wpa supplicant doesn't work on feisty with Ralink Devices

Bug #105133 reported by Gnuton
2
Affects Status Importance Assigned to Milestone
wpasupplicant (Ubuntu)
New
Undecided
Unassigned

Bug Description

Binary package hint: wpasupplicant

I'm unable to connect to my WPA-PSK Wireless Network:
I've a Linksys WUsb54g; The Device works fine with WEP and OPEN networks, but it doesn't works on WPA both with rt2570 (legacy driver) and rt2500usb (experimental driver) included in the ubuntu kernel.
I've tested the last ubuntu wpasupplicant package (wpasupplicant-0.5.7-ubuntu2) and after the original version downloaded by the official site. Both doesn't works.

This is my logs:
root@arpstorm:~/WSS# ifconfig wlan0 down
root@arpstorm:~/WSS# ifconfig wlan0 up
root@arpstorm:~/WSS# iwlist s
lo Interface doesn't support scanning.

eth0 Interface doesn't support scanning.

wmaster0 Interface doesn't support scanning : Operation not supported

wlan0 Scan completed :
          Cell 01 - Address: 00:18:F8:BD:7C:D6
                    ESSID:"HEAVEN-GATE"
                    Mode:Master
                    Frequency:2.462 GHz
                    Signal level=-197 dBm Noise level=-191 dBm
                    Encryption key:on
                    Extra:wpa_ie=dd180050f20101000050f20201000050f20201000050f2020000
                    Extra:tsf=000000216aa63d26

root@arpstorm:~/WSS# cat /etc/wpa_supplicant/casa.conf
# WPA-PSK/TKIP

ctrl_interface=/var/run/wpa_supplicant

network={
        ssid="HEAVEN-GATE"
        key_mgmt=WPA-PSK
        proto=WPA
        pairwise=TKIP
        group=TKIP
        psk="secret"
        scan_ssid=0
}

root@arpstorm:~/WSS# wpa_supplicant -D wext -c /etc/wpa_supplicant/casa.conf -i wlan0
ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 4 value 0x0 - ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 5 value 0x1 - ioctl[SIOCGIWSCAN]: Resource temporarily unavailable
Trying to associate with 00:18:f8:bd:7c:d6 (SSID='HEAVEN-GATE' freq=2462 MHz)
ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 5 value 0x1 - ioctl[SIOCSIWMODE]: Device or resource busy
Association request to the driver failed
Associated with 00:18:f8:bd:7c:d6
WPA: Key negotiation completed with 00:18:f8:bd:7c:d6 [PTK=TKIP GTK=TKIP]
CTRL-EVENT-CONNECTED - Connection to 00:18:f8:bd:7c:d6 completed (auth) [id=0 id_str=]
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Associated with 00:18:f8:bd:7c:d6
WPA: Key negotiation completed with 00:18:f8:bd:7c:d6 [PTK=TKIP GTK=TKIP]
CTRL-EVENT-CONNECTED - Connection to 00:18:f8:bd:7c:d6 completed (reauth) [id=0 id_str=]
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Associated with 00:18:f8:bd:7c:d6
WPA: Key negotiation completed with 00:18:f8:bd:7c:d6 [PTK=TKIP GTK=TKIP]
CTRL-EVENT-CONNECTED - Connection to 00:18:f8:bd:7c:d6 completed (reauth) [id=0 id_str=]
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Associated with 00:18:f8:bd:7c:d6
WPA: Key negotiation completed with 00:18:f8:bd:7c:d6 [PTK=TKIP GTK=TKIP]
CTRL-EVENT-CONNECTED - Connection to 00:18:f8:bd:7c:d6 completed (reauth) [id=0 id_str=]
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]

********************************************************************************************************************************
root@arpstorm:~/WSS# wpa_supplicant -D wext -c /etc/wpa_supplicant/casa.conf -i wlan0 -dddd
Initializing interface 'wlan0' conf '/etc/wpa_supplicant/casa.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/casa.conf' -> '/etc/wpa_supplicant/casa.conf'
Reading configuration file '/etc/wpa_supplicant/casa.conf'
ctrl_interface='/var/run/wpa_supplicant'
Line: 5 - start of a new network block
ssid -root@arpstorm:~/WSS# wpa_supplicant -D wext -c /etc/wpa_supplicant/casa.conf -i wlan0 -dddd
Initializing interface 'wlan0' conf '/etc/wpa_supplicant/casa.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/casa.conf' -> '/etc/wpa_supplicant/casa.conf'
Reading configuration file '/etc/wpa_supplicant/casa.conf'
ctrl_interface='/var/run/wpa_supplicant'
Line: 5 - start of a new network block
ssid - hexdump_ascii(len=11):
     48 45 41 56 45 4e 2d 47 41 54 45 HEAVEN-GATE
key_mgmt: 0x2
proto: 0x1
pairwise: 0x8
group: 0x8
PSK (ASCII passphrase) - hexdump_ascii(len=10): [REMOVED]
scan_ssid=0 (0x0)
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='HEAVEN-GATE'
Initializing interface (2) 'wlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=21 WE(source)=14 enc_capa=0x0
  capabilities: key_mgmt 0x0 enc 0x3
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:12:17:81:84:41
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 4 value 0x0 - wpa_driver_wext_set_drop_unencrypted
ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 5 value 0x1 - Setting scan request: 0 sec 100000 usec
Added interface wlan0
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
Wireless event: cmd=0x8b06 len=8
Ignore event for foreign ifindex 10
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 0 bytes of scan results (0 BSSes)
Scan results: 0
Selecting BSS from priority group 0
No suitable AP found.
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b19 len=8
ioctl[SIOCGIWSCAN]: Resource temporarily unavailable
Scan results: -1
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 1 sec 0 usec
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b19 len=8
Received 170 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:18:f8:bd:7c:d6 ssid='HEAVEN-GATE' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
Trying to associate with 00:18:f8:bd:7c:d6 (SSID='HEAVEN-GATE' freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
ioctl[SIOCSIWMODE]: Device or resource busy
Association request to the driver failed
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b1a len=19
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=189
WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=000b48454156454e2d47415445010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd06001018020004)'
Association info event
req_ies - hexdump(len=53): 00 0b 48 45 41 56 45 4e 2d 47 41 54 45 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 00 04
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:18:f8:bd:7c:d6
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:18:f8:bd:7c:d6
No keys have been configured - skip key clearing
Associated with 00:18:f8:bd:7c:d6
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:18:f8:bd:7c:d6 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 2c 0a 88 30 10 9e 61 61 2b 3b ad 58 5b 5c b7 bf 4a 07 06 6d 06 3b 74 ce e5 05 ee 1f f7 03 14 6c
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 2c 0a 88 30 10 9e 61 61 2b 3b ad 58 5b 5c b7 bf 4a 07 06 6d 06 3b 74 ce e5 05 ee 1f f7 03 14 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c5 63 7b 69 3b da d1 9c 34 30 44 7e 69 08 c2 a0 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 74 db ec 05 a1 50 1c c2 40 94 40 7b be b3 84 03 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
IEEE 802.1X RX: version=1 type=3 length=121
  EAPOL-Key type=254
  key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=32 key_data_length=26
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 74 db ec 05 a1 50 1c c2 40 94 40 7b be b3 84 03
WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 74 db ec 05 a1 50 1c c2 40 94 40 7b be b3 84 03 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:18:f8:bd:7c:d6 (ver=1)
WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 06 60 2c 0f 11 44 b4 17 1e 5e ac 24 31 81 9c 48 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 02 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c f8 bd 07 96 6e ce 67 11 13 f6 40 2e 20 f1 89 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57
  key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f
  key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 0c f8 bd 07 96 6e ce 67 11 13 f6 40 2e 20 f1 89
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 02 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c f8 bd 07 96 6e ce 67 11 13 f6 40 2e 20 f1 89 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0
WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 94 04 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 af e0 ea 01 fd 0c 3a 80 f3 db 60 54 e6 9a 6c 07 00 00
WPA: Key negotiation completed with 00:18:f8:bd:7c:d6 [PTK=TKIP GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:18:f8:bd:7c:d6 completed (auth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18 4b 83 f9 50 11 36 b8 3a d1 84 cb 44 55 8a e7 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57
  key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f
  key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 18 4b 83 f9 50 11 36 b8 3a d1 84 cb 44 55 8a e7
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18 4b 83 f9 50 11 36 b8 3a d1 84 cb 44 55 8a e7 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0
WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 94 04 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 32 86 c7 55 13 4a 06 9e bd 22 c6 53 ce 95 8a e6 00 00
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
State: GROUP_HANDSHAKE -> COMPLETED
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 04 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 44 84 aa 69 5a c8 22 f0 77 20 4b 72 0e 0a 86 e8 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57
  key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f
  key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 44 84 aa 69 5a c8 22 f0 77 20 4b 72 0e 0a 86 e8
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 04 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 44 84 aa 69 5a c8 22 f0 77 20 4b 72 0e 0a 86 e8 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0
WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 94 04 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ea c6 da 8d 1f 7d 3a af b3 63 5a 1b ca e3 c5 34 00 00
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
State: GROUP_HANDSHAKE -> COMPLETED
EAPOL: startWhen --> 0
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 05 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ec 2f c4 50 b4 d3 94 d0 70 55 c1 53 2d a5 d2 20 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
  key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57
  key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f
  key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): ec 2f c4 50 b4 d3 94 d0 70 55 c1 53 2d a5 d2 20
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 05 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ec 2f c4 50 b4 d3 94 d0 70 55 c1 53 2d a5 d2 20 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0
WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 94 04 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0a a7 5a fc 15 0b 9f d9 59 f8 73 60 7a 9b 2c 2e 00 00
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
State: GROUP_HANDSHAKE -> COMPLETED
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:18:f8:bd:7c:d6 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=189
WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=000b48454156454e2d47415445010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd06001018020004)'
Association info event
req_ies - hexdump(len=53): 00 0b 48 45 41 56 45 4e 2d 47 41 54 45 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 00 04
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:18:f8:bd:7c:d6
State: SCANNING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:18:f8:bd:7c:d6
No keys have been configured - skip key clearing
Associated with 00:18:f8:bd:7c:d6
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b19 len=8
Received 170 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:18:f8:bd:7c:d6 ssid='HEAVEN-GATE' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
Already associated with the selected AP.
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:18:f8:bd:7c:d6 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 3d e7 9c bf 0c 7d a0 20 79 92 f9 2a 86 72 df f2 ad f9 64 4c b5 b4 06 f0 64 6e 97 2a 0c 80 8f 26
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 3d e7 9c bf 0c 7d a0 20 79 92 f9 2a 86 72 df f2 ad f9 64 4c b5 b4 06 f0 64 6e 97 2a 0c 80 8f 26 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 37 8d e9 0c 55 8a d0 3d be 94 9e 40 49 ea d6 89 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 86 5a e9 14 3b b8 6a 10 a4 d9 7b 98 44 10 cb cc 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
IEEE 802.1X RX: version=1 type=3 length=121
  EAPOL-Key type=254
  key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=32 key_data_length=26
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 86 5a e9 14 3b b8 6a 10 a4 d9 7b 98 44 10 cb cc
WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 86 5a e9 14 3b b8 6a 10 a4 d9 7b 98 44 10 cb cc 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:18:f8:bd:7c:d6 (ver=1)
WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e7 d8 9c 9f 4d fe 13 e3 78 f6 8b 25 9b 16 dd 8b 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 76 94 8f 39 78 49 96 92 f0 65 17 f6 53 52 a7 4c 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57
  key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90
  key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 76 94 8f 39 78 49 96 92 f0 65 17 f6 53 52 a7 4c
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 76 94 8f 39 78 49 96 92 f0 65 17 f6 53 52 a7 4c 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20
WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 94 04 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a3 c1 90 b9 c6 00 f5 fe f3 42 18 05 c5 96 05 c2 00 00
WPA: Key negotiation completed with 00:18:f8:bd:7c:d6 [PTK=TKIP GTK=TKIP]
Cancelling authentication timeout
Removed BSSID 00:18:f8:bd:7c:d6 from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:18:f8:bd:7c:d6 completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 04 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 66 98 d1 12 95 c3 6d 18 69 91 70 34 f4 ba c4 2c 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57
  key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90
  key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 66 98 d1 12 95 c3 6d 18 69 91 70 34 f4 ba c4 2c
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 04 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 66 98 d1 12 95 c3 6d 18 69 91 70 34 f4 ba c4 2c 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20
WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 94 04 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 61 b1 b3 28 90 c8 01 d4 a1 0b 8e c9 51 b2 bc d2 00 00
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
State: GROUP_HANDSHAKE -> COMPLETED
EAPOL: startWhen --> 0
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 05 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 11 a6 20 84 50 ad d3 d3 6d 7e 82 b0 4e 8c f8 bc 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
  key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57
  key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90
  key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 11 a6 20 84 50 ad d3 d3 6d 7e 82 b0 4e 8c f8 bc
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 05 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 11 a6 20 84 50 ad d3 d3 6d 7e 82 b0 4e 8c f8 bc 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20
WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 94 04 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 de e9 3c 6f 65 b0 e7 1b 1e 62 8f 90 23 58 4b d4 00 00
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
State: GROUP_HANDSHAKE -> COMPLETED
RX EAPOL from 00:18:f8:bd:7c:d6
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 06 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c 5a 38 a6 4f 39 e2 1d 18 c0 ea b1 ef ee 2e 7b 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06
  key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57
  key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90
  key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 2c 5a 38 a6 4f 39 e2 1d 18 c0 ea b1 ef ee 2e 7b
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 06 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c 5a 38 a6 4f 39 e2 1d 18 c0 ea b1 ef ee 2e 7b 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20
WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 94 04 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 54 f2 29 c3 fe 8e cf aa 29 2e 76 d1 13 bf 51 3c 00 00
WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP]
State: GROUP_HANDSHAKE -> COMPLETED
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:18:f8:bd:7c:d6 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=189
WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=000b48454156454e2d47415445010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd06001018020004)'
Association info event
req_ies - hexdump(len=53): 00 0b 48 45 41 56 45 4e 2d 47 41 54 45 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 00 04
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:18:f8:bd:7c:d6
State: SCANNING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:18:f8:bd:7c:d6
No keys have been configured - skip key clearing
Associated with 00:18:f8:bd:7c:d6
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface wlan0
State: ASSOCIATED -> DISCONNECTED
 hexdump_ascii(len=11):
     48 45 41 56 45 4e 2d 47 41 54 45 HEAVEN-GATE
key_mgmt: 0x2
proto: 0x1
pairwise: 0x8
group: 0x8
PSK (ASCII passphrase) - hexdump_ascii(len=10): [REMOVED]
scan_ssid=0 (0x0)
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='HEAVEN-GATE'
Initializing interface (2) 'wlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=21 WE(source)=14 enc_capa=0x0
  capabilities: key_mgmt 0x0 enc 0x3
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:12:17:81:84:41
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 4 value 0x0 - wpa_driver_wext_set_drop_unencrypted
ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 5 value 0x1 - Setting scan request: 0 sec 100000 usec
Added interface wlan0
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
Wireless event: cmd=0x8b06 len=8
Ignore event for foreign ifindex 10
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 0 bytes of scan results (0 BSSes)
Scan results: 0
Selecting BSS from priority group 0
No suitable AP found.
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b19 len=8
ioctl[SIOCGIWSCAN]: Resource temporarily unavailable
Scan results: -1
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 1 sec 0 usec
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b19 len=8
Received 170 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:18:f8:bd:7c:d6 ssid='HEAVEN-GATE' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
Trying to associate with 00:18:f8:bd:7c:d6 (SSID='HEAVEN-GATE' freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
ioctl[SIOCSIWMODE]: Device or resource busy
Association request to the driver failed
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b1a len=19
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=189
WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=000b48454156454e2d47415445010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd06001018020004)'
Association info event
req_ies - hexdump(len=53): 00 0b 48 45 41 56 45 4e 2d 47 41 54 45 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 00 04
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:18:f8:bd:7c:d6
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:18:f8:bd:7c:d6
No keys have been configured - skip key clearing
Associated with 00:18:f8:bd:7c:d6
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portE

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.