DC:0E:A1:11:67:08. Todo: find this out dynamically.
|
|
[addressManager] Found 1 link-local IPv6 addresses.
|
|
fe80::c690:83f3:fbcb:980e%15
|
|
[addressManager] Local IPv6 is fe80::c690:83f3:fbcb:980e%15
|
|
[addressManager] Found 1 link-local IPv6 addresses.
|
|
fe80::c690:83f3:fbcb:980e%15
|
|
[addressManager] Local IPv6 is fe80::c690:83f3:fbcb:980e%15
|
|
index match at 0 dev name=b'\\Device\\NPF_Loopback' dev.description=b'Adapter for loopback traffic capture'
|
|
index match at 1 dev name=b'\\Device\\NPF_{0DFD428E-B132-4188-8EBC-38C13B0C89CF}' dev.description=b'Broadcom 802.11n-Netzwerkadapter'
|
|
index match at 2 dev name=b'\\Device\\NPF_{A541C45F-EDAC-4242-ABF6-B4337228BBFF}' dev.description=b'Microsoft Wi-Fi Direct Virtual Adapter'
|
|
index match at 3 dev name=b'\\Device\\NPF_{68936D7B-F0E7-46E7-A047-3C07A24E03B9}' dev.description=b'Microsoft Wi-Fi Direct Virtual Adapter #2'
|
|
index match at 4 dev name=b'\\Device\\NPF_{E4B8176C-8516-4D48-88BC-85225ABCF259}' dev.description=b'Broadcom NetLink (TM) Gigabit Ethernet'
|
|
index match at 5 dev name=b'\\Device\\NPF_{F2DFA311-B486-461A-A3F4-0DBA998BF9F9}' dev.description=b'WAN Miniport (IP)'
|
|
index match at 6 dev name=b'\\Device\\NPF_{7105741E-F8FC-46AD-9BCD-95F7CDCC76B0}' dev.description=b'WAN Miniport (IPv6)'
|
|
index match at 7 dev name=b'\\Device\\NPF_{CF245078-25B1-4487-AE2A-1763158ACD5F}' dev.description=b'WAN Miniport (Network Monitor)'
|
|
index match at 4 dev name=b'\\Device\\NPF_{E4B8176C-8516-4D48-88BC-85225ABCF259}' dev.description=b'Broadcom NetLink (TM) Gigabit Ethernet'
|
|
[addressManager] will give local MAC DC:0E:A1:11:67:08
|
|
[addressManager] will give local MAC DC:0E:A1:11:67:08
|
|
pyPlcIpv6 started with ownMac DC:0E:A1:11:67:08
|
|
[addressManager] will give local MAC DC:0E:A1:11:67:08
|
|
udplog started with ownMac DC:0E:A1:11:67:08
|
|
sniffer created at eth4
|
|
[pyPlcWorker] Software version v0.2-9-ga9b6e82
|
|
[PEV] initializing fsmPev
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 0 entering 1
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 1(NOK)
|
|
From GetKeyCnf, got network ID (NID) 0xfb 0x4 0xc3 0x6c 0x12 0x32 0x1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] local modem not yet identified.
|
|
[PEVSLAC] searching for modems, transmitting GET_KEY.REQ...
|
|
[PEVSLAC] from 1 entering 1
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 0(OK)
|
|
The local modem has key 0x1 0x2 0x3 0x4 0x5 0x6 0x7 0x8 0x9 0xa 0xb 0xc 0xd 0xe 0xf 0x10
|
|
This is the developer NMK.
|
|
From GetKeyCnf, got network ID (NID) 0xfb 0x4 0xc3 0x6c 0x12 0x32 0x1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] from 1 entering 2
|
|
[PEVSLAC] Sending SLAC_PARAM.REQ...
|
|
[PEVSLAC] from 2 entering 4
|
|
received SLAC_PARAM.REQ
|
|
[addressManager] pev has MAC DC:0E:A1:11:67:08
|
|
received SLAC_PARAM.CNF
|
|
[PEVSLAC] from 4 entering 5
|
|
[PEVSLAC] from 5 entering 6
|
|
[PEVSLAC] transmitting START_ATTEN_CHAR.IND...
|
|
[PEVSLAC] transmitting START_ATTEN_CHAR.IND...
|
|
[PEVSLAC] transmitting START_ATTEN_CHAR.IND...
|
|
[PEVSLAC] from 6 entering 7
|
|
[PEVSLAC] transmitting MNBC_SOUND.IND...
|
|
received MNBC_SOUND.IND
|
|
[PEVSLAC] transmitting MNBC_SOUND.IND...
|
|
received MNBC_SOUND.IND
|
|
[PEVSLAC] transmitting MNBC_SOUND.IND...
|
|
received MNBC_SOUND.IND
|
|
[PEVSLAC] transmitting MNBC_SOUND.IND...
|
|
received MNBC_SOUND.IND
|
|
[PEVSLAC] transmitting MNBC_SOUND.IND...
|
|
received MNBC_SOUND.IND
|
|
[PEVSLAC] transmitting MNBC_SOUND.IND...
|
|
received MNBC_SOUND.IND
|
|
[PEVSLAC] transmitting MNBC_SOUND.IND...
|
|
received MNBC_SOUND.IND
|
|
[PEVSLAC] transmitting MNBC_SOUND.IND...
|
|
received MNBC_SOUND.IND
|
|
[PEVSLAC] transmitting MNBC_SOUND.IND...
|
|
received MNBC_SOUND.IND
|
|
[PEVSLAC] transmitting MNBC_SOUND.IND...
|
|
[PEVSLAC] from 7 entering 8
|
|
received MNBC_SOUND.IND
|
|
received ATTEN_CHAR.IND
|
|
[PEVSLAC] received AttenCharInd in state 8
|
|
[addressManager] evse has MAC 06:48:0E:3B:13:30
|
|
[PEVSLAC] number of sounds reported by the EVSE (should be 10): 10
|
|
[PEVSLAC] transmitting ATTEN_CHAR.RSP...
|
|
[PEVSLAC] from 9 entering 10
|
|
[PEVSLAC] transmitting SLAC_MATCH.REQ...
|
|
[PEVSLAC] from 10 entering 11
|
|
received SLAC_MATCH.REQ
|
|
received SLAC_MATCH.CNF
|
|
From SlacMatchCnf, got network ID (NID) 0xfb 0x4 0xc3 0x6c 0x12 0x32 0x1
|
|
From SlacMatchCnf, got network membership key (NMK) 0x4c 0xba 0x19 0x2c 0xe4 0x72 0xfe 0xdc 0x37 0xf4 0x12 0xa 0xcf 0x10 0x39 0x26
|
|
transmitting CM_SET_KEY.REQ
|
|
[PEVSLAC] from 11 entering 12
|
|
[PEVSLAC] Checking whether the pairing worked, by GET_KEY.REQ...
|
|
[PEVSLAC] from 12 entering 13
|
|
received SET_KEY.CNF
|
|
SetKeyCnf says 1, this is formally 'rejected', but indeed ok.
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 0(OK)
|
|
The local modem has key 0x1 0x2 0x3 0x4 0x5 0x6 0x7 0x8 0x9 0xa 0xb 0xc 0xd 0xe 0xf 0x10
|
|
This is NOT the developer NMK.
|
|
From GetKeyCnf, got network ID (NID) 0xfb 0x4 0xc3 0x6c 0x12 0x32 0x1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] No EVSE seen (yet). Still waiting for it.
|
|
[PEVSLAC] from 13 entering 12
|
|
[PEVSLAC] Checking whether the pairing worked, by GET_KEY.REQ...
|
|
[PEVSLAC] from 12 entering 13
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 0(OK)
|
|
The local modem has key 0x1 0x2 0x3 0x4 0x5 0x6 0x7 0x8 0x9 0xa 0xb 0xc 0xd 0xe 0xf 0x10
|
|
This is NOT the developer NMK.
|
|
From GetKeyCnf, got network ID (NID) 0xfb 0x4 0xc3 0x6c 0x12 0x32 0x1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] No EVSE seen (yet). Still waiting for it.
|
|
[PEVSLAC] from 13 entering 12
|
|
[PEVSLAC] Checking whether the pairing worked, by GET_KEY.REQ...
|
|
[PEVSLAC] from 12 entering 13
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 0(OK)
|
|
The local modem has key 0x1 0x2 0x3 0x4 0x5 0x6 0x7 0x8 0x9 0xa 0xb 0xc 0xd 0xe 0xf 0x10
|
|
This is NOT the developer NMK.
|
|
From GetKeyCnf, got network ID (NID) 0xfb 0x4 0xc3 0x6c 0x12 0x32 0x1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] No EVSE seen (yet). Still waiting for it.
|
|
[PEVSLAC] from 13 entering 12
|
|
[PEVSLAC] Checking whether the pairing worked, by GET_KEY.REQ...
|
|
[PEVSLAC] from 12 entering 13
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] No EVSE seen (yet). Still waiting for it.
|
|
[PEVSLAC] from 13 entering 12
|
|
[PEVSLAC] Checking whether the pairing worked, by GET_KEY.REQ...
|
|
[PEVSLAC] from 12 entering 13
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 0(OK)
|
|
The local modem has key 0x4c 0xba 0x19 0x2c 0xe4 0x72 0xfe 0xdc 0x37 0xf4 0x12 0xa 0xcf 0x10 0x39 0x26
|
|
This is the developer NMK.
|
|
From GetKeyCnf, got network ID (NID) 0xfb 0x4 0xc3 0x6c 0x12 0x32 0x1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] No EVSE seen (yet). Still waiting for it.
|
|
[PEVSLAC] from 13 entering 12
|
|
[PEVSLAC] Checking whether the pairing worked, by GET_KEY.REQ...
|
|
[PEVSLAC] from 12 entering 13
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 0(OK)
|
|
The local modem has key 0x4c 0xba 0x19 0x2c 0xe4 0x72 0xfe 0xdc 0x37 0xf4 0x12 0xa 0xcf 0x10 0x39 0x26
|
|
This is the developer NMK.
|
|
From GetKeyCnf, got network ID (NID) 0xfb 0x4 0xc3 0x6c 0x12 0x32 0x1
|
|
received GET_KEY.CNF
|
|
Modem #2 has BC:F2:AF:F3:05:25 and result code is 1(NOK)
|
|
Info: NOK is normal for remote modems.
|
|
From GetKeyCnf, got network ID (NID) 0xfb 0x4 0xc3 0x6c 0x12 0x32 0x1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] EVSE is up, pairing successful.
|
|
[PEVSLAC] Requesting SW versions from the modems...
|
|
[PEVSLAC] from 13 entering 14
|
|
[SNIFFER] received GET_SW.CNF
|
|
[SNIFFER] For 98:48:27:5A:3C:E6 the software version is MAC-QCA7420-1.4.0.20-00-20171027-CS
|
|
[SNIFFER] received GET_SW.CNF
|
|
[SNIFFER] For BC:F2:AF:F3:05:25 the software version is MAC-QCA7000-1.1.0.727-02-20130826-FINAL
|
|
[PEVSLAC] It was sufficient time to get the SW versions from the modems.
|
|
[PEVSLAC] from 14 entering 15
|
|
[PEVSLAC] SDP was not done yet. Now we start it.
|
|
[PEVSLAC] from 15 entering 16
|
|
[PEV] initiating SDP request
|
|
[PEVSLAC] from 16 entering 16
|
|
V2GTP (10bytes) = 01 FE 90 00 00 00 00 02 10 00
|
|
[PEV] initiating SDP request
|
|
[PEVSLAC] from 16 entering 16
|
|
V2GTP (10bytes) = 01 FE 90 00 00 00 00 02 10 00
|
|
V2GTP (28bytes) = 01 FE 90 01 00 00 00 14 FE 80 00 00 00 00 00 00 04 48 0E FF FE 3B 13 30 C7 A7 10 00
|
|
[PEV] Received SDP response
|
|
[addressManager] charger has IP fe80:0000:0000:0000:0448:0eff:fe3b:1330
|
|
[addressManager] charger has TCP port 51111
|
|
[PEVSLAC] Now we know the chargers IP.
|
|
[PLCWORKER] Network is established, ready for TCP.
|
|
[PEV] re-initializing fsmPev
|
|
[PEVSLAC] from 16 entering 12
|
|
connecting to fe80:0000:0000:0000:0448:0eff:fe3b:1330 port 51111...
|
|
step1
|
|
step2
|
|
step2b
|
|
step3
|
|
[PEV] connected
|
|
from 1 entering 2
|
|
[PEV] Sending the initial SupportedApplicationProtocolReq
|
|
from 2 entering 3
|
|
[PEV] In state WaitForSupportedApplicationProtocolResponse, received (12bytes) = 01 FE 80 01 00 00 00 04 80 40 00 40
|
|
[PEV] {
|
|
"msgName": "supportedAppProtocolRes",
|
|
"info": "4 bytes to convert",
|
|
"error": "",
|
|
"result": "ResponseCode 0, SchemaID_isUsed 1, SchemaID 1",
|
|
"schema": "appHandshake",
|
|
"debug": ""
|
|
}
|
|
[PEV] Will send SessionSetupReq
|
|
[PEV] responding (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 00 00 00 00 11 D0 00 00
|
|
from 3 entering 4
|
|
[PEV] In state WaitForSessionSetupResponse, received (30bytes) = 01 FE 80 01 00 00 00 16 80 9A 02 00 00 00 00 03 1F DC 8B D1 E0 20 04 00 1C F0 14 F3 80 C0
|
|
[PEV] {
|
|
"msgName": "SessionSetupRes",
|
|
"info": "22 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK_NewSessionEstablished",
|
|
"EVSEID.bytesLen": "1",
|
|
"EVSEID": "00",
|
|
"debug": "Line538"
|
|
}
|
|
[PEV] The Evse decided for SessionId 000000000c7f722f
|
|
[PEV] Will send ServiceDiscoveryReq
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D1 98
|
|
from 4 entering 5
|
|
[PEV] In state WaitForServiceDiscoveryResponse, received (27bytes) = 01 FE 80 01 00 00 00 13 80 9A 02 00 00 00 00 03 1F DC 8B D1 A0 01 20 02 41 00 C4
|
|
[PEV] {
|
|
"msgName": "ServiceDiscoveryRes",
|
|
"info": "19 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"debug": "Line514"
|
|
}
|
|
[PEV] Will send ServicePaymentSelectionReq
|
|
[PEV] responding (24bytes) = 01 FE 80 01 00 00 00 10 80 9A 02 00 00 00 00 03 1F DC 8B D1 B2 00 12 80
|
|
from 5 entering 6
|
|
[PEV] In state WaitForServicePaymentSelectionResponse, received (22bytes) = 01 FE 80 01 00 00 00 0E 80 9A 02 00 00 00 00 03 1F DC 8B D1 C0 00
|
|
[PEV] {
|
|
"msgName": "ServicePaymentSelectionRes",
|
|
"info": "14 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"debug": "Line526"
|
|
}
|
|
[PEV] Will send ContractAuthenticationReq
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 6 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #2
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #3
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #4
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #5
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #6
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #7
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #8
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #9
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEVSLAC] Checking whether the pairing worked, by GET_KEY.REQ...
|
|
[PEVSLAC] from 12 entering 13
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 0(OK)
|
|
The local modem has key 0x4c 0xba 0x19 0x2c 0xe4 0x72 0xfe 0xdc 0x37 0xf4 0x12 0xa 0xcf 0x10 0x39 0x26
|
|
This is the developer NMK.
|
|
From GetKeyCnf, got network ID (NID) 0xfb 0x4 0xc3 0x6c 0x12 0x32 0x1
|
|
received GET_KEY.CNF
|
|
Modem #2 has BC:F2:AF:F3:05:25 and result code is 1(NOK)
|
|
Info: NOK is normal for remote modems.
|
|
From GetKeyCnf, got network ID (NID) 0xfb 0x4 0xc3 0x6c 0x12 0x32 0x1
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #10
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] EVSE is up, pairing successful.
|
|
[PEVSLAC] Requesting SW versions from the modems...
|
|
[PEVSLAC] from 13 entering 14
|
|
[SNIFFER] received GET_SW.CNF
|
|
[SNIFFER] For 98:48:27:5A:3C:E6 the software version is MAC-QCA7420-1.4.0.20-00-20171027-CS
|
|
[SNIFFER] received GET_SW.CNF
|
|
[SNIFFER] For BC:F2:AF:F3:05:25 the software version is MAC-QCA7000-1.1.0.727-02-20130826-FINAL
|
|
[PEVSLAC] It was sufficient time to get the SW versions from the modems.
|
|
[PEVSLAC] from 14 entering 15
|
|
[PEVSLAC] from 15 entering 12
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #11
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #12
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #13
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #14
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #15
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #16
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #17
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #18
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #19
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #20
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEVSLAC] Checking whether the pairing worked, by GET_KEY.REQ...
|
|
[PEVSLAC] from 12 entering 13
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 0(OK)
|
|
The local modem has key 0x4c 0xba 0x19 0x2c 0xe4 0x72 0xfe 0xdc 0x37 0xf4 0x12 0xa 0xcf 0x10 0x39 0x26
|
|
This is the developer NMK.
|
|
From GetKeyCnf, got network ID (NID) 0xfb 0x4 0xc3 0x6c 0x12 0x32 0x1
|
|
received GET_KEY.CNF
|
|
Modem #2 has BC:F2:AF:F3:05:25 and result code is 1(NOK)
|
|
Info: NOK is normal for remote modems.
|
|
From GetKeyCnf, got network ID (NID) 0xfb 0x4 0xc3 0x6c 0x12 0x32 0x1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] EVSE is up, pairing successful.
|
|
[PEVSLAC] Requesting SW versions from the modems...
|
|
[PEVSLAC] from 13 entering 14
|
|
[SNIFFER] received GET_SW.CNF
|
|
[SNIFFER] For 98:48:27:5A:3C:E6 the software version is MAC-QCA7420-1.4.0.20-00-20171027-CS
|
|
[SNIFFER] received GET_SW.CNF
|
|
[SNIFFER] For BC:F2:AF:F3:05:25 the software version is MAC-QCA7000-1.1.0.727-02-20130826-FINAL
|
|
[PEVSLAC] It was sufficient time to get the SW versions from the modems.
|
|
[PEVSLAC] from 14 entering 15
|
|
[PEVSLAC] from 15 entering 12
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #21
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #22
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #23
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #24
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #25
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #26
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #27
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #28
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #29
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #30
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEVSLAC] Checking whether the pairing worked, by GET_KEY.REQ...
|
|
[PEVSLAC] from 12 entering 13
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 0(OK)
|
|
The local modem has key 0x4c 0xba 0x19 0x2c 0xe4 0x72 0xfe 0xdc 0x37 0xf4 0x12 0xa 0xcf 0x10 0x39 0x26
|
|
This is the developer NMK.
|
|
From GetKeyCnf, got network ID (NID) 0xfb 0x4 0xc3 0x6c 0x12 0x32 0x1
|
|
received GET_KEY.CNF
|
|
Modem #2 has BC:F2:AF:F3:05:25 and result code is 1(NOK)
|
|
Info: NOK is normal for remote modems.
|
|
From GetKeyCnf, got network ID (NID) 0xfb 0x4 0xc3 0x6c 0x12 0x32 0x1
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #31
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] EVSE is up, pairing successful.
|
|
[PEVSLAC] Requesting SW versions from the modems...
|
|
[PEVSLAC] from 13 entering 14
|
|
[SNIFFER] received GET_SW.CNF
|
|
[SNIFFER] For 98:48:27:5A:3C:E6 the software version is MAC-QCA7420-1.4.0.20-00-20171027-CS
|
|
[SNIFFER] received GET_SW.CNF
|
|
[SNIFFER] For BC:F2:AF:F3:05:25 the software version is MAC-QCA7000-1.1.0.727-02-20130826-FINAL
|
|
[PEVSLAC] It was sufficient time to get the SW versions from the modems.
|
|
[PEVSLAC] from 14 entering 15
|
|
[PEVSLAC] from 15 entering 12
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #32
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 02 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Ongoing",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] Not (yet) finished. Will again send ContractAuthenticationReq #33
|
|
[PEV] responding (21bytes) = 01 FE 80 01 00 00 00 0D 80 9A 02 00 00 00 00 03 1F DC 8B D0 B8
|
|
from 7 entering 7
|
|
[PEV] In state WaitForContractAuthentication, received (23bytes) = 01 FE 80 01 00 00 00 0F 80 9A 02 00 00 00 00 03 1F DC 8B D0 C0 00 00
|
|
[PEV] {
|
|
"msgName": "ContractAuthenticationRes",
|
|
"info": "15 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"EVSEProcessing": "Finished",
|
|
"debug": "Line430"
|
|
}
|
|
[PEV] It is Finished. Will send ChargeParameterDiscoveryReq
|
|
[PEV] responding (32bytes) = 01 FE 80 01 00 00 00 18 80 9A 02 00 00 00 00 03 1F DC 8B D0 71 91 40 0D C0 C8 C8 23 24 70 19 00
|
|
from 7 entering 8
|
|
[PEV] In state WaitForChargeParameterDiscoveryResponse, received (57bytes) = 01 FE 80 01 00 00 00 31 80 9A 02 00 00 00 00 03 1F DC 8B D0 80 02 00 00 00 00 00 10 00 2A 80 04 00 00 14 0C 00 40 80 E1 8A 3A 0A 0A 00 A0 60 60 00 08 0A 01 E2 30 30 06 10
|
|
[PEV] {
|
|
"msgName": "ChargeParameterDiscoveryRes",
|
|
"info": "49 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "OK",
|
|
"debug": "Line406"
|
|
}
|
|
[PEV] Will send CableCheckReq
|
|
[PEV] responding (24bytes) = 01 FE 80 01 00 00 00 10 80 9A 02 00 00 00 00 03 1F DC 8B D0 10 40 00 00
|
|
from 8 entering 9
|
|
[PEV] In state WaitForCableCheckResponse, received (27bytes) = 01 FE 80 01 00 00 00 13 80 9A 02 00 00 00 00 03 1F DC 8B D0 20 A0 00 80 00 04 00
|
|
[PEV] {
|
|
"msgName": "CableCheckRes",
|
|
"info": "19 bytes to convert",
|
|
"error": "",
|
|
"result": "",
|
|
"schema": "DIN",
|
|
"g_errn": "0",
|
|
"header.SessionID": "000000000c7f722f",
|
|
"header.Notification_isUsed": "0",
|
|
"header.Signature_isUsed": "0",
|
|
"ResponseCode": "FAILED_SequenceError",
|
|
"DC_EVSEStatus.EVSEIsolationStatus": "0",
|
|
"DC_EVSEStatus.EVSEIsolationStatus_isUsed": "1",
|
|
"DC_EVSEStatus.EVSEStatusCode": "1",
|
|
"DC_EVSEStatus.NotificationMaxDelay": "0",
|
|
"DC_EVSEStatus.EVSENotification": "0",
|
|
"EVSEProcessing": "1",
|
|
"debug": "Line370"
|
|
}
|
|
[PEV] [PEV] The CableCheck result is FAILED_SequenceError 1
|
|
[PEV] Will again send CableCheckReq
|
|
[PEV] responding (24bytes) = 01 FE 80 01 00 00 00 10 80 9A 02 00 00 00 00 03 1F DC 8B D0 10 40 00 00
|
|
[PEVSLAC] Checking whether the pairing worked, by GET_KEY.REQ...
|
|
[PEVSLAC] from 12 entering 13
|
|
received GET_KEY.CNF
|
|
Modem #1 has 98:48:27:5A:3C:E6 and result code is 0(OK)
|
|
The local modem has key 0x4c 0xba 0x19 0x2c 0xe4 0x72 0xfe 0xdc 0x37 0xf4 0x12 0xa 0xcf 0x10 0x39 0x26
|
|
This is the developer NMK.
|
|
From GetKeyCnf, got network ID (NID) 0xfb 0x4 0xc3 0x6c 0x12 0x32 0x1
|
|
received GET_KEY.CNF
|
|
Modem #2 has BC:F2:AF:F3:05:25 and result code is 1(NOK)
|
|
Info: NOK is normal for remote modems.
|
|
From GetKeyCnf, got network ID (NID) 0xfb 0x4 0xc3 0x6c 0x12 0x32 0x1
|
|
[PEVSLAC] It was sufficient time to get the answers from the modems.
|
|
[PEVSLAC] EVSE is up, pairing successful.
|
|
[PEVSLAC] Requesting SW versions from the modems...
|
|
[PEVSLAC] from 13 entering 14
|
|
[SNIFFER] received GET_SW.CNF
|
|
[SNIFFER] For 98:48:27:5A:3C:E6 the software version is MAC-QCA7420-1.4.0.20-00-20171027-CS
|
|
[SNIFFER] received GET_SW.CNF
|
|
[SNIFFER] For BC:F2:AF:F3:05:25 the software version is MAC-QCA7000-1.1.0.727-02-20130826-FINAL
|
|
[PEVSLAC] It was sufficient time to get the SW versions from the modems.
|
|
[PEVSLAC] from 14 entering 15
|
|
[PEVSLAC] from 15 entering 12
|
|
|
|
C:\UwesTechnik\pyPLC> |