Binary package hint: wpasupplicant I'm unable to connect to my WPA-PSK Wireless Network: I've a Linksys WUsb54g; The Device works fine with WEP and OPEN networks, but it doesn't works on WPA both with rt2570 (legacy driver) and rt2500usb (experimental driver) included in the ubuntu kernel. I've tested the last ubuntu wpasupplicant package (wpasupplicant-0.5.7-ubuntu2) and after the original version downloaded by the official site. Both doesn't works. This is my logs: root@arpstorm:~/WSS# ifconfig wlan0 down root@arpstorm:~/WSS# ifconfig wlan0 up root@arpstorm:~/WSS# iwlist s lo Interface doesn't support scanning. eth0 Interface doesn't support scanning. wmaster0 Interface doesn't support scanning : Operation not supported wlan0 Scan completed : Cell 01 - Address: 00:18:F8:BD:7C:D6 ESSID:"HEAVEN-GATE" Mode:Master Frequency:2.462 GHz Signal level=-197 dBm Noise level=-191 dBm Encryption key:on Extra:wpa_ie=dd180050f20101000050f20201000050f20201000050f2020000 Extra:tsf=000000216aa63d26 root@arpstorm:~/WSS# cat /etc/wpa_supplicant/casa.conf # WPA-PSK/TKIP ctrl_interface=/var/run/wpa_supplicant network={ ssid="HEAVEN-GATE" key_mgmt=WPA-PSK proto=WPA pairwise=TKIP group=TKIP psk="secret" scan_ssid=0 } root@arpstorm:~/WSS# wpa_supplicant -D wext -c /etc/wpa_supplicant/casa.conf -i wlan0 ioctl[SIOCSIWAUTH]: Operation not supported WEXT auth param 4 value 0x0 - ioctl[SIOCSIWAUTH]: Operation not supported WEXT auth param 5 value 0x1 - ioctl[SIOCGIWSCAN]: Resource temporarily unavailable Trying to associate with 00:18:f8:bd:7c:d6 (SSID='HEAVEN-GATE' freq=2462 MHz) ioctl[SIOCSIWAUTH]: Operation not supported WEXT auth param 5 value 0x1 - ioctl[SIOCSIWMODE]: Device or resource busy Association request to the driver failed Associated with 00:18:f8:bd:7c:d6 WPA: Key negotiation completed with 00:18:f8:bd:7c:d6 [PTK=TKIP GTK=TKIP] CTRL-EVENT-CONNECTED - Connection to 00:18:f8:bd:7c:d6 completed (auth) [id=0 id_str=] WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys Associated with 00:18:f8:bd:7c:d6 WPA: Key negotiation completed with 00:18:f8:bd:7c:d6 [PTK=TKIP GTK=TKIP] CTRL-EVENT-CONNECTED - Connection to 00:18:f8:bd:7c:d6 completed (reauth) [id=0 id_str=] WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys Associated with 00:18:f8:bd:7c:d6 WPA: Key negotiation completed with 00:18:f8:bd:7c:d6 [PTK=TKIP GTK=TKIP] CTRL-EVENT-CONNECTED - Connection to 00:18:f8:bd:7c:d6 completed (reauth) [id=0 id_str=] WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys Associated with 00:18:f8:bd:7c:d6 WPA: Key negotiation completed with 00:18:f8:bd:7c:d6 [PTK=TKIP GTK=TKIP] CTRL-EVENT-CONNECTED - Connection to 00:18:f8:bd:7c:d6 completed (reauth) [id=0 id_str=] WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] ******************************************************************************************************************************** root@arpstorm:~/WSS# wpa_supplicant -D wext -c /etc/wpa_supplicant/casa.conf -i wlan0 -dddd Initializing interface 'wlan0' conf '/etc/wpa_supplicant/casa.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/etc/wpa_supplicant/casa.conf' -> '/etc/wpa_supplicant/casa.conf' Reading configuration file '/etc/wpa_supplicant/casa.conf' ctrl_interface='/var/run/wpa_supplicant' Line: 5 - start of a new network block ssid -root@arpstorm:~/WSS# wpa_supplicant -D wext -c /etc/wpa_supplicant/casa.conf -i wlan0 -dddd Initializing interface 'wlan0' conf '/etc/wpa_supplicant/casa.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/etc/wpa_supplicant/casa.conf' -> '/etc/wpa_supplicant/casa.conf' Reading configuration file '/etc/wpa_supplicant/casa.conf' ctrl_interface='/var/run/wpa_supplicant' Line: 5 - start of a new network block ssid - hexdump_ascii(len=11): 48 45 41 56 45 4e 2d 47 41 54 45 HEAVEN-GATE key_mgmt: 0x2 proto: 0x1 pairwise: 0x8 group: 0x8 PSK (ASCII passphrase) - hexdump_ascii(len=10): [REMOVED] scan_ssid=0 (0x0) PSK (from passphrase) - hexdump(len=32): [REMOVED] Priority group 0 id=0 ssid='HEAVEN-GATE' Initializing interface (2) 'wlan0' EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 SIOCGIWRANGE: WE(compiled)=21 WE(source)=14 enc_capa=0x0 capabilities: key_mgmt 0x0 enc 0x3 WEXT: Operstate: linkmode=1, operstate=5 Own MAC address: 00:12:17:81:84:41 wpa_driver_wext_set_wpa wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_countermeasures ioctl[SIOCSIWAUTH]: Operation not supported WEXT auth param 4 value 0x0 - wpa_driver_wext_set_drop_unencrypted ioctl[SIOCSIWAUTH]: Operation not supported WEXT auth param 5 value 0x1 - Setting scan request: 0 sec 100000 usec Added interface wlan0 RTM_NEWLINK: operstate=0 ifi_flags=0x1002 () Wireless event: cmd=0x8b06 len=8 Ignore event for foreign ifindex 10 RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Trying to get current scan results first without requesting a new scan to speed up initial association Received 0 bytes of scan results (0 BSSes) Scan results: 0 Selecting BSS from priority group 0 No suitable AP found. Setting scan request: 0 sec 0 usec Starting AP scan (broadcast SSID) RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b19 len=8 ioctl[SIOCGIWSCAN]: Resource temporarily unavailable Scan results: -1 Failed to get scan results Failed to get scan results - try scanning again Setting scan request: 1 sec 0 usec RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b19 len=8 Received 170 bytes of scan results (1 BSSes) Scan results: 1 Selecting BSS from priority group 0 0: 00:18:f8:bd:7c:d6 ssid='HEAVEN-GATE' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 selected based on WPA IE Trying to associate with 00:18:f8:bd:7c:d6 (SSID='HEAVEN-GATE' freq=2462 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 WPA: using IEEE 802.11i/D3.0 WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1 WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: clearing AP RSN IE WPA: using GTK TKIP WPA: using PTK TKIP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted ioctl[SIOCSIWAUTH]: Operation not supported WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate ioctl[SIOCSIWMODE]: Device or resource busy Association request to the driver failed Setting authentication timeout: 5 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b1a len=19 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8c02 len=189 WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=000b48454156454e2d47415445010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd06001018020004)' Association info event req_ies - hexdump(len=53): 00 0b 48 45 41 56 45 4e 2d 47 41 54 45 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 00 04 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:18:f8:bd:7c:d6 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:18:f8:bd:7c:d6 No keys have been configured - skip key clearing Associated with 00:18:f8:bd:7c:d6 WPA: Association event - clear replay counter EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) key_length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:18:f8:bd:7c:d6 (ver=1) WPA: Renewed SNonce - hexdump(len=32): 2c 0a 88 30 10 9e 61 61 2b 3b ad 58 5b 5c b7 bf 4a 07 06 6d 06 3b 74 ce e5 05 ee 1f f7 03 14 6c WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 2c 0a 88 30 10 9e 61 61 2b 3b ad 58 5b 5c b7 bf 4a 07 06 6d 06 3b 74 ce e5 05 ee 1f f7 03 14 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c5 63 7b 69 3b da d1 9c 34 30 44 7e 69 08 c2 a0 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 74 db ec 05 a1 50 1c c2 40 94 40 7b be b3 84 03 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 IEEE 802.1X RX: version=1 type=3 length=121 EAPOL-Key type=254 key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) key_length=32 key_data_length=26 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 74 db ec 05 a1 50 1c c2 40 94 40 7b be b3 84 03 WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 74 db ec 05 a1 50 1c c2 40 94 40 7b be b3 84 03 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:18:f8:bd:7c:d6 (ver=1) WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 06 60 2c 0f 11 44 b4 17 1e 5e ac 24 31 81 9c 48 00 00 WPA: Installing PTK to the driver. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 02 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c f8 bd 07 96 6e ce 67 11 13 f6 40 2e 20 f1 89 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0 IEEE 802.1X RX: version=1 type=3 length=127 EAPOL-Key type=254 key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure) key_length=32 key_data_length=32 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 0c f8 bd 07 96 6e ce 67 11 13 f6 40 2e 20 f1 89 WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 02 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c f8 bd 07 96 6e ce 67 11 13 f6 40 2e 20 f1 89 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0 WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1) State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=1 tx=0). WPA: RSC - hexdump(len=6): 94 04 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 af e0 ea 01 fd 0c 3a 80 f3 db 60 54 e6 9a 6c 07 00 00 WPA: Key negotiation completed with 00:18:f8:bd:7c:d6 [PTK=TKIP GTK=TKIP] Cancelling authentication timeout State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:18:f8:bd:7c:d6 completed (auth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18 4b 83 f9 50 11 36 b8 3a d1 84 cb 44 55 8a e7 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0 IEEE 802.1X RX: version=1 type=3 length=127 EAPOL-Key type=254 key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure) key_length=32 key_data_length=32 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 18 4b 83 f9 50 11 36 b8 3a d1 84 cb 44 55 8a e7 WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18 4b 83 f9 50 11 36 b8 3a d1 84 cb 44 55 8a e7 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0 WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1) State: COMPLETED -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=1 tx=0). WPA: RSC - hexdump(len=6): 94 04 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 32 86 c7 55 13 4a 06 9e bd 22 c6 53 ce 95 8a e6 00 00 WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] State: GROUP_HANDSHAKE -> COMPLETED RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 04 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 44 84 aa 69 5a c8 22 f0 77 20 4b 72 0e 0a 86 e8 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0 IEEE 802.1X RX: version=1 type=3 length=127 EAPOL-Key type=254 key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure) key_length=32 key_data_length=32 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 44 84 aa 69 5a c8 22 f0 77 20 4b 72 0e 0a 86 e8 WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 04 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 44 84 aa 69 5a c8 22 f0 77 20 4b 72 0e 0a 86 e8 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0 WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1) State: COMPLETED -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=1 tx=0). WPA: RSC - hexdump(len=6): 94 04 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ea c6 da 8d 1f 7d 3a af b3 63 5a 1b ca e3 c5 34 00 00 WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] State: GROUP_HANDSHAKE -> COMPLETED EAPOL: startWhen --> 0 RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 05 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ec 2f c4 50 b4 d3 94 d0 70 55 c1 53 2d a5 d2 20 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0 IEEE 802.1X RX: version=1 type=3 length=127 EAPOL-Key type=254 key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure) key_length=32 key_data_length=32 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): ec 2f c4 50 b4 d3 94 d0 70 55 c1 53 2d a5 d2 20 WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 05 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ec 2f c4 50 b4 d3 94 d0 70 55 c1 53 2d a5 d2 20 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0 WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1) State: COMPLETED -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=1 tx=0). WPA: RSC - hexdump(len=6): 94 04 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0a a7 5a fc 15 0b 9f d9 59 f8 73 60 7a 9b 2c 2e 00 00 WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] State: GROUP_HANDSHAKE -> COMPLETED RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID 00:18:f8:bd:7c:d6 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8c02 len=189 WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=000b48454156454e2d47415445010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd06001018020004)' Association info event req_ies - hexdump(len=53): 00 0b 48 45 41 56 45 4e 2d 47 41 54 45 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 00 04 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:18:f8:bd:7c:d6 State: SCANNING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:18:f8:bd:7c:d6 No keys have been configured - skip key clearing Associated with 00:18:f8:bd:7c:d6 WPA: Association event - clear replay counter EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b19 len=8 Received 170 bytes of scan results (1 BSSes) Scan results: 1 Selecting BSS from priority group 0 0: 00:18:f8:bd:7c:d6 ssid='HEAVEN-GATE' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 selected based on WPA IE Already associated with the selected AP. RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) key_length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:18:f8:bd:7c:d6 (ver=1) WPA: Renewed SNonce - hexdump(len=32): 3d e7 9c bf 0c 7d a0 20 79 92 f9 2a 86 72 df f2 ad f9 64 4c b5 b4 06 f0 64 6e 97 2a 0c 80 8f 26 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 3d e7 9c bf 0c 7d a0 20 79 92 f9 2a 86 72 df f2 ad f9 64 4c b5 b4 06 f0 64 6e 97 2a 0c 80 8f 26 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 37 8d e9 0c 55 8a d0 3d be 94 9e 40 49 ea d6 89 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 86 5a e9 14 3b b8 6a 10 a4 d9 7b 98 44 10 cb cc 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 IEEE 802.1X RX: version=1 type=3 length=121 EAPOL-Key type=254 key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) key_length=32 key_data_length=26 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 86 5a e9 14 3b b8 6a 10 a4 d9 7b 98 44 10 cb cc WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 86 5a e9 14 3b b8 6a 10 a4 d9 7b 98 44 10 cb cc 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:18:f8:bd:7c:d6 (ver=1) WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e7 d8 9c 9f 4d fe 13 e3 78 f6 8b 25 9b 16 dd 8b 00 00 WPA: Installing PTK to the driver. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 76 94 8f 39 78 49 96 92 f0 65 17 f6 53 52 a7 4c 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20 IEEE 802.1X RX: version=1 type=3 length=127 EAPOL-Key type=254 key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure) key_length=32 key_data_length=32 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 76 94 8f 39 78 49 96 92 f0 65 17 f6 53 52 a7 4c WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 76 94 8f 39 78 49 96 92 f0 65 17 f6 53 52 a7 4c 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20 WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1) State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=1 tx=0). WPA: RSC - hexdump(len=6): 94 04 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a3 c1 90 b9 c6 00 f5 fe f3 42 18 05 c5 96 05 c2 00 00 WPA: Key negotiation completed with 00:18:f8:bd:7c:d6 [PTK=TKIP GTK=TKIP] Cancelling authentication timeout Removed BSSID 00:18:f8:bd:7c:d6 from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:18:f8:bd:7c:d6 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 04 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 66 98 d1 12 95 c3 6d 18 69 91 70 34 f4 ba c4 2c 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20 IEEE 802.1X RX: version=1 type=3 length=127 EAPOL-Key type=254 key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure) key_length=32 key_data_length=32 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 66 98 d1 12 95 c3 6d 18 69 91 70 34 f4 ba c4 2c WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 04 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 66 98 d1 12 95 c3 6d 18 69 91 70 34 f4 ba c4 2c 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20 WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1) State: COMPLETED -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=1 tx=0). WPA: RSC - hexdump(len=6): 94 04 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 61 b1 b3 28 90 c8 01 d4 a1 0b 8e c9 51 b2 bc d2 00 00 WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] State: GROUP_HANDSHAKE -> COMPLETED EAPOL: startWhen --> 0 RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 05 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 11 a6 20 84 50 ad d3 d3 6d 7e 82 b0 4e 8c f8 bc 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20 IEEE 802.1X RX: version=1 type=3 length=127 EAPOL-Key type=254 key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure) key_length=32 key_data_length=32 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 11 a6 20 84 50 ad d3 d3 6d 7e 82 b0 4e 8c f8 bc WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 05 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 11 a6 20 84 50 ad d3 d3 6d 7e 82 b0 4e 8c f8 bc 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20 WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1) State: COMPLETED -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=1 tx=0). WPA: RSC - hexdump(len=6): 94 04 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 de e9 3c 6f 65 b0 e7 1b 1e 62 8f 90 23 58 4b d4 00 00 WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] State: GROUP_HANDSHAKE -> COMPLETED RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 06 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c 5a 38 a6 4f 39 e2 1d 18 c0 ea b1 ef ee 2e 7b 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20 IEEE 802.1X RX: version=1 type=3 length=127 EAPOL-Key type=254 key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure) key_length=32 key_data_length=32 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 2c 5a 38 a6 4f 39 e2 1d 18 c0 ea b1 ef ee 2e 7b WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 06 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c 5a 38 a6 4f 39 e2 1d 18 c0 ea b1 ef ee 2e 7b 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20 WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1) State: COMPLETED -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=1 tx=0). WPA: RSC - hexdump(len=6): 94 04 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 54 f2 29 c3 fe 8e cf aa 29 2e 76 d1 13 bf 51 3c 00 00 WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] State: GROUP_HANDSHAKE -> COMPLETED RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID 00:18:f8:bd:7c:d6 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8c02 len=189 WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=000b48454156454e2d47415445010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd06001018020004)' Association info event req_ies - hexdump(len=53): 00 0b 48 45 41 56 45 4e 2d 47 41 54 45 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 00 04 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:18:f8:bd:7c:d6 State: SCANNING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:18:f8:bd:7c:d6 No keys have been configured - skip key clearing Associated with 00:18:f8:bd:7c:d6 WPA: Association event - clear replay counter EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request CTRL-EVENT-TERMINATING - signal 2 received Removing interface wlan0 State: ASSOCIATED -> DISCONNECTED hexdump_ascii(len=11): 48 45 41 56 45 4e 2d 47 41 54 45 HEAVEN-GATE key_mgmt: 0x2 proto: 0x1 pairwise: 0x8 group: 0x8 PSK (ASCII passphrase) - hexdump_ascii(len=10): [REMOVED] scan_ssid=0 (0x0) PSK (from passphrase) - hexdump(len=32): [REMOVED] Priority group 0 id=0 ssid='HEAVEN-GATE' Initializing interface (2) 'wlan0' EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 SIOCGIWRANGE: WE(compiled)=21 WE(source)=14 enc_capa=0x0 capabilities: key_mgmt 0x0 enc 0x3 WEXT: Operstate: linkmode=1, operstate=5 Own MAC address: 00:12:17:81:84:41 wpa_driver_wext_set_wpa wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_countermeasures ioctl[SIOCSIWAUTH]: Operation not supported WEXT auth param 4 value 0x0 - wpa_driver_wext_set_drop_unencrypted ioctl[SIOCSIWAUTH]: Operation not supported WEXT auth param 5 value 0x1 - Setting scan request: 0 sec 100000 usec Added interface wlan0 RTM_NEWLINK: operstate=0 ifi_flags=0x1002 () Wireless event: cmd=0x8b06 len=8 Ignore event for foreign ifindex 10 RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Trying to get current scan results first without requesting a new scan to speed up initial association Received 0 bytes of scan results (0 BSSes) Scan results: 0 Selecting BSS from priority group 0 No suitable AP found. Setting scan request: 0 sec 0 usec Starting AP scan (broadcast SSID) RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b19 len=8 ioctl[SIOCGIWSCAN]: Resource temporarily unavailable Scan results: -1 Failed to get scan results Failed to get scan results - try scanning again Setting scan request: 1 sec 0 usec RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b19 len=8 Received 170 bytes of scan results (1 BSSes) Scan results: 1 Selecting BSS from priority group 0 0: 00:18:f8:bd:7c:d6 ssid='HEAVEN-GATE' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 selected based on WPA IE Trying to associate with 00:18:f8:bd:7c:d6 (SSID='HEAVEN-GATE' freq=2462 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 WPA: using IEEE 802.11i/D3.0 WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1 WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: clearing AP RSN IE WPA: using GTK TKIP WPA: using PTK TKIP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted ioctl[SIOCSIWAUTH]: Operation not supported WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate ioctl[SIOCSIWMODE]: Device or resource busy Association request to the driver failed Setting authentication timeout: 5 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b1a len=19 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8c02 len=189 WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=000b48454156454e2d47415445010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd06001018020004)' Association info event req_ies - hexdump(len=53): 00 0b 48 45 41 56 45 4e 2d 47 41 54 45 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 00 04 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:18:f8:bd:7c:d6 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:18:f8:bd:7c:d6 No keys have been configured - skip key clearing Associated with 00:18:f8:bd:7c:d6 WPA: Association event - clear replay counter EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) key_length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:18:f8:bd:7c:d6 (ver=1) WPA: Renewed SNonce - hexdump(len=32): 2c 0a 88 30 10 9e 61 61 2b 3b ad 58 5b 5c b7 bf 4a 07 06 6d 06 3b 74 ce e5 05 ee 1f f7 03 14 6c WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 2c 0a 88 30 10 9e 61 61 2b 3b ad 58 5b 5c b7 bf 4a 07 06 6d 06 3b 74 ce e5 05 ee 1f f7 03 14 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c5 63 7b 69 3b da d1 9c 34 30 44 7e 69 08 c2 a0 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 74 db ec 05 a1 50 1c c2 40 94 40 7b be b3 84 03 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 IEEE 802.1X RX: version=1 type=3 length=121 EAPOL-Key type=254 key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) key_length=32 key_data_length=26 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 74 db ec 05 a1 50 1c c2 40 94 40 7b be b3 84 03 WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 74 db ec 05 a1 50 1c c2 40 94 40 7b be b3 84 03 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:18:f8:bd:7c:d6 (ver=1) WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 06 60 2c 0f 11 44 b4 17 1e 5e ac 24 31 81 9c 48 00 00 WPA: Installing PTK to the driver. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 02 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c f8 bd 07 96 6e ce 67 11 13 f6 40 2e 20 f1 89 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0 IEEE 802.1X RX: version=1 type=3 length=127 EAPOL-Key type=254 key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure) key_length=32 key_data_length=32 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 0c f8 bd 07 96 6e ce 67 11 13 f6 40 2e 20 f1 89 WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 02 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c f8 bd 07 96 6e ce 67 11 13 f6 40 2e 20 f1 89 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0 WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1) State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=1 tx=0). WPA: RSC - hexdump(len=6): 94 04 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 af e0 ea 01 fd 0c 3a 80 f3 db 60 54 e6 9a 6c 07 00 00 WPA: Key negotiation completed with 00:18:f8:bd:7c:d6 [PTK=TKIP GTK=TKIP] Cancelling authentication timeout State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:18:f8:bd:7c:d6 completed (auth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18 4b 83 f9 50 11 36 b8 3a d1 84 cb 44 55 8a e7 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0 IEEE 802.1X RX: version=1 type=3 length=127 EAPOL-Key type=254 key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure) key_length=32 key_data_length=32 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 18 4b 83 f9 50 11 36 b8 3a d1 84 cb 44 55 8a e7 WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18 4b 83 f9 50 11 36 b8 3a d1 84 cb 44 55 8a e7 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0 WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1) State: COMPLETED -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=1 tx=0). WPA: RSC - hexdump(len=6): 94 04 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 32 86 c7 55 13 4a 06 9e bd 22 c6 53 ce 95 8a e6 00 00 WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] State: GROUP_HANDSHAKE -> COMPLETED RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 04 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 44 84 aa 69 5a c8 22 f0 77 20 4b 72 0e 0a 86 e8 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0 IEEE 802.1X RX: version=1 type=3 length=127 EAPOL-Key type=254 key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure) key_length=32 key_data_length=32 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 44 84 aa 69 5a c8 22 f0 77 20 4b 72 0e 0a 86 e8 WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 04 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 44 84 aa 69 5a c8 22 f0 77 20 4b 72 0e 0a 86 e8 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0 WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1) State: COMPLETED -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=1 tx=0). WPA: RSC - hexdump(len=6): 94 04 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ea c6 da 8d 1f 7d 3a af b3 63 5a 1b ca e3 c5 34 00 00 WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] State: GROUP_HANDSHAKE -> COMPLETED EAPOL: startWhen --> 0 RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 05 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ec 2f c4 50 b4 d3 94 d0 70 55 c1 53 2d a5 d2 20 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0 IEEE 802.1X RX: version=1 type=3 length=127 EAPOL-Key type=254 key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure) key_length=32 key_data_length=32 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): ec 2f c4 50 b4 d3 94 d0 70 55 c1 53 2d a5 d2 20 WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 05 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ec 2f c4 50 b4 d3 94 d0 70 55 c1 53 2d a5 d2 20 00 20 45 0c ad 29 bb 8c e6 cf d9 57 bd f3 3c 41 2d 8c 7c cf bd c6 91 9c f0 3b 0d 1a 94 63 65 1a 4a a0 WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1) State: COMPLETED -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=1 tx=0). WPA: RSC - hexdump(len=6): 94 04 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0a a7 5a fc 15 0b 9f d9 59 f8 73 60 7a 9b 2c 2e 00 00 WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] State: GROUP_HANDSHAKE -> COMPLETED RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID 00:18:f8:bd:7c:d6 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8c02 len=189 WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=000b48454156454e2d47415445010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd06001018020004)' Association info event req_ies - hexdump(len=53): 00 0b 48 45 41 56 45 4e 2d 47 41 54 45 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 00 04 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:18:f8:bd:7c:d6 State: SCANNING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:18:f8:bd:7c:d6 No keys have been configured - skip key clearing Associated with 00:18:f8:bd:7c:d6 WPA: Association event - clear replay counter EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b19 len=8 Received 170 bytes of scan results (1 BSSes) Scan results: 1 Selecting BSS from priority group 0 0: 00:18:f8:bd:7c:d6 ssid='HEAVEN-GATE' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 selected based on WPA IE Already associated with the selected AP. RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) key_length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:18:f8:bd:7c:d6 (ver=1) WPA: Renewed SNonce - hexdump(len=32): 3d e7 9c bf 0c 7d a0 20 79 92 f9 2a 86 72 df f2 ad f9 64 4c b5 b4 06 f0 64 6e 97 2a 0c 80 8f 26 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 3d e7 9c bf 0c 7d a0 20 79 92 f9 2a 86 72 df f2 ad f9 64 4c b5 b4 06 f0 64 6e 97 2a 0c 80 8f 26 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 37 8d e9 0c 55 8a d0 3d be 94 9e 40 49 ea d6 89 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 86 5a e9 14 3b b8 6a 10 a4 d9 7b 98 44 10 cb cc 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 IEEE 802.1X RX: version=1 type=3 length=121 EAPOL-Key type=254 key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) key_length=32 key_data_length=26 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 86 5a e9 14 3b b8 6a 10 a4 d9 7b 98 44 10 cb cc WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 8f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 86 5a e9 14 3b b8 6a 10 a4 d9 7b 98 44 10 cb cc 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 00:18:f8:bd:7c:d6 (ver=1) WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e7 d8 9c 9f 4d fe 13 e3 78 f6 8b 25 9b 16 dd 8b 00 00 WPA: Installing PTK to the driver. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 76 94 8f 39 78 49 96 92 f0 65 17 f6 53 52 a7 4c 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20 IEEE 802.1X RX: version=1 type=3 length=127 EAPOL-Key type=254 key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure) key_length=32 key_data_length=32 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 76 94 8f 39 78 49 96 92 f0 65 17 f6 53 52 a7 4c WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 76 94 8f 39 78 49 96 92 f0 65 17 f6 53 52 a7 4c 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20 WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1) State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=1 tx=0). WPA: RSC - hexdump(len=6): 94 04 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a3 c1 90 b9 c6 00 f5 fe f3 42 18 05 c5 96 05 c2 00 00 WPA: Key negotiation completed with 00:18:f8:bd:7c:d6 [PTK=TKIP GTK=TKIP] Cancelling authentication timeout Removed BSSID 00:18:f8:bd:7c:d6 from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:18:f8:bd:7c:d6 completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 04 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 66 98 d1 12 95 c3 6d 18 69 91 70 34 f4 ba c4 2c 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20 IEEE 802.1X RX: version=1 type=3 length=127 EAPOL-Key type=254 key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure) key_length=32 key_data_length=32 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 66 98 d1 12 95 c3 6d 18 69 91 70 34 f4 ba c4 2c WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 04 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 66 98 d1 12 95 c3 6d 18 69 91 70 34 f4 ba c4 2c 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20 WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1) State: COMPLETED -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=1 tx=0). WPA: RSC - hexdump(len=6): 94 04 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 61 b1 b3 28 90 c8 01 d4 a1 0b 8e c9 51 b2 bc d2 00 00 WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] State: GROUP_HANDSHAKE -> COMPLETED EAPOL: startWhen --> 0 RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 05 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 11 a6 20 84 50 ad d3 d3 6d 7e 82 b0 4e 8c f8 bc 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20 IEEE 802.1X RX: version=1 type=3 length=127 EAPOL-Key type=254 key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure) key_length=32 key_data_length=32 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 11 a6 20 84 50 ad d3 d3 6d 7e 82 b0 4e 8c f8 bc WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 05 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 11 a6 20 84 50 ad d3 d3 6d 7e 82 b0 4e 8c f8 bc 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20 WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1) State: COMPLETED -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=1 tx=0). WPA: RSC - hexdump(len=6): 94 04 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 de e9 3c 6f 65 b0 e7 1b 1e 62 8f 90 23 58 4b d4 00 00 WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] State: GROUP_HANDSHAKE -> COMPLETED RX EAPOL from 00:18:f8:bd:7c:d6 RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 06 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c 5a 38 a6 4f 39 e2 1d 18 c0 ea b1 ef ee 2e 7b 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20 IEEE 802.1X RX: version=1 type=3 length=127 EAPOL-Key type=254 key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure) key_length=32 key_data_length=32 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06 key_nonce - hexdump(len=32): 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 key_iv - hexdump(len=16): ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 key_rsc - hexdump(len=8): 94 04 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 2c 5a 38 a6 4f 39 e2 1d 18 c0 ea b1 ef ee 2e 7b WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 06 61 6b fe 90 db 6c 41 54 af d4 ab 75 a4 d1 b4 99 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 57 ef 53 1d 69 a3 0c ff 5e b8 73 41 5d d2 c0 1a 90 94 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c 5a 38 a6 4f 39 e2 1d 18 c0 ea b1 ef ee 2e 7b 00 20 39 c3 0b 90 7d e8 6a cf 8c 95 71 50 1d 1e 43 47 ee 84 a2 c2 7d f3 02 fa c8 0e 0b 61 da 9b 15 20 WPA: RX message 1 of Group Key Handshake from 00:18:f8:bd:7c:d6 (ver=1) State: COMPLETED -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=1 tx=0). WPA: RSC - hexdump(len=6): 94 04 00 00 00 00 wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 54 f2 29 c3 fe 8e cf aa 29 2e 76 d1 13 bf 51 3c 00 00 WPA: Group rekeying completed with 00:18:f8:bd:7c:d6 [GTK=TKIP] State: GROUP_HANDSHAKE -> COMPLETED RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID 00:18:f8:bd:7c:d6 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8c02 len=189 WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=000b48454156454e2d47415445010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd06001018020004)' Association info event req_ies - hexdump(len=53): 00 0b 48 45 41 56 45 4e 2d 47 41 54 45 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 00 04 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:18:f8:bd:7c:d6 State: SCANNING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=00:18:f8:bd:7c:d6 No keys have been configured - skip key clearing Associated with 00:18:f8:bd:7c:d6 WPA: Association event - clear replay counter EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request CTRL-EVENT-TERMINATING - signal 2 received Removing interface wlan0 State: ASSOCIATED -> DISCONNECTED