Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 291864 Details for
Bug 213088
WPA auth not working, bcm43xx
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
debug log with dumped psk
wpa_supplicant.log (text/plain), 219.74 KB, created by
Ilkka Tengvall
on 2008-01-16 16:24:27 UTC
(
hide
)
Description:
debug log with dumped psk
Filename:
MIME Type:
Creator:
Ilkka Tengvall
Created:
2008-01-16 16:24:27 UTC
Size:
219.74 KB
patch
obsolete
>Could not request DBus service name: already registered. >Providing DBus service 'fi.epitest.hostap.WPASupplicant'. >Initializing interface 'wlan0' conf 'N/A' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' >Initializing interface (2) 'wlan0' >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: KEY_RX entering state NO_KEY_RECEIVE >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf > capabilities: key_mgmt 0xf enc 0xf >WEXT: Operstate: linkmode=1, operstate=5 >Own MAC address: 00:11:24:a3:b5:e9 >wpa_driver_wext_set_wpa >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_countermeasures >wpa_driver_wext_set_drop_unencrypted: enabled = 1 >wpa_driver_wext_set_drop_unencrypted: IW_AUTH_DROP_UNENCRYPTED returned 0 (Illegal seek) >Setting scan request: 0 sec 100000 usec >Added interface wlan0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1002 () >Wireless event: cmd=0x8b06 len=8 >Ignore event for foreign ifindex 3 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >Setting scan request: 0 sec 0 usec >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >Trying to get current scan results first without requesting a new scan to speed up initial association >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >No suitable AP found. >Setting scan request: 0 sec 0 usec >No enabled networks - do not scan >State: SCANNING -> INACTIVE >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >pairwise: 0x18 >wep_tx_keyidx=0 (0x0) >ssid - hexdump_ascii(len=4): > 69 6b 6b 65 ikke >group: 0x1e >proto: 0x3 >key_mgmt: 0x2 >PSK - hexdump(len=32): [REMOVED] >wep_key0 - hexdump(len=13): [REMOVED] >Setting scan request: 0 sec 0 usec >State: INACTIVE -> SCANNING >Starting AP scan (broadcast SSID) >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >Selecting BSS from priority group 0 >No suitable AP found. >Setting scan request: 5 sec 0 usec >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >Starting AP scan (broadcast SSID) >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 242 bytes of scan results (1 BSSes) >Scan results: 1 >Selecting BSS from priority group 0 >0: 00:12:17:XX:XX:XX ssid='ikke' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > selected based on WPA IE >Trying to associate with 00:12:17:XX:XX:XX (SSID='ikke' freq=2417 MHz) >Cancelling scan request >WPA: clearing own WPA/RSN IE >*** Dumping ssid 0x1007fb58 > ssid : "ikke" > scan_ssid : 0 > bssid : (null) > psk : c37ffca5d378dfeff4f903edb13952eaf19dfc8cc0933e0588cd674f248f3713 > proto : WPA RSN > key_mgmt : WPA-PSK > pairwise : CCMP TKIP > group : CCMP TKIP WEP104 WEP40 > auth_alg : > eap : (null) > identity : (null) > anonymous_identity : (null) > eappsk : (null) > nai : (null) > password : (null) > ca_cert : (null) > ca_path : (null) > client_cert : (null) > private_key : (null) > private_key_passwd : (null) > dh_file : (null) > subject_match : (null) > altsubject_match : (null) > ca_cert2 : (null) > ca_path2 : (null) > client_cert2 : (null) > private_key2 : (null) > private_key2_passwd : (null) > dh_file2 : (null) > subject_match2 : (null) > altsubject_match2 : (null) > phase1 : (null) > phase2 : (null) > pcsc : (null) > pin : (null) > engine_id : (null) > key_id : (null) > engine : 0 > eapol_flags : 3 > wep_key0 : 59e963a7c914ef5279e1cbd30a > wep_key1 : (null) > wep_key2 : (null) > wep_key3 : (null) > wep_tx_keyidx : 0 > priority : 0 > eap_workaround : -1 > pac_file : (null) > fragment_size : 1398 > mode : 0 > proactive_key_caching : 0 > disabled : 0 > id_str : (null) > peerkey : 0 > frequency : 0 > DONE >Automatic auth_alg selection: 0x1 >WPA: using IEEE 802.11i/D3.0 >WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1 >WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 >WPA: clearing AP RSN IE >WPA: using GTK TKIP >WPA: using PTK TKIP >WPA: using KEY_MGMT WPA-PSK >WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >No keys have been configured - skip key clearing >wpa_supplicant_associate: 1 - use_crypt = 1 >wpa_supplicant_associate: 5 - use_crypt = 1 before drop_unencrypted() call >wpa_driver_wext_set_drop_unencrypted: enabled = 1 >wpa_driver_wext_set_drop_unencrypted: IW_AUTH_DROP_UNENCRYPTED returned 0 (Resource temporarily unavailable) >State: SCANNING -> ASSOCIATING >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_associate >Setting authentication timeout: 15 sec 0 usec >EAPOL: External notification - EAP success=0 >EAPOL: External notification - EAP fail=0 >EAPOL: External notification - portControl=Auto >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b06 len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b04 len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b1a len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 242 bytes of scan results (1 BSSes) >Scan results: 1 >Selecting BSS from priority group 0 >0: 00:12:17:XX:XX:XX ssid='ikke' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > selected based on WPA IE >Already associated with the selected AP. >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=181 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=0004696b6b65010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd090010180201f1000000)' >Association info event >req_ies - hexdump(len=46): 00 04 69 6b 6b 65 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >resp_ies - hexdump(len=27): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 09 00 10 18 02 01 f1 00 00 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:12:17:XX:XX:XX >State: ASSOCIATING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:12:17:XX:XX:XX >No keys have been configured - skip key clearing >Associated with 00:12:17:XX:XX:XX >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 ba 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >Setting authentication timeout: 10 sec 0 usec >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 ba > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 ba 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: Renewed SNonce - hexdump(len=32): 73 b4 77 b1 e5 0c ac b8 e4 b3 5f 3e 6b 49 4a a6 22 0f 67 90 da 39 5e 4f 71 3c 4f a0 e1 0c 85 c5 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 73 b4 77 b1 e5 0c ac b8 e4 b3 5f 3e 6b 49 4a a6 22 0f 67 90 da 39 5e 4f 71 3c 4f a0 e1 0c 85 c5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 07 29 10 85 96 f8 10 e3 87 b0 72 78 17 a5 c6 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 bb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 bb > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 bb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 73 b4 77 b1 e5 0c ac b8 e4 b3 5f 3e 6b 49 4a a6 22 0f 67 90 da 39 5e 4f 71 3c 4f a0 e1 0c 85 c5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d7 65 c2 77 b1 f1 67 ad 23 f2 0a 5b c6 43 3c a3 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 bd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 bd > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 bd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 73 b4 77 b1 e5 0c ac b8 e4 b3 5f 3e 6b 49 4a a6 22 0f 67 90 da 39 5e 4f 71 3c 4f a0 e1 0c 85 c5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e7 dc f6 40 48 f7 e2 b6 40 a3 a8 ad d3 46 29 03 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:00:00:00:00:00 >WPA: 4-Way Handshake failed - pre-shared key may be incorrect >Setting scan request: 0 sec 100000 usec >Added BSSID 00:12:17:XX:XX:XX into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >Driver did not support SIOCSIWENCODEEXT >State: 4WAY_HANDSHAKE -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >Authentication with 00:00:00:00:00:00 timed out. >Added BSSID 00:00:00:00:00:00 into blacklist >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >No keys have been configured - skip key clearing >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >Setting scan request: 0 sec 0 usec >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=8 >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >Selecting BSS from priority group 0 >No APs found - clear blacklist and try again >Removed BSSID 00:00:00:00:00:00 from blacklist (clear) >Removed BSSID 00:12:17:XX:XX:XX from blacklist (clear) >Selecting BSS from priority group 0 >No suitable AP found. >Setting scan request: 5 sec 0 usec >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:00:00:00:00:00 >Added BSSID 00:00:00:00:00:00 into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >Driver did not support SIOCSIWENCODEEXT >State: SCANNING -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=8 >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >Selecting BSS from priority group 0 >No APs found - clear blacklist and try again >Removed BSSID 00:00:00:00:00:00 from blacklist (clear) >Selecting BSS from priority group 0 >No suitable AP found. >Setting scan request: 5 sec 0 usec >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:00:00:00:00:00 >Added BSSID 00:00:00:00:00:00 into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >Driver did not support SIOCSIWENCODEEXT >State: SCANNING -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=8 >Received 242 bytes of scan results (1 BSSes) >Scan results: 1 >Selecting BSS from priority group 0 >0: 00:12:17:XX:XX:XX ssid='ikke' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > selected based on WPA IE >Trying to associate with 00:12:17:XX:XX:XX (SSID='ikke' freq=2417 MHz) >Cancelling scan request >WPA: clearing own WPA/RSN IE >*** Dumping ssid 0x1007fb58 > ssid : "ikke" > scan_ssid : 0 > bssid : (null) > psk : c37ffca5d378dfeff4f903edb13952eaf19dfc8cc0933e0588cd674f248f3713 > proto : WPA RSN > key_mgmt : WPA-PSK > pairwise : CCMP TKIP > group : CCMP TKIP WEP104 WEP40 > auth_alg : > eap : (null) > identity : (null) > anonymous_identity : (null) > eappsk : (null) > nai : (null) > password : (null) > ca_cert : (null) > ca_path : (null) > client_cert : (null) > private_key : (null) > private_key_passwd : (null) > dh_file : (null) > subject_match : (null) > altsubject_match : (null) > ca_cert2 : (null) > ca_path2 : (null) > client_cert2 : (null) > private_key2 : (null) > private_key2_passwd : (null) > dh_file2 : (null) > subject_match2 : (null) > altsubject_match2 : (null) > phase1 : (null) > phase2 : (null) > pcsc : (null) > pin : (null) > engine_id : (null) > key_id : (null) > engine : 0 > eapol_flags : 3 > wep_key0 : 59e963a7c914ef5279e1cbd30a > wep_key1 : (null) > wep_key2 : (null) > wep_key3 : (null) > wep_tx_keyidx : 0 > priority : 0 > eap_workaround : -1 > pac_file : (null) > fragment_size : 1398 > mode : 0 > proactive_key_caching : 0 > disabled : 0 > id_str : (null) > peerkey : 0 > frequency : 0 > DONE >Automatic auth_alg selection: 0x1 >WPA: using IEEE 802.11i/D3.0 >WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1 >WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 >WPA: clearing AP RSN IE >WPA: using GTK TKIP >WPA: using PTK TKIP >WPA: using KEY_MGMT WPA-PSK >WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >No keys have been configured - skip key clearing >wpa_supplicant_associate: 1 - use_crypt = 1 >wpa_supplicant_associate: 5 - use_crypt = 1 before drop_unencrypted() call >wpa_driver_wext_set_drop_unencrypted: enabled = 1 >wpa_driver_wext_set_drop_unencrypted: IW_AUTH_DROP_UNENCRYPTED returned 0 (Resource temporarily unavailable) >State: SCANNING -> ASSOCIATING >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_associate >Setting authentication timeout: 15 sec 0 usec >EAPOL: External notification - EAP success=0 >EAPOL: External notification - EAP fail=0 >EAPOL: External notification - portControl=Auto >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b06 len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b04 len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b1a len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=181 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=0004696b6b65010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd090010180201f1000000)' >Association info event >req_ies - hexdump(len=46): 00 04 69 6b 6b 65 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >resp_ies - hexdump(len=27): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 09 00 10 18 02 01 f1 00 00 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:12:17:XX:XX:XX >State: ASSOCIATING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:12:17:XX:XX:XX >No keys have been configured - skip key clearing >Associated with 00:12:17:XX:XX:XX >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 be 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >Setting authentication timeout: 10 sec 0 usec >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 be > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 be 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: Renewed SNonce - hexdump(len=32): ef 2e b7 38 69 24 e3 2e 15 b4 2d d7 c4 c8 02 a2 58 a4 b5 b7 de 50 d6 ef 2e 41 21 99 a4 a6 68 dd >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 ef 2e b7 38 69 24 e3 2e 15 b4 2d d7 c4 c8 02 a2 58 a4 b5 b7 de 50 d6 ef 2e 41 21 99 a4 a6 68 dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 14 9b 49 16 0a 56 53 e1 40 25 ea cf bb 7b 1c 8c 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 bf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 bf > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 bf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 ef 2e b7 38 69 24 e3 2e 15 b4 2d d7 c4 c8 02 a2 58 a4 b5 b7 de 50 d6 ef 2e 41 21 99 a4 a6 68 dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 1e fe bb a2 4d c2 11 49 e4 74 9f 49 d1 d8 a8 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c0 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 ef 2e b7 38 69 24 e3 2e 15 b4 2d d7 c4 c8 02 a2 58 a4 b5 b7 de 50 d6 ef 2e 41 21 99 a4 a6 68 dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 ef 7f 5d 58 1a fc 93 01 06 ca 38 0f 25 7d f8 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c3 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 ef 2e b7 38 69 24 e3 2e 15 b4 2d d7 c4 c8 02 a2 58 a4 b5 b7 de 50 d6 ef 2e 41 21 99 a4 a6 68 dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1b d0 0e 41 57 ec 77 8f 3e 5f 94 92 21 6c a7 74 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c3 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 03 ef 2e b7 38 69 24 e3 2e 15 b4 2d d7 c4 c8 02 a2 58 a4 b5 b7 de 50 d6 ef 2e 41 21 99 a4 a6 68 dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d4 ea 5a b2 85 ee f5 c6 dc d7 2e 53 54 67 89 2b 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >State: 4WAY_HANDSHAKE -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_disassociate >No keys have been configured - skip key clearing >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b1a len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b2a len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:00:00:00:00:00 >Added BSSID 00:12:17:XX:XX:XX into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 242 bytes of scan results (1 BSSes) >Scan results: 1 >Selecting BSS from priority group 0 >0: 00:12:17:XX:XX:XX ssid='ikke' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > selected based on WPA IE >Trying to associate with 00:12:17:XX:XX:XX (SSID='ikke' freq=2417 MHz) >Cancelling scan request >WPA: clearing own WPA/RSN IE >*** Dumping ssid 0x1007fb58 > ssid : "ikke" > scan_ssid : 0 > bssid : (null) > psk : c37ffca5d378dfeff4f903edb13952eaf19dfc8cc0933e0588cd674f248f3713 > proto : WPA RSN > key_mgmt : WPA-PSK > pairwise : CCMP TKIP > group : CCMP TKIP WEP104 WEP40 > auth_alg : > eap : (null) > identity : (null) > anonymous_identity : (null) > eappsk : (null) > nai : (null) > password : (null) > ca_cert : (null) > ca_path : (null) > client_cert : (null) > private_key : (null) > private_key_passwd : (null) > dh_file : (null) > subject_match : (null) > altsubject_match : (null) > ca_cert2 : (null) > ca_path2 : (null) > client_cert2 : (null) > private_key2 : (null) > private_key2_passwd : (null) > dh_file2 : (null) > subject_match2 : (null) > altsubject_match2 : (null) > phase1 : (null) > phase2 : (null) > pcsc : (null) > pin : (null) > engine_id : (null) > key_id : (null) > engine : 0 > eapol_flags : 3 > wep_key0 : 59e963a7c914ef5279e1cbd30a > wep_key1 : (null) > wep_key2 : (null) > wep_key3 : (null) > wep_tx_keyidx : 0 > priority : 0 > eap_workaround : -1 > pac_file : (null) > fragment_size : 1398 > mode : 0 > proactive_key_caching : 0 > disabled : 0 > id_str : (null) > peerkey : 0 > frequency : 0 > DONE >Automatic auth_alg selection: 0x1 >WPA: using IEEE 802.11i/D3.0 >WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1 >WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 >WPA: clearing AP RSN IE >WPA: using GTK TKIP >WPA: using PTK TKIP >WPA: using KEY_MGMT WPA-PSK >WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >No keys have been configured - skip key clearing >wpa_supplicant_associate: 1 - use_crypt = 1 >wpa_supplicant_associate: 5 - use_crypt = 1 before drop_unencrypted() call >wpa_driver_wext_set_drop_unencrypted: enabled = 1 >wpa_driver_wext_set_drop_unencrypted: IW_AUTH_DROP_UNENCRYPTED returned 0 (Resource temporarily unavailable) >State: DISCONNECTED -> ASSOCIATING >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_associate >Setting authentication timeout: 15 sec 0 usec >EAPOL: External notification - EAP success=0 >EAPOL: External notification - EAP fail=0 >EAPOL: External notification - portControl=Auto >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b06 len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b04 len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b1a len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=181 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=0004696b6b65010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd090010180201f1000000)' >Association info event >req_ies - hexdump(len=46): 00 04 69 6b 6b 65 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >resp_ies - hexdump(len=27): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 09 00 10 18 02 01 f1 00 00 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:12:17:XX:XX:XX >State: ASSOCIATING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:12:17:XX:XX:XX >No keys have been configured - skip key clearing >Associated with 00:12:17:XX:XX:XX >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >Setting authentication timeout: 10 sec 0 usec >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c4 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: Renewed SNonce - hexdump(len=32): 39 70 b4 c0 08 f5 62 20 cf 6a c1 fc a6 e9 63 d6 19 49 f2 63 21 74 e0 0b 25 dc 7f 30 20 fb c8 8e >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 39 70 b4 c0 08 f5 62 20 cf 6a c1 fc a6 e9 63 d6 19 49 f2 63 21 74 e0 0b 25 dc 7f 30 20 fb c8 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9d 1e 5e ed 04 0a 5f 62 81 6e 34 93 17 88 70 88 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c5 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 39 70 b4 c0 08 f5 62 20 cf 6a c1 fc a6 e9 63 d6 19 49 f2 63 21 74 e0 0b 25 dc 7f 30 20 fb c8 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 74 cc b7 48 c2 da 4a c1 1e 70 44 eb f8 11 94 75 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c6 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 39 70 b4 c0 08 f5 62 20 cf 6a c1 fc a6 e9 63 d6 19 49 f2 63 21 74 e0 0b 25 dc 7f 30 20 fb c8 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 52 fa ab 60 af 08 47 ff 23 0a 5b 61 a2 2c 21 03 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c6 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 39 70 b4 c0 08 f5 62 20 cf 6a c1 fc a6 e9 63 d6 19 49 f2 63 21 74 e0 0b 25 dc 7f 30 20 fb c8 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a8 8f 6b ef 4f 7d be e7 4d fa 0b bf a5 ea c2 31 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c6 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 03 39 70 b4 c0 08 f5 62 20 cf 6a c1 fc a6 e9 63 d6 19 49 f2 63 21 74 e0 0b 25 dc 7f 30 20 fb c8 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5f d0 64 7b ad 6c 95 35 dd b0 e8 0a 5c 2f aa e3 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 07 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 07 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c6 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 07 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 07 39 70 b4 c0 08 f5 62 20 cf 6a c1 fc a6 e9 63 d6 19 49 f2 63 21 74 e0 0b 25 dc 7f 30 20 fb c8 8e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9b aa e9 f8 ac 0b 1d 99 2e a1 8b aa ed 4e 67 ef 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:00:00:00:00:00 >WPA: 4-Way Handshake failed - pre-shared key may be incorrect >Setting scan request: 0 sec 100000 usec >BSSID 00:12:17:XX:XX:XX blacklist count incremented to 2 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: 4WAY_HANDSHAKE -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=181 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=0004696b6b65010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd090010180201f1000000)' >Association info event >req_ies - hexdump(len=46): 00 04 69 6b 6b 65 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >resp_ies - hexdump(len=27): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 09 00 10 18 02 01 f1 00 00 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:12:17:XX:XX:XX >State: DISCONNECTED -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:12:17:XX:XX:XX >No keys have been configured - skip key clearing >Associated with 00:12:17:XX:XX:XX >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >Setting authentication timeout: 10 sec 0 usec >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c7 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: Renewed SNonce - hexdump(len=32): 64 be ef b8 bf 46 ca 25 19 e1 95 ed a2 92 fc df 7d a8 0b 7b bb 3b 81 55 58 2d ff d4 0d 13 1c 29 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 64 be ef b8 bf 46 ca 25 19 e1 95 ed a2 92 fc df 7d a8 0b 7b bb 3b 81 55 58 2d ff d4 0d 13 1c 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3f 22 01 6d a5 10 7b 89 7e 6a 9d da d5 86 84 e5 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c7 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 64 be ef b8 bf 46 ca 25 19 e1 95 ed a2 92 fc df 7d a8 0b 7b bb 3b 81 55 58 2d ff d4 0d 13 1c 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f7 d1 97 0b fe 3f 85 0e dc a9 4e e1 50 c9 6f 95 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c7 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 02 64 be ef b8 bf 46 ca 25 19 e1 95 ed a2 92 fc df 7d a8 0b 7b bb 3b 81 55 58 2d ff d4 0d 13 1c 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ee af 97 81 9e 1d 97 01 d1 86 36 d8 1d a1 48 86 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c7 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 03 64 be ef b8 bf 46 ca 25 19 e1 95 ed a2 92 fc df 7d a8 0b 7b bb 3b 81 55 58 2d ff d4 0d 13 1c 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 97 a5 05 59 cb d6 fd 4b dc 9c 76 c7 89 30 bf 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c7 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 04 64 be ef b8 bf 46 ca 25 19 e1 95 ed a2 92 fc df 7d a8 0b 7b bb 3b 81 55 58 2d ff d4 0d 13 1c 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 be b1 5b 7f e9 0c 3a 9d 1a 42 b4 92 00 cd 95 2b 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 06 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c7 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 06 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 06 64 be ef b8 bf 46 ca 25 19 e1 95 ed a2 92 fc df 7d a8 0b 7b bb 3b 81 55 58 2d ff d4 0d 13 1c 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 34 55 c5 0d bd f7 e7 0b 77 e1 86 b8 8c 4f 5c 3a 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:00:00:00:00:00 >WPA: 4-Way Handshake failed - pre-shared key may be incorrect >Setting scan request: 0 sec 100000 usec >BSSID 00:12:17:XX:XX:XX blacklist count incremented to 3 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: 4WAY_HANDSHAKE -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=181 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=0004696b6b65010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd090010180201f1000000)' >Association info event >req_ies - hexdump(len=46): 00 04 69 6b 6b 65 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >resp_ies - hexdump(len=27): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 09 00 10 18 02 01 f1 00 00 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:12:17:XX:XX:XX >State: DISCONNECTED -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:12:17:XX:XX:XX >No keys have been configured - skip key clearing >Associated with 00:12:17:XX:XX:XX >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >Setting authentication timeout: 10 sec 0 usec >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c8 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: Renewed SNonce - hexdump(len=32): b8 f8 a1 c6 bd 67 ba 9c be c6 09 3d fc ca fa f1 32 7c 89 03 34 8f de 7c 45 0e c9 8f a6 97 63 ba >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 b8 f8 a1 c6 bd 67 ba 9c be c6 09 3d fc ca fa f1 32 7c 89 03 34 8f de 7c 45 0e c9 8f a6 97 63 ba 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c3 00 ac bc 91 51 82 2b 48 cd 59 bc df e8 fc 3d 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c8 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 b8 f8 a1 c6 bd 67 ba 9c be c6 09 3d fc ca fa f1 32 7c 89 03 34 8f de 7c 45 0e c9 8f a6 97 63 ba 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7e 85 c8 60 4d 60 34 6f 65 79 13 5a 84 99 af dc 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c8 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 03 b8 f8 a1 c6 bd 67 ba 9c be c6 09 3d fc ca fa f1 32 7c 89 03 34 8f de 7c 45 0e c9 8f a6 97 63 ba 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e1 8e 21 b3 12 30 58 8a 07 08 a8 a7 76 e5 bf 4d 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c8 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 04 b8 f8 a1 c6 bd 67 ba 9c be c6 09 3d fc ca fa f1 32 7c 89 03 34 8f de 7c 45 0e c9 8f a6 97 63 ba 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4e cf 21 28 53 41 5d dd 6c a3 06 b5 9a cb a3 92 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:00:00:00:00:00 >WPA: 4-Way Handshake failed - pre-shared key may be incorrect >Setting scan request: 0 sec 100000 usec >BSSID 00:12:17:XX:XX:XX blacklist count incremented to 4 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: 4WAY_HANDSHAKE -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=181 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=0004696b6b65010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd090010180201f1000000)' >Association info event >req_ies - hexdump(len=46): 00 04 69 6b 6b 65 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >resp_ies - hexdump(len=27): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 09 00 10 18 02 01 f1 00 00 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:12:17:XX:XX:XX >State: DISCONNECTED -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:12:17:XX:XX:XX >No keys have been configured - skip key clearing >Associated with 00:12:17:XX:XX:XX >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >Setting authentication timeout: 10 sec 0 usec >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c9 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 c9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: Renewed SNonce - hexdump(len=32): 0e 26 55 31 37 19 c7 58 55 d6 e6 19 5c 0d 3e da a6 1a 2f 2d 04 33 ec f8 66 3c 1e ba 6e be de 98 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 0e 26 55 31 37 19 c7 58 55 d6 e6 19 5c 0d 3e da a6 1a 2f 2d 04 33 ec f8 66 3c 1e ba 6e be de 98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a9 af 29 63 46 79 30 a5 39 c1 93 e6 3e b7 e3 28 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 ca 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 ca > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 ca 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 0e 26 55 31 37 19 c7 58 55 d6 e6 19 5c 0d 3e da a6 1a 2f 2d 04 33 ec f8 66 3c 1e ba 6e be de 98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ae 24 48 f2 6e 99 20 23 87 1c 39 52 e7 85 23 aa 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cb > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 0e 26 55 31 37 19 c7 58 55 d6 e6 19 5c 0d 3e da a6 1a 2f 2d 04 33 ec f8 66 3c 1e ba 6e be de 98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bc bc ce 93 7c f7 f0 31 40 81 0c b8 dc a2 7b 2a 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 0e 26 55 31 37 19 c7 58 55 d6 e6 19 5c 0d 3e da a6 1a 2f 2d 04 33 ec f8 66 3c 1e ba 6e be de 98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 24 f2 88 18 81 a6 7d 6e d9 d0 db 95 b0 5e f1 51 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 0e 26 55 31 37 19 c7 58 55 d6 e6 19 5c 0d 3e da a6 1a 2f 2d 04 33 ec f8 66 3c 1e ba 6e be de 98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 89 e0 b8 7d ab a9 63 b0 a3 f3 07 d8 bf c4 af c9 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 02 0e 26 55 31 37 19 c7 58 55 d6 e6 19 5c 0d 3e da a6 1a 2f 2d 04 33 ec f8 66 3c 1e ba 6e be de 98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d2 ef 7d b6 04 ef 68 d9 b6 b3 8d 00 47 59 7e 41 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 03 0e 26 55 31 37 19 c7 58 55 d6 e6 19 5c 0d 3e da a6 1a 2f 2d 04 33 ec f8 66 3c 1e ba 6e be de 98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 64 78 b2 ba 50 b9 58 95 14 fa e8 28 63 33 79 e7 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 04 0e 26 55 31 37 19 c7 58 55 d6 e6 19 5c 0d 3e da a6 1a 2f 2d 04 33 ec f8 66 3c 1e ba 6e be de 98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c9 0d 71 d1 cb 34 fd a1 e2 bc 34 6a 98 f6 1b 61 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 05 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 05 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 05 0e 26 55 31 37 19 c7 58 55 d6 e6 19 5c 0d 3e da a6 1a 2f 2d 04 33 ec f8 66 3c 1e ba 6e be de 98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7a 78 05 f7 16 9e 9a 90 40 a2 a7 5f 24 c5 b1 31 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 06 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 06 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 06 0e 26 55 31 37 19 c7 58 55 d6 e6 19 5c 0d 3e da a6 1a 2f 2d 04 33 ec f8 66 3c 1e ba 6e be de 98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8b 14 83 48 7a bb 75 e1 fe 29 a8 ec 6a 2c f4 9e 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 07 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 07 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 07 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 07 0e 26 55 31 37 19 c7 58 55 d6 e6 19 5c 0d 3e da a6 1a 2f 2d 04 33 ec f8 66 3c 1e ba 6e be de 98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 db 3b b7 21 91 00 14 09 1f d5 c0 cf c3 81 d2 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:00:00:00:00:00 >WPA: 4-Way Handshake failed - pre-shared key may be incorrect >Setting scan request: 0 sec 100000 usec >BSSID 00:12:17:XX:XX:XX blacklist count incremented to 5 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: 4WAY_HANDSHAKE -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=181 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=0004696b6b65010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd090010180201f1000000)' >Association info event >req_ies - hexdump(len=46): 00 04 69 6b 6b 65 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >resp_ies - hexdump(len=27): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 09 00 10 18 02 01 f1 00 00 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:12:17:XX:XX:XX >State: DISCONNECTED -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:12:17:XX:XX:XX >No keys have been configured - skip key clearing >Associated with 00:12:17:XX:XX:XX >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >Setting authentication timeout: 10 sec 0 usec >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cd > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: Renewed SNonce - hexdump(len=32): c1 bb ba f0 4d 3b 89 f9 d0 4f 2c 45 b7 99 d8 76 91 90 0b d9 1e 9d d2 7c 50 27 17 4b 86 a1 a1 ce >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 c1 bb ba f0 4d 3b 89 f9 d0 4f 2c 45 b7 99 d8 76 91 90 0b d9 1e 9d d2 7c 50 27 17 4b 86 a1 a1 ce 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ae a6 2a 51 50 b2 74 91 3a 4e 0a e9 be 88 31 6f 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 ce 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 ce > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 ce 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 c1 bb ba f0 4d 3b 89 f9 d0 4f 2c 45 b7 99 d8 76 91 90 0b d9 1e 9d d2 7c 50 27 17 4b 86 a1 a1 ce 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1f e7 29 2b 7f a6 2f e0 35 a5 6b 80 d6 75 29 44 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cf > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 c1 bb ba f0 4d 3b 89 f9 d0 4f 2c 45 b7 99 d8 76 91 90 0b d9 1e 9d d2 7c 50 27 17 4b 86 a1 a1 ce 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 7d d7 6d 89 e8 1b a9 d6 53 f1 8e 4c 18 0e 7e 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cf > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 c1 bb ba f0 4d 3b 89 f9 d0 4f 2c 45 b7 99 d8 76 91 90 0b d9 1e 9d d2 7c 50 27 17 4b 86 a1 a1 ce 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 b9 46 63 1e f1 27 50 1a 8b bf de 5c 40 a2 c2 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cf > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 02 c1 bb ba f0 4d 3b 89 f9 d0 4f 2c 45 b7 99 d8 76 91 90 0b d9 1e 9d d2 7c 50 27 17 4b 86 a1 a1 ce 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 66 2f 9a 6d 50 f1 64 64 a6 08 e4 aa f6 6e d8 e0 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cf > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 03 c1 bb ba f0 4d 3b 89 f9 d0 4f 2c 45 b7 99 d8 76 91 90 0b d9 1e 9d d2 7c 50 27 17 4b 86 a1 a1 ce 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 41 de b1 7b 6f 36 21 7b da 39 a3 2f b5 c7 9d 48 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 06 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cf > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 06 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 06 c1 bb ba f0 4d 3b 89 f9 d0 4f 2c 45 b7 99 d8 76 91 90 0b d9 1e 9d d2 7c 50 27 17 4b 86 a1 a1 ce 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 82 4e 8f ce 0f 03 12 5b c3 ee b5 de ef e7 7c 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 07 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 07 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cf > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 07 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 07 c1 bb ba f0 4d 3b 89 f9 d0 4f 2c 45 b7 99 d8 76 91 90 0b d9 1e 9d d2 7c 50 27 17 4b 86 a1 a1 ce 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9c 2d 8e 3e 22 ec 0b 26 b2 04 c7 92 3e b3 0f 77 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:00:00:00:00:00 >WPA: 4-Way Handshake failed - pre-shared key may be incorrect >Setting scan request: 0 sec 100000 usec >BSSID 00:12:17:XX:XX:XX blacklist count incremented to 6 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: 4WAY_HANDSHAKE -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=181 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=0004696b6b65010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd090010180201f1000000)' >Association info event >req_ies - hexdump(len=46): 00 04 69 6b 6b 65 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >resp_ies - hexdump(len=27): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 09 00 10 18 02 01 f1 00 00 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:12:17:XX:XX:XX >State: DISCONNECTED -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:12:17:XX:XX:XX >No keys have been configured - skip key clearing >Associated with 00:12:17:XX:XX:XX >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >Setting authentication timeout: 10 sec 0 usec >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d1 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: Renewed SNonce - hexdump(len=32): 5d fd ac 56 6f 19 27 2b d2 04 7f 36 98 15 14 9a 52 ff fc 59 c7 85 b0 6f ac b4 22 98 c0 dd af ae >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 5d fd ac 56 6f 19 27 2b d2 04 7f 36 98 15 14 9a 52 ff fc 59 c7 85 b0 6f ac b4 22 98 c0 dd af ae 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a1 dc 75 6b 6d 22 1e b4 da e0 7b ea a8 53 a6 f4 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d2 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 5d fd ac 56 6f 19 27 2b d2 04 7f 36 98 15 14 9a 52 ff fc 59 c7 85 b0 6f ac b4 22 98 c0 dd af ae 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e6 0a 0b 5a 63 79 0a 00 87 ce 9f e4 a8 39 51 2a 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d2 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 5d fd ac 56 6f 19 27 2b d2 04 7f 36 98 15 14 9a 52 ff fc 59 c7 85 b0 6f ac b4 22 98 c0 dd af ae 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 c5 96 31 e6 59 6e 75 34 17 03 ee b4 cb f2 50 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 05 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d2 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 05 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 05 5d fd ac 56 6f 19 27 2b d2 04 7f 36 98 15 14 9a 52 ff fc 59 c7 85 b0 6f ac b4 22 98 c0 dd af ae 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 11 86 ce aa 6f d1 80 91 1a b9 2e e1 4e de a3 1f 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 06 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d2 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 06 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 06 5d fd ac 56 6f 19 27 2b d2 04 7f 36 98 15 14 9a 52 ff fc 59 c7 85 b0 6f ac b4 22 98 c0 dd af ae 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2f c6 e8 aa 62 c9 4a 3c 52 12 0a 28 c3 e5 da 4e 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 07 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 07 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d2 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 07 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 07 5d fd ac 56 6f 19 27 2b d2 04 7f 36 98 15 14 9a 52 ff fc 59 c7 85 b0 6f ac b4 22 98 c0 dd af ae 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 99 14 d9 d8 97 70 3a 3c 62 cc d1 0b db c2 74 62 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:00:00:00:00:00 >WPA: 4-Way Handshake failed - pre-shared key may be incorrect >Setting scan request: 0 sec 100000 usec >BSSID 00:12:17:XX:XX:XX blacklist count incremented to 7 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: 4WAY_HANDSHAKE -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >pairwise: 0x18 >wep_tx_keyidx=0 (0x0) >ssid - hexdump_ascii(len=4): > 69 6b 6b 65 ikke >group: 0x1e >proto: 0x3 >key_mgmt: 0x2 >PSK - hexdump(len=32): [REMOVED] >wep_key0 - hexdump(len=13): [REMOVED] >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >No keys have been configured - skip key clearing >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >Setting scan request: 0 sec 0 usec >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=181 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=0004696b6b65010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd090010180201f1000000)' >Association info event >req_ies - hexdump(len=46): 00 04 69 6b 6b 65 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >resp_ies - hexdump(len=27): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 09 00 10 18 02 01 f1 00 00 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:12:17:XX:XX:XX >State: SCANNING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:12:17:XX:XX:XX >No keys have been configured - skip key clearing >Network configuration found for the current AP >WPA: Using WPA IE from AssocReq to set cipher suites >WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1 >WPA: clearing AP WPA IE >WPA: clearing AP RSN IE >WPA: using GTK TKIP >WPA: using PTK TKIP >WPA: using KEY_MGMT WPA-PSK >WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >EAPOL: External notification - EAP success=0 >EAPOL: External notification - EAP fail=0 >EAPOL: External notification - portControl=Auto >Associated with 00:12:17:XX:XX:XX >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=8 >Received 525 bytes of scan results (2 BSSes) >Scan results: 2 >Selecting BSS from priority group 0 >0: 00:12:17:XX:XX:XX ssid='ikke' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > skip - blacklisted >1: 00:18:f8:db:27:31 ssid='lahetin' wpa_ie_len=30 rsn_ie_len=26 caps=0x11 > skip - SSID mismatch >No APs found - clear blacklist and try again >Removed BSSID 00:12:17:XX:XX:XX from blacklist (clear) >Removed BSSID 00:00:00:00:00:00 from blacklist (clear) >Selecting BSS from priority group 0 >0: 00:12:17:XX:XX:XX ssid='ikke' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > selected based on WPA IE >Trying to associate with 00:12:17:XX:XX:XX (SSID='ikke' freq=2417 MHz) >Cancelling scan request >WPA: clearing own WPA/RSN IE >*** Dumping ssid 0x10080310 > ssid : "ikke" > scan_ssid : 0 > bssid : (null) > psk : c37ffca5d378dfeff4f903edb13952eaf19dfc8cc0933e0588cd674f248f3713 > proto : WPA RSN > key_mgmt : WPA-PSK > pairwise : CCMP TKIP > group : CCMP TKIP WEP104 WEP40 > auth_alg : > eap : (null) > identity : (null) > anonymous_identity : (null) > eappsk : (null) > nai : (null) > password : (null) > ca_cert : (null) > ca_path : (null) > client_cert : (null) > private_key : (null) > private_key_passwd : (null) > dh_file : (null) > subject_match : (null) > altsubject_match : (null) > ca_cert2 : (null) > ca_path2 : (null) > client_cert2 : (null) > private_key2 : (null) > private_key2_passwd : (null) > dh_file2 : (null) > subject_match2 : (null) > altsubject_match2 : (null) > phase1 : (null) > phase2 : (null) > pcsc : (null) > pin : (null) > engine_id : (null) > key_id : (null) > engine : 0 > eapol_flags : 3 > wep_key0 : 59e963a7c914ef5279e1cbd30a > wep_key1 : (null) > wep_key2 : (null) > wep_key3 : (null) > wep_tx_keyidx : 0 > priority : 0 > eap_workaround : -1 > pac_file : (null) > fragment_size : 1398 > mode : 0 > proactive_key_caching : 0 > disabled : 0 > id_str : (null) > peerkey : 0 > frequency : 0 > DONE >Automatic auth_alg selection: 0x1 >WPA: using IEEE 802.11i/D3.0 >WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1 >WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 >WPA: clearing AP RSN IE >WPA: using GTK TKIP >WPA: using PTK TKIP >WPA: using KEY_MGMT WPA-PSK >WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >No keys have been configured - skip key clearing >wpa_supplicant_associate: 1 - use_crypt = 1 >wpa_supplicant_associate: 5 - use_crypt = 1 before drop_unencrypted() call >wpa_driver_wext_set_drop_unencrypted: enabled = 1 >wpa_driver_wext_set_drop_unencrypted: IW_AUTH_DROP_UNENCRYPTED returned 0 (Resource temporarily unavailable) >State: ASSOCIATED -> ASSOCIATING >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_associate >Setting authentication timeout: 15 sec 0 usec >EAPOL: External notification - EAP success=0 >EAPOL: External notification - EAP fail=0 >EAPOL: External notification - portControl=Auto >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b06 len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b04 len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b1a len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=181 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=0004696b6b65010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd090010180202f1000000)' >Association info event >req_ies - hexdump(len=46): 00 04 69 6b 6b 65 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >resp_ies - hexdump(len=27): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 09 00 10 18 02 02 f1 00 00 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:12:17:XX:XX:XX >State: ASSOCIATING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:12:17:XX:XX:XX >No keys have been configured - skip key clearing >Associated with 00:12:17:XX:XX:XX >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >Setting authentication timeout: 10 sec 0 usec >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d7 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: Renewed SNonce - hexdump(len=32): 3c 70 db 8e 3a 96 6d 79 77 1c bd 89 2a 67 49 2b 3b 7c cc 64 96 c3 4d 32 74 60 79 22 5e 2d de 6b >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 3c 70 db 8e 3a 96 6d 79 77 1c bd 89 2a 67 49 2b 3b 7c cc 64 96 c3 4d 32 74 60 79 22 5e 2d de 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e4 8e 42 a2 80 20 1c ff 0c b5 7e 24 41 d9 54 39 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 3c 70 db 8e 3a 96 6d 79 77 1c bd 89 2a 67 49 2b 3b 7c cc 64 96 c3 4d 32 74 60 79 22 5e 2d de 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bc 02 cd a8 02 c2 45 07 27 ba 21 09 d5 74 1c 86 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 3c 70 db 8e 3a 96 6d 79 77 1c bd 89 2a 67 49 2b 3b 7c cc 64 96 c3 4d 32 74 60 79 22 5e 2d de 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f7 57 72 0b fe e7 79 37 75 b9 d8 ac 44 fd c2 4c 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 02 3c 70 db 8e 3a 96 6d 79 77 1c bd 89 2a 67 49 2b 3b 7c cc 64 96 c3 4d 32 74 60 79 22 5e 2d de 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 82 eb 6f 05 3b 1e 42 fd 5d c6 02 1d 18 e9 15 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 03 3c 70 db 8e 3a 96 6d 79 77 1c bd 89 2a 67 49 2b 3b 7c cc 64 96 c3 4d 32 74 60 79 22 5e 2d de 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 86 81 4b fd 06 71 76 eb bf a7 1b 0c 88 29 8e 21 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 04 3c 70 db 8e 3a 96 6d 79 77 1c bd 89 2a 67 49 2b 3b 7c cc 64 96 c3 4d 32 74 60 79 22 5e 2d de 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a9 3f 4e df 9c 78 c8 5c a9 2a 6a f4 17 aa 75 b0 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 05 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 05 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 05 3c 70 db 8e 3a 96 6d 79 77 1c bd 89 2a 67 49 2b 3b 7c cc 64 96 c3 4d 32 74 60 79 22 5e 2d de 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8c 4d 86 df 27 d9 1d a4 d3 c0 f1 e7 49 da f4 6a 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 06 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 06 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 06 3c 70 db 8e 3a 96 6d 79 77 1c bd 89 2a 67 49 2b 3b 7c cc 64 96 c3 4d 32 74 60 79 22 5e 2d de 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 53 cd 54 df 95 12 95 06 4e 2c c6 3c 56 10 22 3d 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 07 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 07 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 07 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 07 3c 70 db 8e 3a 96 6d 79 77 1c bd 89 2a 67 49 2b 3b 7c cc 64 96 c3 4d 32 74 60 79 22 5e 2d de 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 44 6f ac cb 3b bd 66 d2 0b 8a f8 15 4d cf 2b a0 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:00:00:00:00:00 >WPA: 4-Way Handshake failed - pre-shared key may be incorrect >Setting scan request: 0 sec 100000 usec >Added BSSID 00:12:17:XX:XX:XX into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: 4WAY_HANDSHAKE -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=181 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=0004696b6b65010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd090010180201f1000000)' >Association info event >req_ies - hexdump(len=46): 00 04 69 6b 6b 65 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >resp_ies - hexdump(len=27): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 09 00 10 18 02 01 f1 00 00 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:12:17:XX:XX:XX >State: SCANNING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:12:17:XX:XX:XX >No keys have been configured - skip key clearing >Associated with 00:12:17:XX:XX:XX >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=8 >Received 525 bytes of scan results (2 BSSes) >Scan results: 2 >Selecting BSS from priority group 0 >0: 00:12:17:XX:XX:XX ssid='ikke' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > selected based on WPA IE >Already associated with the selected AP. >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >Setting authentication timeout: 10 sec 0 usec >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 da > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: Renewed SNonce - hexdump(len=32): 72 dd 2d 2e ae bb 4a e1 1e 27 c4 5b af b8 4a 00 9a dc 1a 5f 99 28 d1 01 d6 0a 54 ed 9d 54 17 ac >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 72 dd 2d 2e ae bb 4a e1 1e 27 c4 5b af b8 4a 00 9a dc 1a 5f 99 28 d1 01 d6 0a 54 ed 9d 54 17 ac 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7b d9 ad e4 af fe f2 0a 9d 2a 43 bf 63 e0 e4 e5 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 da > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 02 72 dd 2d 2e ae bb 4a e1 1e 27 c4 5b af b8 4a 00 9a dc 1a 5f 99 28 d1 01 d6 0a 54 ed 9d 54 17 ac 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a8 ab c7 3f b7 8b 7a 8a ad d5 5a eb e2 98 b5 a8 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 da > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 03 72 dd 2d 2e ae bb 4a e1 1e 27 c4 5b af b8 4a 00 9a dc 1a 5f 99 28 d1 01 d6 0a 54 ed 9d 54 17 ac 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 46 6d e9 dc 4b de 86 a4 8a 2e b8 f3 fa 44 14 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 da > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 04 72 dd 2d 2e ae bb 4a e1 1e 27 c4 5b af b8 4a 00 9a dc 1a 5f 99 28 d1 01 d6 0a 54 ed 9d 54 17 ac 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 17 3e 4a b7 d6 17 1a 5d b0 28 58 a1 ff 8f bc 39 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 06 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 da > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 06 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 da 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 06 72 dd 2d 2e ae bb 4a e1 1e 27 c4 5b af b8 4a 00 9a dc 1a 5f 99 28 d1 01 d6 0a 54 ed 9d 54 17 ac 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e4 6e f5 01 38 18 3e 01 3f ea e9 e7 dd d1 f7 32 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:00:00:00:00:00 >WPA: 4-Way Handshake failed - pre-shared key may be incorrect >Setting scan request: 0 sec 100000 usec >BSSID 00:12:17:XX:XX:XX blacklist count incremented to 2 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: 4WAY_HANDSHAKE -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=181 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=0004696b6b65010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd090010180201f1000000)' >Association info event >req_ies - hexdump(len=46): 00 04 69 6b 6b 65 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >resp_ies - hexdump(len=27): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 09 00 10 18 02 01 f1 00 00 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:12:17:XX:XX:XX >State: SCANNING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:12:17:XX:XX:XX >No keys have been configured - skip key clearing >Associated with 00:12:17:XX:XX:XX >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=8 >Received 525 bytes of scan results (2 BSSes) >Scan results: 2 >Selecting BSS from priority group 0 >0: 00:12:17:XX:XX:XX ssid='ikke' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > skip - blacklisted >1: 00:18:f8:db:27:31 ssid='lahetin' wpa_ie_len=30 rsn_ie_len=26 caps=0x11 > skip - SSID mismatch >No APs found - clear blacklist and try again >Removed BSSID 00:12:17:XX:XX:XX from blacklist (clear) >Selecting BSS from priority group 0 >0: 00:12:17:XX:XX:XX ssid='ikke' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > selected based on WPA IE >Already associated with the selected AP. >State: ASSOCIATED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_disassociate >No keys have been configured - skip key clearing >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAPOL: External notification - portValid=0 >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_disassociate >No keys have been configured - skip key clearing >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:00:00:00:00:00 >Added BSSID 00:12:17:XX:XX:XX into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >EAPOL: startWhen --> 0 >Authentication with 00:00:00:00:00:00 timed out. >Added BSSID 00:00:00:00:00:00 into blacklist >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >No keys have been configured - skip key clearing >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >Setting scan request: 0 sec 0 usec >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b1a len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b2a len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 242 bytes of scan results (1 BSSes) >Scan results: 1 >Selecting BSS from priority group 0 >0: 00:12:17:XX:XX:XX ssid='ikke' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 >No APs found - clear blacklist and try again >Removed BSSID 00:00:00:00:00:00 from blacklist (clear) >Removed BSSID 00:12:17:XX:XX:XX from blacklist (clear) >Selecting BSS from priority group 0 >0: 00:12:17:XX:XX:XX ssid='ikke' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 >No suitable AP found. >Setting scan request: 5 sec 0 usec >pairwise: 0x18 >wep_tx_keyidx=0 (0x0) >ssid - hexdump_ascii(len=4): > 69 6b 6b 65 ikke >group: 0x1e >proto: 0x3 >key_mgmt: 0x2 >PSK - hexdump(len=32): [REMOVED] >wep_key0 - hexdump(len=13): [REMOVED] >Setting scan request: 0 sec 0 usec >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 242 bytes of scan results (1 BSSes) >Scan results: 1 >Selecting BSS from priority group 0 >0: 00:12:17:XX:XX:XX ssid='ikke' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > selected based on WPA IE >Trying to associate with 00:12:17:XX:XX:XX (SSID='ikke' freq=2417 MHz) >Cancelling scan request >WPA: clearing own WPA/RSN IE >*** Dumping ssid 0x100809e8 > ssid : "ikke" > scan_ssid : 0 > bssid : (null) > psk : c37ffca5d378dfeff4f903edb13952eaf19dfc8cc0933e0588cd674f248f3713 > proto : WPA RSN > key_mgmt : WPA-PSK > pairwise : CCMP TKIP > group : CCMP TKIP WEP104 WEP40 > auth_alg : > eap : (null) > identity : (null) > anonymous_identity : (null) > eappsk : (null) > nai : (null) > password : (null) > ca_cert : (null) > ca_path : (null) > client_cert : (null) > private_key : (null) > private_key_passwd : (null) > dh_file : (null) > subject_match : (null) > altsubject_match : (null) > ca_cert2 : (null) > ca_path2 : (null) > client_cert2 : (null) > private_key2 : (null) > private_key2_passwd : (null) > dh_file2 : (null) > subject_match2 : (null) > altsubject_match2 : (null) > phase1 : (null) > phase2 : (null) > pcsc : (null) > pin : (null) > engine_id : (null) > key_id : (null) > engine : 0 > eapol_flags : 3 > wep_key0 : 59e963a7c914ef5279e1cbd30a > wep_key1 : (null) > wep_key2 : (null) > wep_key3 : (null) > wep_tx_keyidx : 0 > priority : 0 > eap_workaround : -1 > pac_file : (null) > fragment_size : 1398 > mode : 0 > proactive_key_caching : 0 > disabled : 0 > id_str : (null) > peerkey : 0 > frequency : 0 > DONE >Automatic auth_alg selection: 0x1 >WPA: using IEEE 802.11i/D3.0 >WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1 >WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 >WPA: clearing AP RSN IE >WPA: using GTK TKIP >WPA: using PTK TKIP >WPA: using KEY_MGMT WPA-PSK >WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >No keys have been configured - skip key clearing >wpa_supplicant_associate: 1 - use_crypt = 1 >wpa_supplicant_associate: 5 - use_crypt = 1 before drop_unencrypted() call >wpa_driver_wext_set_drop_unencrypted: enabled = 1 >wpa_driver_wext_set_drop_unencrypted: IW_AUTH_DROP_UNENCRYPTED returned 0 (Resource temporarily unavailable) >State: SCANNING -> ASSOCIATING >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_associate >Setting authentication timeout: 15 sec 0 usec >EAPOL: External notification - EAP success=0 >EAPOL: External notification - EAP fail=0 >EAPOL: External notification - portControl=Auto >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b06 len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b04 len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b1a len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 242 bytes of scan results (1 BSSes) >Scan results: 1 >Selecting BSS from priority group 0 >0: 00:12:17:XX:XX:XX ssid='ikke' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > selected based on WPA IE >Already associated with the selected AP. >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=181 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=0004696b6b65010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd090010180201f1000000)' >Association info event >req_ies - hexdump(len=46): 00 04 69 6b 6b 65 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >resp_ies - hexdump(len=27): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 09 00 10 18 02 01 f1 00 00 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:12:17:XX:XX:XX >State: ASSOCIATING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:12:17:XX:XX:XX >No keys have been configured - skip key clearing >Associated with 00:12:17:XX:XX:XX >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >Setting authentication timeout: 10 sec 0 usec >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e1 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: Renewed SNonce - hexdump(len=32): 20 c7 d3 21 4c 63 03 a6 ed 11 2e 01 11 23 8d 5b 30 7c 9e 94 70 c1 cf 58 cb 0e ae e5 e3 96 e3 a3 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 20 c7 d3 21 4c 63 03 a6 ed 11 2e 01 11 23 8d 5b 30 7c 9e 94 70 c1 cf 58 cb 0e ae e5 e3 96 e3 a3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 64 4c 27 2a d8 6d 4d 41 75 1b 14 7e bb f7 92 3d 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e1 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 02 20 c7 d3 21 4c 63 03 a6 ed 11 2e 01 11 23 8d 5b 30 7c 9e 94 70 c1 cf 58 cb 0e ae e5 e3 96 e3 a3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5c 3f b8 5e d0 1b 77 8f ad 75 67 5f 9a 40 50 6f 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 05 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e1 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 05 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 05 20 c7 d3 21 4c 63 03 a6 ed 11 2e 01 11 23 8d 5b 30 7c 9e 94 70 c1 cf 58 cb 0e ae e5 e3 96 e3 a3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 29 0a 93 2b 1b 35 3e 76 c1 6b 02 46 7d c4 9b d5 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 06 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e1 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 06 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 06 20 c7 d3 21 4c 63 03 a6 ed 11 2e 01 11 23 8d 5b 30 7c 9e 94 70 c1 cf 58 cb 0e ae e5 e3 96 e3 a3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b5 f4 ef 59 c3 3a bd 37 9b 19 08 2b a8 0d 59 51 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 07 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 07 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e1 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 07 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 07 20 c7 d3 21 4c 63 03 a6 ed 11 2e 01 11 23 8d 5b 30 7c 9e 94 70 c1 cf 58 cb 0e ae e5 e3 96 e3 a3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ce 09 93 b9 ae 0e cd 00 ab 6d e8 91 14 c7 8f c6 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:00:00:00:00:00 >WPA: 4-Way Handshake failed - pre-shared key may be incorrect >Setting scan request: 0 sec 100000 usec >Added BSSID 00:12:17:XX:XX:XX into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: 4WAY_HANDSHAKE -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=181 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=0004696b6b65010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd090010180201f1000000)' >Association info event >req_ies - hexdump(len=46): 00 04 69 6b 6b 65 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >resp_ies - hexdump(len=27): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 09 00 10 18 02 01 f1 00 00 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:12:17:XX:XX:XX >State: SCANNING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:12:17:XX:XX:XX >No keys have been configured - skip key clearing >Associated with 00:12:17:XX:XX:XX >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=8 >Received 242 bytes of scan results (1 BSSes) >Scan results: 1 >Selecting BSS from priority group 0 >0: 00:12:17:XX:XX:XX ssid='ikke' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > selected based on WPA IE >Already associated with the selected AP. >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >Setting authentication timeout: 10 sec 0 usec >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e4 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: Renewed SNonce - hexdump(len=32): cd 8f fc fa 56 ed de bc 79 7a b0 b6 21 9c 15 d4 76 36 39 91 6c 6e 77 78 92 25 5b ca 63 f5 23 38 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 02 cd 8f fc fa 56 ed de bc 79 7a b0 b6 21 9c 15 d4 76 36 39 91 6c 6e 77 78 92 25 5b ca 63 f5 23 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 c3 34 26 1c 73 02 0d 07 cb 3c 2f 93 a0 cd c3 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e4 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 03 cd 8f fc fa 56 ed de bc 79 7a b0 b6 21 9c 15 d4 76 36 39 91 6c 6e 77 78 92 25 5b ca 63 f5 23 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2f f8 2b 6b 49 33 6e 27 6e 66 c2 14 47 d8 26 25 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e4 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 04 cd 8f fc fa 56 ed de bc 79 7a b0 b6 21 9c 15 d4 76 36 39 91 6c 6e 77 78 92 25 5b ca 63 f5 23 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c5 e1 2b 5f 09 fa 2a 68 29 a5 4d 1a b9 4d 2f a8 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 05 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e4 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 05 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 05 cd 8f fc fa 56 ed de bc 79 7a b0 b6 21 9c 15 d4 76 36 39 91 6c 6e 77 78 92 25 5b ca 63 f5 23 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 27 90 32 ed c1 df a9 2b 6c d0 7c f7 3e 87 9d ed 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 06 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e4 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 06 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 06 cd 8f fc fa 56 ed de bc 79 7a b0 b6 21 9c 15 d4 76 36 39 91 6c 6e 77 78 92 25 5b ca 63 f5 23 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1c 47 23 dd 6b ff 6c 89 21 21 d1 04 53 74 bf 5a 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 07 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 07 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e4 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 07 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 07 cd 8f fc fa 56 ed de bc 79 7a b0 b6 21 9c 15 d4 76 36 39 91 6c 6e 77 78 92 25 5b ca 63 f5 23 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ce b2 aa 57 4a 19 7c b5 04 33 57 7e ff e3 0f 5c 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:00:00:00:00:00 >WPA: 4-Way Handshake failed - pre-shared key may be incorrect >Setting scan request: 0 sec 100000 usec >BSSID 00:12:17:XX:XX:XX blacklist count incremented to 2 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: 4WAY_HANDSHAKE -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=181 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=0004696b6b65010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f202 RespIEs=010882848b962430486c32040c121860dd090010180201f1000000)' >Association info event >req_ies - hexdump(len=46): 00 04 69 6b 6b 65 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >resp_ies - hexdump(len=27): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 09 00 10 18 02 01 f1 00 00 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:12:17:XX:XX:XX >State: SCANNING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:12:17:XX:XX:XX >No keys have been configured - skip key clearing >Associated with 00:12:17:XX:XX:XX >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=8 >Received 242 bytes of scan results (1 BSSes) >Scan results: 1 >Selecting BSS from priority group 0 >0: 00:12:17:XX:XX:XX ssid='ikke' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > skip - blacklisted >No APs found - clear blacklist and try again >Removed BSSID 00:12:17:XX:XX:XX from blacklist (clear) >Selecting BSS from priority group 0 >0: 00:12:17:XX:XX:XX ssid='ikke' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > selected based on WPA IE >Already associated with the selected AP. >RX EAPOL from 00:12:17:XX:XX:XX >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 ea 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >Setting authentication timeout: 10 sec 0 usec >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 ea > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 23 f9 ee 90 3a 8e 24 f8 c1 f7 65 d5 47 6f 6c fb 08 19 12 2c f6 3d 92 a3 5c 67 1b 9c 87 8c 43 ea 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:12:17:XX:XX:XX (ver=1) >WPA: Renewed SNonce - hexdump(len=32): 89 94 5b 91 27 94 1f 4a 77 72 c0 b3 e6 b0 8c 39 7a 3f 7b 92 66 d4 ad 07 57 db 77 30 14 04 76 f0 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 89 94 5b 91 27 94 1f 4a 77 72 c0 b3 e6 b0 8c 39 7a 3f 7b 92 66 d4 ad 07 57 db 77 30 14 04 76 f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 83 fc f1 89 18 73 c6 74 a7 8b a8 00 10 e8 2d 6d 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >State: 4WAY_HANDSHAKE -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_disassociate >No keys have been configured - skip key clearing >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAPOL: External notification - portValid=0 >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_disassociate >No keys have been configured - skip key clearing >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:00:00:00:00:00 >Added BSSID 00:12:17:XX:XX:XX into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >EAPOL: startWhen --> 0 >Authentication with 00:00:00:00:00:00 timed out. >Added BSSID 00:00:00:00:00:00 into blacklist >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >No keys have been configured - skip key clearing >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >Setting scan request: 0 sec 0 usec >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b1a len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b2a len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >Selecting BSS from priority group 0 >No APs found - clear blacklist and try again >Removed BSSID 00:00:00:00:00:00 from blacklist (clear) >Removed BSSID 00:12:17:XX:XX:XX from blacklist (clear) >Selecting BSS from priority group 0 >No suitable AP found. >Setting scan request: 5 sec 0 usec >Received 0 bytes of scan results (0 BSSes) >Scan results: 0
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 213088
:
139758
|
139759
|
288571
|
291830
|
291831
| 291864 |
291894