Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 311029 Details for
Bug 453390
wifi problems with kernel 2.6.25.9-74
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
Log Attempting to connect to WIFI Network
wpa_supplicant.log (text/plain), 554.96 KB, created by
Luca Botti
on 2008-07-04 10:20:22 UTC
(
hide
)
Description:
Log Attempting to connect to WIFI Network
Filename:
MIME Type:
Creator:
Luca Botti
Created:
2008-07-04 10:20:22 UTC
Size:
554.96 KB
patch
obsolete
>CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >Trying to associate with 00:c0:49:fd:9f:80 (SSID='NETWORKSID' freq=2437 MHz) >Associated with 00:c0:49:fd:9f:80 >Authentication with 00:c0:49:fd:9f:80 timed out. >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >CTRL-EVENT-SCAN-RESULTS >Trying to associate with 00:c0:49:fd:9f:80 (SSID='NETWORKSID' freq=2437 MHz) >Associated with 00:c0:49:fd:9f:80 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >Trying to associate with 00:c0:49:fd:9f:80 (SSID='NETWORKSID' freq=2437 MHz) >Associated with 00:c0:49:fd:9f:80 >CTRL-EVENT-EAP-STARTED EAP authentication started >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >EAP-MSCHAPV2: Authentication succeeded >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >WPA: Key negotiation completed with 00:c0:49:fd:9f:80 [PTK=TKIP GTK=TKIP] >CTRL-EVENT-CONNECTED - Connection to 00:c0:49:fd:9f:80 completed (auth) [id=0 id_str=] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >CTRL-EVENT-EAP-STARTED EAP authentication started >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >EAP-MSCHAPV2: Authentication succeeded >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >WPA: Key negotiation completed with 00:c0:49:fd:9f:80 [PTK=TKIP GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >CTRL-EVENT-EAP-STARTED EAP authentication started >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >EAP-MSCHAPV2: Authentication succeeded >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >WPA: Key negotiation completed with 00:c0:49:fd:9f:80 [PTK=TKIP GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >CTRL-EVENT-SCAN-RESULTS >No network configuration found for the current AP >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >Trying to associate with 00:1e:2a:13:05:0a (SSID='HomeNetwork' freq=2462 MHz) >CTRL-EVENT-SCAN-RESULTS >Associated with 00:1e:2a:13:05:0a >WPA: Key negotiation completed with 00:1e:2a:13:05:0a [PTK=CCMP GTK=TKIP] >CTRL-EVENT-CONNECTED - Connection to 00:1e:2a:13:05:0a completed (auth) [id=0 id_str=] >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >CTRL-EVENT-SCAN-RESULTS >No network configuration found for the current AP >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >Trying to associate with 00:1e:2a:13:05:0a (SSID='HomeNetwork' freq=2462 MHz) >CTRL-EVENT-SCAN-RESULTS >Associated with 00:1e:2a:13:05:0a >WPA: Key negotiation completed with 00:1e:2a:13:05:0a [PTK=CCMP GTK=TKIP] >CTRL-EVENT-CONNECTED - Connection to 00:1e:2a:13:05:0a completed (auth) [id=0 id_str=] >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >Trying to associate with 00:c0:49:fd:9f:80 (SSID='NETWORKSID' freq=2437 MHz) >Associated with 00:c0:49:fd:9f:80 >CTRL-EVENT-EAP-STARTED EAP authentication started >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >EAP-MSCHAPV2: Authentication succeeded >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >WPA: Key negotiation completed with 00:c0:49:fd:9f:80 [PTK=TKIP GTK=TKIP] >CTRL-EVENT-CONNECTED - Connection to 00:c0:49:fd:9f:80 completed (auth) [id=0 id_str=] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >Associated with 00:c0:49:fd:9f:80 >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-EAP-STARTED EAP authentication started >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >EAP-MSCHAPV2: Authentication succeeded >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >WPA: Key negotiation completed with 00:c0:49:fd:9f:80 [PTK=TKIP GTK=TKIP] >CTRL-EVENT-CONNECTED - Connection to 00:c0:49:fd:9f:80 completed (reauth) [id=0 id_str=] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >Associated with 00:c0:49:fd:9f:80 >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-EAP-STARTED EAP authentication started >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >EAP-MSCHAPV2: Authentication succeeded >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >WPA: Key negotiation completed with 00:c0:49:fd:9f:80 [PTK=TKIP GTK=TKIP] >CTRL-EVENT-CONNECTED - Connection to 00:c0:49:fd:9f:80 completed (reauth) [id=0 id_str=] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >Associated with 00:c0:49:fd:9f:80 >CTRL-EVENT-EAP-STARTED EAP authentication started >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >EAP-MSCHAPV2: Authentication succeeded >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >WPA: Key negotiation completed with 00:c0:49:fd:9f:80 [PTK=TKIP GTK=TKIP] >CTRL-EVENT-CONNECTED - Connection to 00:c0:49:fd:9f:80 completed (reauth) [id=0 id_str=] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >Associated with 00:c0:49:fd:9f:80 >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-EAP-STARTED EAP authentication started >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >EAP-MSCHAPV2: Authentication succeeded >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >WPA: Key negotiation completed with 00:c0:49:fd:9f:80 [PTK=TKIP GTK=TKIP] >CTRL-EVENT-CONNECTED - Connection to 00:c0:49:fd:9f:80 completed (reauth) [id=0 id_str=] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >Associated with 00:c0:49:fd:9f:80 >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-EAP-STARTED EAP authentication started >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >EAP-MSCHAPV2: Authentication succeeded >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >WPA: Key negotiation completed with 00:c0:49:fd:9f:80 [PTK=TKIP GTK=TKIP] >CTRL-EVENT-CONNECTED - Connection to 00:c0:49:fd:9f:80 completed (reauth) [id=0 id_str=] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >Associated with 00:c0:49:fd:9f:80 >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-EAP-STARTED EAP authentication started >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >EAP-MSCHAPV2: Authentication succeeded >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >WPA: Key negotiation completed with 00:c0:49:fd:9f:80 [PTK=TKIP GTK=TKIP] >CTRL-EVENT-CONNECTED - Connection to 00:c0:49:fd:9f:80 completed (reauth) [id=0 id_str=] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >Associated with 00:c0:49:fd:9f:80 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >Authentication with 00:00:00:00:00:00 timed out. >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >CTRL-EVENT-SCAN-RESULTS >Providing DBus service 'fi.epitest.hostap.WPASupplicant'. >Initializing interface 'wlan0' conf 'N/A' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' >Initializing interface (2) 'wlan0' >SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf > capabilities: key_mgmt 0xf enc 0xf >WEXT: Operstate: linkmode=1, operstate=5 >Own MAC address: 00:1d:e0:98:a5:dd >wpa_driver_wext_set_wpa >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_countermeasures >wpa_driver_wext_set_drop_unencrypted >RSN: flushing PMKID list in the driver >Setting scan request: 0 sec 100000 usec >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: KEY_RX entering state NO_KEY_RECEIVE >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >Added interface wlan0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) >Wireless event: cmd=0x8b06 len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) >Wireless event: cmd=0x8b2a len=16 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >Setting scan request: 0 sec 0 usec >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >Trying to get current scan results first without requesting a new scan to speed up initial association >Failed to get scan results >Failed to get scan results - try scanning again >Setting scan request: 0 sec 0 usec >No enabled networks - do not scan >State: SCANNING -> INACTIVE >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >EAPOL: disable timer tick >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >No suitable AP found. >Setting scan request: 5 sec 0 usec >No enabled networks - do not scan >State: INACTIVE -> INACTIVE >Setting scan request: 0 sec 0 usec >State: INACTIVE -> SCANNING >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >No suitable AP found. >Setting scan request: 5 sec 0 usec >No enabled networks - do not scan >State: SCANNING -> INACTIVE >pairwise: 0x18 >ssid - hexdump_ascii(len=5): > 53 53 49 44 31 NETWORKSID >group: 0x1e >fragment_size=1300 (0x514) >eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 >proto: 0x3 >key_mgmt: 0x1 >password - hexdump_ascii(len=8): > 42 30 74 2e 31 75 43 2e password >anonymous_identity - hexdump_ascii(len=9): > 61 6e 6f 6e 79 6d 6f 75 73 anonymous >phase1 - hexdump_ascii(len=9): > 70 65 61 70 76 65 72 3d 30 peapver=0 >scan_ssid=1 (0x1) >phase2 - hexdump_ascii(len=13): > 61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 >identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >Setting scan request: 0 sec 0 usec >State: INACTIVE -> SCANNING >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=5): > 53 53 49 44 31 NETWORKSID >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=16 >Received 854 bytes of scan results (3 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:c0:49:fd:9f:80 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > selected based on WPA IE > selected WPA AP 00:c0:49:fd:9f:80 ssid='NETWORKSID' >Try to find non-WPA AP >Trying to associate with 00:c0:49:fd:9f:80 (SSID='NETWORKSID' freq=2437 MHz) >Cancelling scan request >WPA: clearing own WPA/RSN IE >Automatic auth_alg selection: 0x1 >WPA: using IEEE 802.11i/D3.0 >WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 1 proto 1 >WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >WPA: clearing AP RSN IE >WPA: using GTK TKIP >WPA: using PTK TKIP >WPA: using KEY_MGMT 802.1X >WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >No keys have been configured - skip key clearing >wpa_driver_wext_set_drop_unencrypted >State: SCANNING -> ASSOCIATING >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_associate >Setting authentication timeout: 20 sec 0 usec >EAPOL: External notification - portControl=Auto >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b06 len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b04 len=16 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b1a len=21 >Setting scan request: 0 sec 0 usec >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=16 >Received 1153 bytes of scan results (4 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:c0:49:fd:9f:80 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > selected based on WPA IE > selected WPA AP 00:c0:49:fd:9f:80 ssid='NETWORKSID' >Try to find non-WPA AP >Already associated with the selected AP. >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=221 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00055353494431010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f201 RespIEs=010882848b0c1296182432043048606cdd180050f20201010000030f0000270f000052f75d0072732e00)' >Association info event >req_ies - hexdump(len=47): 00 05 53 53 49 44 31 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 00 00 03 0f 00 00 27 0f 00 00 52 f7 5d 00 72 73 2e 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:c0:49:fd:9f:80 >State: ASSOCIATING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:c0:49:fd:9f:80 >No keys have been configured - skip key clearing >Associated with 00:c0:49:fd:9f:80 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: enable timer tick >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RX EAPOL from 00:c0:49:fd:9f:80 >RX EAPOL - hexdump(len=14): 01 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=5): > 68 65 6c 6c 6f hello >EAP: using anonymous identity - hexdump_ascii(len=9): > 61 6e 6f 6e 79 6d 6f 75 73 anonymous >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:fd:9f:80 >TX EAPOL - hexdump(len=18): 01 00 00 0e 02 00 00 0e 01 61 6e 6f 6e 79 6d 6f 75 73 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:fd:9f:80 >RX EAPOL - hexdump(len=10): 01 00 00 06 01 01 00 06 19 20 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=1 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) >EAP-PEAP: Forced PEAP version 0 >TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >EAP: EAP entering state METHOD >SSL: Received packet(len=6) - Flags 0x20 >EAP-PEAP: Start (server ver=0, own ver=0) >EAP-PEAP: Using PEAP version 0 >SSL: (where=0x10 ret=0x1) >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:before/connect initialization >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client hello A >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read server hello A >SSL: SSL_connect - want more data >SSL: 111 bytes pending from ssl_out >SSL: 111 bytes left to be sent out (of total 111 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:fd:9f:80 >TX EAPOL - hexdump(len=121): 01 00 00 75 02 01 00 75 19 00 16 03 01 00 6a 01 00 00 66 03 01 48 6d eb 12 0b 3e 58 4a 9d 0e b8 48 fa cc a1 b0 78 ed d6 53 4b 2a 4f e9 61 15 9b ee 3f f8 39 5b 00 00 38 00 39 00 38 00 35 00 88 00 87 00 84 00 16 00 13 00 0a 00 33 00 32 00 2f 00 9a 00 99 00 96 00 45 00 44 00 41 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 02 01 00 00 04 00 23 00 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:fd:9f:80 >RX EAPOL - hexdump(len=1038): 01 00 04 0a 01 02 04 0a 19 c0 00 00 07 f7 16 03 01 00 4a 02 00 00 46 03 01 48 6d eb 4d 8a c9 94 65 3a 98 f2 6c 2f 15 bf a6 71 1b 1b 05 71 e8 8f 6f 81 59 53 b8 f4 d0 78 32 20 c4 bd 22 d7 ef c3 8a c0 92 59 fd 92 b9 1e b7 0c 4e ea f0 f5 07 d0 79 a6 de 6f 00 9c aa 6b c4 78 00 39 00 16 03 01 06 88 0b 00 06 84 00 06 81 00 02 c2 30 82 02 be 30 82 02 27 a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 35 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 37 31 31 32 31 31 30 34 31 35 36 5a 30 81 8e 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 10 30 0e 06 03 55 04 03 13 07 52 4f 4f 54 20 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 e1 14 fe 0f 20 51 89 c1 68 0d 84 f7 15 45 0d 82 cf ce eb c4 57 3a dc 1e 8d 88 bd 0d 12 00 3a a2 8d 79 47 3e 3d a2 6e ab 68 a9 05 32 f3 e1 85 13 f9 a0 28 01 e0 4d df 2b 5c 99 fd d8 3f 62 75 f6 81 42 63 63 ef bc 67 8e 22 5e a2 f4 da d9 f1 40 71 26 11 3a 0a 73 2b 2f 18 db 20 98 5f c6 a1 fc d0 de 80 e0 c5 73 56 c4 9a 15 0c 0a 3b a7 89 bf 9b eb 63 13 06 01 83 83 be 7b 0a 74 af 7f 4a cf 02 03 01 00 01 a3 17 30 15 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 4c 8d 15 93 47 26 0f 59 2e 4e 7f d0 16 65 e4 8c c0 4c 73 17 07 9a 90 c1 52 27 b9 3e 56 8c 0c fa 9b 1c b8 90 a3 e4 2c 82 61 70 86 2d 8a c3 ca 45 14 b5 bb 55 00 ca 15 7c 0f 33 3f 19 08 37 e0 88 8e 53 e5 5a eb a5 78 eb 92 c8 89 95 7b c7 79 40 59 c7 4c 90 c2 c2 07 b9 68 80 5f 21 ff f4 b0 fd 83 ab 0f 97 e8 b0 f0 f3 80 d8 80 67 6a 9b 16 d3 26 af 4a 88 8e f2 a0 4b a6 72 b2 1c d6 5c c4 d5 00 03 b9 30 82 03 b5 30 82 03 1e a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 33 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 38 31 31 32 30 31 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1034) - Flags 0xc0 >SSL: TLS Message Length: 2039 >SSL: Need 1015 bytes more input data >SSL: Building ACK (type=25 id=2 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:fd:9f:80 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:fd:9f:80 >RX EAPOL - hexdump(len=1025): 01 00 03 fd 01 03 03 fd 19 00 30 34 31 35 36 5a 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 97 8f 78 af a5 f4 70 a1 00 41 5b fa 62 28 19 69 f6 e5 f7 6a 1a 27 85 ca 8a 15 00 55 54 15 97 68 0b 2e 55 39 e4 b0 6b 76 55 86 84 53 7c 56 fc 74 52 da 73 a3 54 ae 74 47 64 9e 1f ff 1b 1e 3d 1c 8b c1 8d af 89 94 e9 0e d0 c9 56 83 52 c4 50 a9 24 81 10 3d 0a e7 7e 6e 7b 30 ae fd 1b 4d f8 96 87 3f 7d 72 2a cd fa 22 f9 cd 29 17 f4 da 15 eb de 6a de b3 e1 9d 2a c5 3b 3d ea 3c f6 a6 a6 71 02 03 01 00 01 a3 82 01 01 30 81 fe 30 1d 06 03 55 1d 0e 04 16 04 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f 30 81 ce 06 03 55 1d 23 04 81 c6 30 81 c3 80 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f a1 81 9f a4 81 9c 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 82 09 00 d9 c7 09 10 ab 9f 78 33 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 74 1a c9 c3 9b 7a a4 5a e4 16 4c d1 af 8e b6 95 20 80 ca 9e 5f 89 82 ba e7 99 63 da 67 b9 c0 7b 86 aa 51 3d 24 41 58 dd d9 2d e7 cb e6 6f 3a 8f 15 5e ca 21 5a f7 46 21 a3 bb b5 f6 9c d0 82 1b b5 f5 3d c9 ed 94 51 aa f2 ff ca 34 d0 48 05 2c 66 92 6f 50 c7 49 0e c4 2d 1d 19 a3 9c ca b9 f9 c0 b1 d0 17 b9 fe 80 90 d6 dd 2b 38 70 74 4e a7 53 99 3e bf cd 0e d4 79 bb 2f f5 8e ba 6c d1 69 16 03 01 01 0d 0c 00 01 09 00 40 c3 4a f6 2a e3 ab 87 b9 1c 92 96 23 c3 a2 11 50 ae 15 b2 0c de bc fb 0d 00 a3 98 83 d1 d1 c7 63 1d df 5f 35 06 a0 fa 4c 4e 01 3f 17 c1 05 aa 50 d0 3b 48 16 46 75 d5 37 8e 2c 82 9b 06 17 11 bb 00 01 02 00 40 7c 92 23 36 81 66 ea 94 dd ae 21 7c e5 4d 29 ef 0f 1e c4 1f 5f 93 ce 8b 52 4f d6 59 29 c2 82 a4 66 b2 48 e5 45 e3 a2 42 0b ff 03 27 01 2c cf 88 9d 42 35 74 c9 8d 64 ba 7c 10 8b 59 aa 41 6c f1 00 80 35 57 dd 2d e2 d2 c1 aa 9f af 61 c9 4a 99 13 ff f5 ab 03 3e a8 6e a6 84 d8 2d 1c 9b 4e 84 60 43 19 82 97 a6 0a 59 05 1e f3 ca 94 bb 9e f3 4b 64 f6 b2 3e 7f 87 d6 65 6f f5 cc 43 77 79 97 0f 68 16 b2 61 44 4d ab 20 ed d3 b8 7c 43 75 ec 1c 99 38 5e af 78 d9 f4 c9 ff bd 4a 38 1e 87 6c e6 cb 79 30 10 9f f3 44 b0 32 75 fd c5 24 9b c9 2c f1 4e 0d ec c2 99 6e 8a b9 82 f2 73 68 f9 08 b0 46 16 03 01 00 04 0e 00 00 00 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1021) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server hello A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server certificate A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server done A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write change cipher spec A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write finished A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 flush data >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read finished A >SSL: SSL_connect - want more data >SSL: 134 bytes pending from ssl_out >SSL: 134 bytes left to be sent out (of total 134 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:fd:9f:80 >TX EAPOL - hexdump(len=144): 01 00 00 8c 02 03 00 8c 19 00 16 03 01 00 46 10 00 00 42 00 40 8c 71 88 c9 42 e0 f4 6c cb 02 32 51 1b 99 03 05 75 28 62 6c de 8d 62 89 26 b6 9f 03 f8 1b 4f fc 5b 39 bf 73 e1 fa ef 92 34 50 96 4f 74 e0 79 a1 49 35 0d b3 da f6 1e 37 c0 9e 11 a7 c6 50 1c f6 14 03 01 00 01 01 16 03 01 00 30 13 3e 6b 5d 28 c4 5d 8c b3 df f5 da de 4e c9 a7 d8 a6 8d a9 59 77 1c ce e4 3d 3a e7 f9 8d 98 05 20 31 d9 36 27 14 f6 a0 0d d1 b4 9f 49 16 f9 04 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:fd:9f:80 >RX EAPOL - hexdump(len=69): 01 00 00 41 01 04 00 41 19 00 14 03 01 00 01 01 16 03 01 00 30 de 55 92 6c c3 41 8d 1b db 32 85 47 eb 44 7c 8f da 7d 7e 74 e1 10 ed 43 e7 92 c1 fc 28 8b 0d ed 71 42 3b a8 fb f1 f2 57 e7 b2 28 ed 90 93 60 70 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=65) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read finished A >SSL: (where=0x20 ret=0x1) >SSL: (where=0x1002 ret=0x1) >SSL: 0 bytes pending from ssl_out >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >SSL: No data to be sent out >EAP-PEAP: TLS done, proceed to Phase 2 >EAP-PEAP: using label 'client EAP encryption' in key derivation >EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] >SSL: Building ACK (type=25 id=4 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:fd:9f:80 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:fd:9f:80 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 05 00 2b 19 00 17 03 01 00 20 2c bb 3c 8a 3c 71 17 af 48 67 7a 21 38 36 f4 5c 03 f2 49 ca 06 55 0a 91 5d ca 85 e0 a3 c0 82 ea >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 05 00 05 01 >EAP-PEAP: received Phase 2: code=1 identifier=5 length=5 >EAP-PEAP: Phase 2 Request: type=1 >EAP: using real identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=10): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:fd:9f:80 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 05 00 50 19 00 17 03 01 00 20 5c af 94 4f ab 10 bb f1 8d 4a bb 2a 02 c9 8f 17 88 0d cb eb 0a 14 dc ec 3c d4 9b 10 17 9f bd f7 17 03 01 00 20 33 2e 2f 56 5d 07 17 97 3b ff 2a 3b c8 84 21 c3 d8 40 1e 86 ff b4 97 e9 5c 9d 47 b8 0c f5 fb 3f >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:fd:9f:80 >RX EAPOL - hexdump(len=63): 01 00 00 3b 01 06 00 3b 19 00 17 03 01 00 30 0c 79 15 65 65 e9 3a 2a 84 37 13 c3 7f 76 85 fd 51 c7 ca e9 27 13 c8 3f 9f 47 72 82 36 2e a7 53 f3 92 1e 51 0f 13 36 7d f7 e3 5e 11 eb 03 3f cc >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=59) - Flags 0x00 >EAP-PEAP: received 53 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=27): 1a 01 06 00 1a 10 3e 41 ce a1 06 08 47 80 14 ab a8 fc 2d a9 5f 91 78 62 6f 74 6c >EAP-PEAP: received Phase 2: code=1 identifier=6 length=31 >EAP-PEAP: Phase 2 Request: type=26 >EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26 >EAP-MSCHAPV2: RX identifier 6 mschapv2_id 6 >EAP-MSCHAPV2: Received challenge >EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-MSCHAPV2: Generating Challenge Response >MSCHAPV2: Identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: Username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: auth_challenge - hexdump(len=16): 3e 41 ce a1 06 08 47 80 14 ab a8 fc 2d a9 5f 91 >MSCHAPV2: peer_challenge - hexdump(len=16): f6 93 c8 b7 f1 76 e6 db 3e 89 e4 7b 50 85 cc ac >MSCHAPV2: username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: password - hexdump_ascii(len=8): [REMOVED] >MSCHAPV2: NT Response - hexdump(len=24): 01 76 14 d9 14 63 98 a9 7e 35 cf ff 70 5b 12 6d d9 b5 c8 76 ba 6e d8 f8 >MSCHAPV2: Auth Response - hexdump(len=20): e9 dd 7a d1 0b 69 41 a6 c3 e8 53 2b e3 3a fe 6e b9 50 2a f5 >MSCHAPV2: Master Key - hexdump(len=16): [REMOVED] >EAP-MSCHAPV2: TX identifier 6 mschapv2_id 6 (response) >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=64): [REMOVED] >SSL: 138 bytes left to be sent out (of total 138 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:fd:9f:80 >TX EAPOL - hexdump(len=148): 01 00 00 90 02 06 00 90 19 00 17 03 01 00 20 d2 5d c9 46 0c 32 ee 2b 8e b7 3e ce 32 6e e5 46 cb 56 a6 5c e6 fc 1d 03 41 d0 1a 53 f7 29 f5 b8 17 03 01 00 60 35 04 05 ed b3 38 03 25 2a 65 f2 5d 36 27 82 69 ca ab 15 d6 ca 7c 30 87 86 69 1b ca ad b5 54 ca eb 8a 07 4f 3e 1b 7f c9 da 20 ef a2 7b d6 d2 c2 eb 77 7c 90 de a2 b9 11 76 a7 62 d1 72 73 a1 5c eb f9 70 0e a3 48 fe cf 0b 48 01 fd 13 da 89 31 d6 24 99 1e 5c 10 cb 69 24 ec 88 6f 5b 9c 16 f0 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:fd:9f:80 >RX EAPOL - hexdump(len=95): 01 00 00 5b 01 07 00 5b 19 00 17 03 01 00 50 60 a0 63 29 9c 55 80 d6 12 55 43 92 9f e6 70 b9 16 f2 80 71 61 99 8f 54 9e ff a7 38 0c d4 2c 48 e6 84 37 a1 a8 57 99 f7 86 09 75 2b e3 db 67 86 38 ec a5 31 80 c2 42 a8 f3 ac c4 ab a0 3d 60 b3 bb 6f d8 86 5e cb 47 0b 78 aa 20 a1 fa 65 e7 98 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=91) - Flags 0x00 >EAP-PEAP: received 85 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 06 00 2e 53 3d 45 39 44 44 37 41 44 31 30 42 36 39 34 31 41 36 43 33 45 38 35 33 32 42 45 33 33 41 46 45 36 45 42 39 35 30 32 41 46 35 >EAP-PEAP: received Phase 2: code=1 identifier=7 length=51 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 7 mschapv2_id 6 >EAP-MSCHAPV2: Received success >EAP-MSCHAPV2: Success message - hexdump_ascii(len=0): >EAP-MSCHAPV2: Authentication succeeded >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:fd:9f:80 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 07 00 50 19 00 17 03 01 00 20 ed b9 2d a1 6c 4c 34 71 a7 61 b3 90 04 1c fe 3f a2 60 33 f5 33 de 29 fc 59 6c af 94 5a 3b 8b 1e 17 03 01 00 20 b0 2b dd 2e 9c 12 9d 61 72 94 64 e4 62 2f 25 aa 57 57 58 db 4a b0 c4 28 a2 78 cf ac 50 b8 1d 82 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:fd:9f:80 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 08 00 2b 19 00 17 03 01 00 20 d7 b1 a1 83 e2 f5 63 b1 e7 8f 78 c6 ba d4 41 5f 91 8f 82 69 7d 36 61 91 0f 38 35 cb 29 fc ce b9 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 08 00 0b 21 80 03 00 02 00 01 >EAP-PEAP: received Phase 2: code=1 identifier=8 length=11 >EAP-PEAP: Phase 2 Request: type=33 >EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01 >EAP-TLV: Result TLV - hexdump(len=2): 00 01 >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:fd:9f:80 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 08 00 50 19 00 17 03 01 00 20 19 b7 b9 90 82 f3 5a 7f c2 b4 76 a5 46 0f 4d de 55 12 bb 37 a1 81 90 e3 43 dd 81 bc ee fa a2 d2 17 03 01 00 20 f6 c9 2d 5b 1e 34 99 51 78 e1 1b a9 d4 1b b7 bd 81 ee 0f 37 8e 2d 73 20 fd e1 1a f3 dd 81 3f b2 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:fd:9f:80 >RX EAPOL - hexdump(len=8): 01 00 00 04 03 08 00 04 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Success >EAP: EAP entering state SUCCESS >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state SUCCESS >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:c0:49:fd:9f:80 >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 ed 58 34 83 d3 e9 d6 fd 70 2f 82 eb 0a a6 8d 29 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 91 e5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): ed 58 34 83 d3 e9 d6 fd 70 2f 82 eb 0a a6 8d 29 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 91 e5 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 ed 58 34 83 d3 e9 d6 fd 70 2f 82 eb 0a a6 8d 29 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 91 e5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:c0:49:fd:9f:80 (ver=1) >EAPOL: Successfully fetched key (len=32) >WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED] >WPA: Renewed SNonce - hexdump(len=32): 1e de 4c 86 95 6f f7 99 0d 20 05 ed 2b 7d 5b c8 a5 ec f2 b4 03 06 a4 a9 19 19 77 e4 81 55 88 2e >WPA: PTK derivation - A1=00:1d:e0:98:a5:dd A2=00:c0:49:fd:9f:80 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 1e de 4c 86 95 6f f7 99 0d 20 05 ed 2b 7d 5b c8 a5 ec f2 b4 03 06 a4 a9 19 19 77 e4 81 55 88 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8d aa e7 83 dc 2c f3 13 02 5d 16 a4 00 24 34 49 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RX EAPOL from 00:c0:49:fd:9f:80 >RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 ed 58 34 83 d3 e9 d6 fd 70 2f 82 eb 0a a6 8d 29 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 91 e5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 49 df 7b 94 ed 1a 39 41 ec 93 3c 17 ce 3b ee 74 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=121 > EAPOL-Key type=254 > key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) > key_length=32 key_data_length=26 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): ed 58 34 83 d3 e9 d6 fd 70 2f 82 eb 0a a6 8d 29 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 91 e5 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 49 df 7b 94 ed 1a 39 41 ec 93 3c 17 ce 3b ee 74 >WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 ed 58 34 83 d3 e9 d6 fd 70 2f 82 eb 0a a6 8d 29 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 91 e5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 49 df 7b 94 ed 1a 39 41 ec 93 3c 17 ce 3b ee 74 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 3 of 4-Way Handshake from 00:c0:49:fd:9f:80 (ver=1) >WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >WPA: Sending EAPOL-Key 4/4 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3b 97 16 bc dd 3a d0 1b 54 55 c5 be ee 7b 36 15 00 00 >WPA: Installing PTK to the driver. >WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 >State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >RX EAPOL from 00:c0:49:fd:9f:80 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 ed 58 34 83 d3 e9 d6 fd 70 2f 82 eb 0a a6 8d 29 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 90 45 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 91 e7 ed 2f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 95 41 f6 ce 08 1c 01 f3 da ab f0 00 66 0c f7 e5 00 20 1d 77 46 47 22 e5 3d f7 eb e0 2e a1 16 d7 6e 55 e2 42 70 44 1e 7b 95 af 7b 14 aa 0a 16 17 c0 3c >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): ed 58 34 83 d3 e9 d6 fd 70 2f 82 eb 0a a6 8d 29 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 90 45 > key_iv - hexdump(len=16): 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 91 e7 > key_rsc - hexdump(len=8): ed 2f 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 95 41 f6 ce 08 1c 01 f3 da ab f0 00 66 0c f7 e5 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 ed 58 34 83 d3 e9 d6 fd 70 2f 82 eb 0a a6 8d 29 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 90 45 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 91 e7 ed 2f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 95 41 f6 ce 08 1c 01 f3 da ab f0 00 66 0c f7 e5 00 20 1d 77 46 47 22 e5 3d f7 eb e0 2e a1 16 d7 6e 55 e2 42 70 44 1e 7b 95 af 7b 14 aa 0a 16 17 c0 3c >WPA: RX message 1 of Group Key Handshake from 00:c0:49:fd:9f:80 (ver=1) >State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): ed 2f 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe 58 9a 36 77 30 dd 24 4d 9c 07 73 54 e2 fb 29 00 00 >WPA: Key negotiation completed with 00:c0:49:fd:9f:80 [PTK=TKIP GTK=TKIP] >Cancelling scan request >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >CTRL-EVENT-CONNECTED - Connection to 00:c0:49:fd:9f:80 completed (auth) [id=0 id_str=] >wpa_driver_wext_set_operstate: operstate 0->1 (UP) >WEXT: Operstate: linkmode=-1, operstate=6 >EAPOL: External notification - portValid=1 >EAPOL: SUPP_PAE entering state AUTHENTICATED >EAPOL authentication completed successfully >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:c0:49:fd:9f:80 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 ed 58 34 83 d3 e9 d6 fd 70 2f 82 eb 0a a6 8d 29 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 90 45 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 91 e8 ee 2f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 12 00 50 48 bf 12 32 fb 0f ff 83 98 51 9e a3 6a 00 20 0c 76 c2 86 43 00 f3 2d 20 40 89 06 36 13 67 34 94 95 43 6e 20 a9 cb 51 39 dc 40 c8 27 95 26 fa >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > key_nonce - hexdump(len=32): ed 58 34 83 d3 e9 d6 fd 70 2f 82 eb 0a a6 8d 29 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 90 45 > key_iv - hexdump(len=16): 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 91 e8 > key_rsc - hexdump(len=8): ee 2f 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 12 00 50 48 bf 12 32 fb 0f ff 83 98 51 9e a3 6a >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 ed 58 34 83 d3 e9 d6 fd 70 2f 82 eb 0a a6 8d 29 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 90 45 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 91 e8 ee 2f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 12 00 50 48 bf 12 32 fb 0f ff 83 98 51 9e a3 6a 00 20 0c 76 c2 86 43 00 f3 2d 20 40 89 06 36 13 67 34 94 95 43 6e 20 a9 cb 51 39 dc 40 c8 27 95 26 fa >WPA: RX message 1 of Group Key Handshake from 00:c0:49:fd:9f:80 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): ee 2f 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1b db 52 c6 5e b0 6b 2f 8c d5 cd bd 89 66 3d 19 00 00 >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RX EAPOL from 00:c0:49:fd:9f:80 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 ed 58 34 83 d3 e9 d6 fd 70 2f 82 eb 0a a6 8d 29 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 90 45 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 91 e9 ee 2f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 f6 8b 3e 93 90 ad 16 fa eb fc 15 0b 7f 7f 11 00 20 20 bf a5 b2 a3 ee 9d a4 93 2e 3b a5 c5 16 c3 d3 8d 41 da bc 42 41 a0 f6 10 7c 9e 6d 8c ae 8d c1 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 > key_nonce - hexdump(len=32): ed 58 34 83 d3 e9 d6 fd 70 2f 82 eb 0a a6 8d 29 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 90 45 > key_iv - hexdump(len=16): 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 91 e9 > key_rsc - hexdump(len=8): ee 2f 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): f0 f6 8b 3e 93 90 ad 16 fa eb fc 15 0b 7f 7f 11 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 ed 58 34 83 d3 e9 d6 fd 70 2f 82 eb 0a a6 8d 29 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 90 45 3b 3c 32 b3 f2 d6 4a 17 4e 1c fe 1f 26 93 91 e9 ee 2f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 f6 8b 3e 93 90 ad 16 fa eb fc 15 0b 7f 7f 11 00 20 20 bf a5 b2 a3 ee 9d a4 93 2e 3b a5 c5 16 c3 d3 8d 41 da bc 42 41 a0 f6 10 7c 9e 6d 8c ae 8d c1 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:fd:9f:80 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): ee 2f 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b5 61 dd e5 2b 1f 3e b8 89 53 ac 57 f2 a7 85 94 00 00 >WPA: Group rekeying completed with 00:c0:49:fd:9f:80 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >EAPOL: startWhen --> 0 >RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >Setting scan request: 0 sec 100000 usec >Added BSSID 00:c0:49:fd:9f:80 into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: COMPLETED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >Added BSSID 00:00:00:00:00:00 into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >Driver did not support SIOCSIWENCODEEXT >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >State: DISCONNECTED -> SCANNING >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=5): > 53 53 49 44 31 NETWORKSID >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=221 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00055353494431010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f201 RespIEs=010882848b0c1296182432043048606cdd180050f20201010000030f0000270f000052f75d0072732e00)' >Association info event >req_ies - hexdump(len=47): 00 05 53 53 49 44 31 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 00 00 03 0f 00 00 27 0f 00 00 52 f7 5d 00 72 73 2e 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:c0:49:fd:9f:80 >State: SCANNING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:c0:49:fd:9f:80 >No keys have been configured - skip key clearing >Associated with 00:c0:49:fd:9f:80 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >TX EAPOL: dst=00:c0:49:fd:9f:80 >TX EAPOL - hexdump(len=4): 01 01 00 00 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:c0:49:fd:9f:80 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > selected based on WPA IE > selected WPA AP 00:c0:49:fd:9f:80 ssid='NETWORKSID' >Try to find non-WPA AP >Already associated with the selected AP. >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=221 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00055353494431010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f201 RespIEs=010882848b0c1296182432043048606cdd180050f20201010000030f0000270f000052f75d0072732e00)' >Association info event >req_ies - hexdump(len=47): 00 05 53 53 49 44 31 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 00 00 03 0f 00 00 27 0f 00 00 52 f7 5d 00 72 73 2e 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:c0:49:fd:9f:80 >State: ASSOCIATED -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated with 00:c0:49:fd:9f:80 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >TX EAPOL: dst=00:c0:49:fd:9f:80 >TX EAPOL - hexdump(len=4): 01 01 00 00 >Authentication with 00:c0:49:fd:9f:80 timed out. >BSSID 00:c0:49:fd:9f:80 blacklist count incremented to 2 >wpa_driver_wext_disassociate >No keys have been configured - skip key clearing >State: ASSOCIATED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >Setting scan request: 0 sec 0 usec >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >BSSID 00:00:00:00:00:00 blacklist count incremented to 2 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >Driver did not support SIOCSIWENCODEEXT >State: SCANNING -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:c0:49:fd:9f:80 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - blacklisted >1: 00:c0:49:1c:ec:d4 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > selected based on WPA IE > selected WPA AP 00:c0:49:1c:ec:d4 ssid='NETWORKSID' >Try to find non-WPA AP >Trying to associate with 00:c0:49:1c:ec:d4 (SSID='NETWORKSID' freq=2412 MHz) >Cancelling scan request >WPA: clearing own WPA/RSN IE >Automatic auth_alg selection: 0x1 >WPA: using IEEE 802.11i/D3.0 >WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 1 proto 1 >WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >WPA: clearing AP RSN IE >WPA: using GTK TKIP >WPA: using PTK TKIP >WPA: using KEY_MGMT 802.1X >WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >No keys have been configured - skip key clearing >wpa_driver_wext_set_drop_unencrypted >State: DISCONNECTED -> ASSOCIATING >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_associate >Setting authentication timeout: 20 sec 0 usec >EAPOL: External notification - portControl=Auto >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b06 len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b04 len=16 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b1a len=21 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:c0:49:fd:9f:80 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - blacklisted >1: 00:c0:49:1c:ec:d4 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > selected based on WPA IE > selected WPA AP 00:c0:49:1c:ec:d4 ssid='NETWORKSID' >Try to find non-WPA AP >Already associated with the selected AP. >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=221 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00055353494431010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f201 RespIEs=010882848b0c1296182432043048606cdd180050f20201010000030f0000270f000052f75d0072732e00)' >Association info event >req_ies - hexdump(len=47): 00 05 53 53 49 44 31 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 00 00 03 0f 00 00 27 0f 00 00 52 f7 5d 00 72 73 2e 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:c0:49:1c:ec:d4 >State: ASSOCIATING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:c0:49:1c:ec:d4 >No keys have been configured - skip key clearing >Associated with 00:c0:49:1c:ec:d4 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >Setting scan request: 0 sec 100000 usec >Added BSSID 00:c0:49:1c:ec:d4 into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >Driver did not support SIOCSIWENCODEEXT >State: ASSOCIATED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >State: DISCONNECTED -> SCANNING >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=5): > 53 53 49 44 31 NETWORKSID >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:c0:49:fd:9f:80 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - blacklisted >1: 00:c0:49:1c:ec:d4 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > selected based on WPA IE > selected WPA AP 00:c0:49:1c:ec:d4 ssid='NETWORKSID' >Try to find non-WPA AP >Trying to associate with 00:c0:49:1c:ec:d4 (SSID='NETWORKSID' freq=2412 MHz) >Cancelling scan request >WPA: clearing own WPA/RSN IE >Automatic auth_alg selection: 0x1 >WPA: using IEEE 802.11i/D3.0 >WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 1 proto 1 >WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >WPA: clearing AP RSN IE >WPA: using GTK TKIP >WPA: using PTK TKIP >WPA: using KEY_MGMT 802.1X >WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >No keys have been configured - skip key clearing >wpa_driver_wext_set_drop_unencrypted >State: SCANNING -> ASSOCIATING >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_associate >Setting authentication timeout: 20 sec 0 usec >EAPOL: External notification - portControl=Auto >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b06 len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b04 len=16 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b1a len=21 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=221 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00055353494431010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f201 RespIEs=010882848b0c1296182432043048606cdd180050f20201010000030f0000270f000052f75d0072732e00)' >Association info event >req_ies - hexdump(len=47): 00 05 53 53 49 44 31 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 00 00 03 0f 00 00 27 0f 00 00 52 f7 5d 00 72 73 2e 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:c0:49:1c:ec:d4 >State: ASSOCIATING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:c0:49:1c:ec:d4 >No keys have been configured - skip key clearing >Associated with 00:c0:49:1c:ec:d4 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=4): 01 01 00 00 >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=14): 01 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=5): > 68 65 6c 6c 6f hello >EAP: using anonymous identity - hexdump_ascii(len=9): > 61 6e 6f 6e 79 6d 6f 75 73 anonymous >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=18): 01 00 00 0e 02 00 00 0e 01 61 6e 6f 6e 79 6d 6f 75 73 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=10): 01 00 00 06 01 01 00 06 19 20 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=1 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Using previous method data for fast re-authentication >EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >EAP: EAP entering state METHOD >SSL: Received packet(len=6) - Flags 0x20 >EAP-PEAP: Start (server ver=0, own ver=0) >EAP-PEAP: Using PEAP version 0 >SSL: (where=0x10 ret=0x1) >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:before/connect initialization >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client hello A >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read server hello A >SSL: SSL_connect - want more data >SSL: 143 bytes pending from ssl_out >SSL: 143 bytes left to be sent out (of total 143 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=153): 01 00 00 95 02 01 00 95 19 00 16 03 01 00 8a 01 00 00 86 03 01 48 6d eb 2d 25 6b 72 c6 50 b1 f3 da 7c 94 31 1d ce 91 e1 82 3c d3 56 d5 b0 47 89 75 b5 2e d3 9a 20 c4 bd 22 d7 ef c3 8a c0 92 59 fd 92 b9 1e b7 0c 4e ea f0 f5 07 d0 79 a6 de 6f 00 9c aa 6b c4 78 00 38 00 39 00 38 00 35 00 88 00 87 00 84 00 16 00 13 00 0a 00 33 00 32 00 2f 00 9a 00 99 00 96 00 45 00 44 00 41 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 02 01 00 00 04 00 23 00 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1038): 01 00 04 0a 01 02 04 0a 19 c0 00 00 07 f7 16 03 01 00 4a 02 00 00 46 03 01 48 6d eb 68 7d 81 7f 0d 05 80 de 22 f8 84 2c e7 b5 55 40 8c 93 6b 60 56 42 e5 e7 d7 7a 9c f2 88 20 1f d9 36 20 48 e2 9d 23 c6 3b fc 42 8c 06 1a 04 1d 78 01 fd 27 09 6a d3 37 95 fb 44 cf 42 ff 91 00 39 00 16 03 01 06 88 0b 00 06 84 00 06 81 00 02 c2 30 82 02 be 30 82 02 27 a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 35 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 37 31 31 32 31 31 30 34 31 35 36 5a 30 81 8e 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 10 30 0e 06 03 55 04 03 13 07 52 4f 4f 54 20 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 e1 14 fe 0f 20 51 89 c1 68 0d 84 f7 15 45 0d 82 cf ce eb c4 57 3a dc 1e 8d 88 bd 0d 12 00 3a a2 8d 79 47 3e 3d a2 6e ab 68 a9 05 32 f3 e1 85 13 f9 a0 28 01 e0 4d df 2b 5c 99 fd d8 3f 62 75 f6 81 42 63 63 ef bc 67 8e 22 5e a2 f4 da d9 f1 40 71 26 11 3a 0a 73 2b 2f 18 db 20 98 5f c6 a1 fc d0 de 80 e0 c5 73 56 c4 9a 15 0c 0a 3b a7 89 bf 9b eb 63 13 06 01 83 83 be 7b 0a 74 af 7f 4a cf 02 03 01 00 01 a3 17 30 15 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 4c 8d 15 93 47 26 0f 59 2e 4e 7f d0 16 65 e4 8c c0 4c 73 17 07 9a 90 c1 52 27 b9 3e 56 8c 0c fa 9b 1c b8 90 a3 e4 2c 82 61 70 86 2d 8a c3 ca 45 14 b5 bb 55 00 ca 15 7c 0f 33 3f 19 08 37 e0 88 8e 53 e5 5a eb a5 78 eb 92 c8 89 95 7b c7 79 40 59 c7 4c 90 c2 c2 07 b9 68 80 5f 21 ff f4 b0 fd 83 ab 0f 97 e8 b0 f0 f3 80 d8 80 67 6a 9b 16 d3 26 af 4a 88 8e f2 a0 4b a6 72 b2 1c d6 5c c4 d5 00 03 b9 30 82 03 b5 30 82 03 1e a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 33 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 38 31 31 32 30 31 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1034) - Flags 0xc0 >SSL: TLS Message Length: 2039 >SSL: Need 1015 bytes more input data >SSL: Building ACK (type=25 id=2 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1025): 01 00 03 fd 01 03 03 fd 19 00 30 34 31 35 36 5a 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 97 8f 78 af a5 f4 70 a1 00 41 5b fa 62 28 19 69 f6 e5 f7 6a 1a 27 85 ca 8a 15 00 55 54 15 97 68 0b 2e 55 39 e4 b0 6b 76 55 86 84 53 7c 56 fc 74 52 da 73 a3 54 ae 74 47 64 9e 1f ff 1b 1e 3d 1c 8b c1 8d af 89 94 e9 0e d0 c9 56 83 52 c4 50 a9 24 81 10 3d 0a e7 7e 6e 7b 30 ae fd 1b 4d f8 96 87 3f 7d 72 2a cd fa 22 f9 cd 29 17 f4 da 15 eb de 6a de b3 e1 9d 2a c5 3b 3d ea 3c f6 a6 a6 71 02 03 01 00 01 a3 82 01 01 30 81 fe 30 1d 06 03 55 1d 0e 04 16 04 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f 30 81 ce 06 03 55 1d 23 04 81 c6 30 81 c3 80 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f a1 81 9f a4 81 9c 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 82 09 00 d9 c7 09 10 ab 9f 78 33 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 74 1a c9 c3 9b 7a a4 5a e4 16 4c d1 af 8e b6 95 20 80 ca 9e 5f 89 82 ba e7 99 63 da 67 b9 c0 7b 86 aa 51 3d 24 41 58 dd d9 2d e7 cb e6 6f 3a 8f 15 5e ca 21 5a f7 46 21 a3 bb b5 f6 9c d0 82 1b b5 f5 3d c9 ed 94 51 aa f2 ff ca 34 d0 48 05 2c 66 92 6f 50 c7 49 0e c4 2d 1d 19 a3 9c ca b9 f9 c0 b1 d0 17 b9 fe 80 90 d6 dd 2b 38 70 74 4e a7 53 99 3e bf cd 0e d4 79 bb 2f f5 8e ba 6c d1 69 16 03 01 01 0d 0c 00 01 09 00 40 c3 4a f6 2a e3 ab 87 b9 1c 92 96 23 c3 a2 11 50 ae 15 b2 0c de bc fb 0d 00 a3 98 83 d1 d1 c7 63 1d df 5f 35 06 a0 fa 4c 4e 01 3f 17 c1 05 aa 50 d0 3b 48 16 46 75 d5 37 8e 2c 82 9b 06 17 11 bb 00 01 02 00 40 73 bb 48 28 1e dd 3a 1b c2 59 62 8f 83 92 9a e2 14 a3 d6 7c fe 2b 45 46 b3 5a c4 19 38 af ce 1c 22 e7 ff 1b a2 87 67 44 f7 21 7f a2 97 ac 42 b2 16 dc bb a9 4a 11 7c 60 d8 db 50 dd a4 87 5d ed 00 80 3b 10 dc 8f 64 b7 03 37 05 e4 8f b4 13 89 4c f2 11 ce 2e 59 65 3c 53 e7 84 40 d4 82 57 2c f6 21 80 92 73 da 22 f4 3b 63 3d 84 f8 e0 a9 eb 35 84 f3 5e 65 07 2d 0a 2c 31 d4 10 b8 45 64 e9 e5 25 4b 21 f5 0a 9c 60 02 54 4c f4 22 fb e8 9a 62 c3 8f 88 73 13 b9 d9 52 60 e4 7e 63 5d f5 ae 48 9b f9 6a aa b5 1b 0f a5 ca 0f 34 14 1f 83 6f 7a 2e 53 b2 8a 7e e5 5a d8 e5 b1 5e e2 dc eb a2 24 49 16 03 01 00 04 0e 00 00 00 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1021) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server hello A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server certificate A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server done A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write change cipher spec A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write finished A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 flush data >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read finished A >SSL: SSL_connect - want more data >SSL: 134 bytes pending from ssl_out >SSL: 134 bytes left to be sent out (of total 134 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=144): 01 00 00 8c 02 03 00 8c 19 00 16 03 01 00 46 10 00 00 42 00 40 88 e5 1d 64 66 d0 29 b6 c1 78 1d 4b 89 96 d5 e9 7e 80 05 63 b3 65 b1 51 ab d7 9c d5 a0 61 7e bb ea d4 aa 2a 13 30 81 04 f6 f2 e4 36 5d 59 53 a0 0a d7 8e 1a b6 29 60 50 59 13 94 64 cb 18 17 0c 14 03 01 00 01 01 16 03 01 00 30 80 f3 7b 06 0c ad f1 d7 68 a4 ed 12 a1 ad ce 69 fd 15 cb ec 9b d6 c4 17 f3 8c 64 7b a8 1c 55 d1 16 60 37 1e a5 d9 63 1a d5 32 9f b2 54 9b 19 eb >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=69): 01 00 00 41 01 04 00 41 19 00 14 03 01 00 01 01 16 03 01 00 30 85 be 93 84 88 75 ce 0f e4 c8 c7 8d ca f7 3e b8 25 fc e6 ab b9 ca c8 d9 c6 0c 3f a5 ff de 6c f0 24 c6 9c 4e ad 67 89 f2 db 31 84 90 72 de ea 7c >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=65) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read finished A >SSL: (where=0x20 ret=0x1) >SSL: (where=0x1002 ret=0x1) >SSL: 0 bytes pending from ssl_out >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >SSL: No data to be sent out >EAP-PEAP: TLS done, proceed to Phase 2 >EAP-PEAP: using label 'client EAP encryption' in key derivation >EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] >EAP-PEAP: Workaround - allow outer EAP-Success to terminate PEAP resumption >SSL: Building ACK (type=25 id=4 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=COND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 05 00 2b 19 00 17 03 01 00 20 d0 64 c0 3f 36 7b 6c e0 11 23 d4 45 e7 17 79 91 79 a0 93 2d 28 55 93 4e e2 50 d2 81 cc 4d 52 f3 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 05 00 05 01 >EAP-PEAP: received Phase 2: code=1 identifier=5 length=5 >EAP-PEAP: Phase 2 Request: type=1 >EAP: using real identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=10): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 05 00 50 19 00 17 03 01 00 20 76 75 99 f1 95 6b 5e 80 9d 63 89 ad 74 39 28 44 4a f3 32 27 e4 9c 88 4a e8 26 81 e4 30 0b 4c d0 17 03 01 00 20 ba d5 99 5a 5f 68 d8 80 af 09 df ce 67 a5 c2 5f cf 7d 37 19 ac 33 65 b8 ff f5 0a 94 50 cb 7b e0 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=63): 01 00 00 3b 01 06 00 3b 19 00 17 03 01 00 30 e0 78 57 9d 08 49 d6 42 a2 bf 65 48 28 e2 93 cf 85 08 e1 dc b2 6b 6c 05 68 78 71 c1 a8 0f 23 7b 2e f3 89 99 88 0a 31 c9 80 b5 b0 09 df 17 3a 4e >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=59) - Flags 0x00 >EAP-PEAP: received 53 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=27): 1a 01 06 00 1a 10 63 61 33 19 eb a9 00 c7 a0 b1 c3 8a 55 12 c9 b5 78 62 6f 74 6c >EAP-PEAP: received Phase 2: code=1 identifier=6 length=31 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 6 mschapv2_id 6 >EAP-MSCHAPV2: Received challenge >EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-MSCHAPV2: Generating Challenge Response >MSCHAPV2: Identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: Username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: auth_challenge - hexdump(len=16): 63 61 33 19 eb a9 00 c7 a0 b1 c3 8a 55 12 c9 b5 >MSCHAPV2: peer_challenge - hexdump(len=16): 1d c6 6f 55 3e 7e 31 10 6b 47 b3 56 66 c3 5e 6a >MSCHAPV2: username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: password - hexdump_ascii(len=8): [REMOVED] >MSCHAPV2: NT Response - hexdump(len=24): 6b 89 a6 04 16 e1 37 9c 0b 5d d7 e1 fb 78 45 57 8f 0c b9 e8 73 4a 00 dd >MSCHAPV2: Auth Response - hexdump(len=20): 4a da 3f b3 83 6b ab d5 70 91 a2 f6 d7 3e 73 e4 32 93 a9 b1 >MSCHAPV2: Master Key - hexdump(len=16): [REMOVED] >EAP-MSCHAPV2: TX identifier 6 mschapv2_id 6 (response) >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=64): [REMOVED] >SSL: 138 bytes left to be sent out (of total 138 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=148): 01 00 00 90 02 06 00 90 19 00 17 03 01 00 20 9a 0f f3 e8 b8 60 dd 67 5c 5c 1e 04 00 d4 3e 42 40 90 27 0f 3a 30 a9 b1 78 81 15 0c 89 47 fe 70 17 03 01 00 60 2f 25 d0 a7 b7 22 f6 ef 77 e8 ce 77 01 54 ab a2 1b 14 0c 34 3f f6 30 43 45 2e 71 9e ce cc dd 0b 5a 81 ef 21 f9 f4 c4 de 62 ba d4 aa b2 eb e7 8e fd fe 07 91 ea 86 ba 5b 05 2a 82 88 0f 50 39 f8 7c b3 73 e6 a6 24 b1 84 3b 8e 32 c1 eb 5c 72 2d 74 19 65 41 2a a7 85 ad 6b 21 ca eb 74 19 14 ba >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=95): 01 00 00 5b 01 07 00 5b 19 00 17 03 01 00 50 b4 ec 9f d2 55 be d9 f1 78 3c a5 69 8d 74 cf ad 45 02 db 5b a9 b6 74 74 69 3d 1e fd 96 55 b7 4c 7b 9c 93 82 7f 8f ed 44 a9 42 f4 c2 09 f0 8f 22 23 5f 6f 4a 3c 38 07 42 f0 1c d8 65 06 e1 37 cd 85 21 c1 a5 92 cd a6 c3 ca 6a 1e dd 81 ec 40 9e >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=91) - Flags 0x00 >EAP-PEAP: received 85 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 06 00 2e 53 3d 34 41 44 41 33 46 42 33 38 33 36 42 41 42 44 35 37 30 39 31 41 32 46 36 44 37 33 45 37 33 45 34 33 32 39 33 41 39 42 31 >EAP-PEAP: received Phase 2: code=1 identifier=7 length=51 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 7 mschapv2_id 6 >EAP-MSCHAPV2: Received success >EAP-MSCHAPV2: Success message - hexdump_ascii(len=0): >EAP-MSCHAPV2: Authentication succeeded >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 07 00 50 19 00 17 03 01 00 20 0e 2a 3d 74 ab 74 0b 05 1b 35 bd 56 c9 38 10 ab 7d 43 20 0e 1e 1b 75 5b 0f 88 ac 0c 08 69 78 ed 17 03 01 00 20 e1 ab f8 06 fb fd 7d 83 14 2e 38 a7 3a 3e 79 a6 3e 5d 8e 8a 90 99 c1 5f e3 60 cf 46 b7 95 a9 29 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 08 00 2b 19 00 17 03 01 00 20 d0 58 8e b9 03 c6 61 60 ef 22 26 4c 19 9d df f7 52 f3 76 f5 c7 c9 09 f1 4d 5f 15 2f a5 ea 8f 71 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 08 00 0b 21 80 03 00 02 00 01 >EAP-PEAP: received Phase 2: code=1 identifier=8 length=11 >EAP-PEAP: Phase 2 Request: type=33 >EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01 >EAP-TLV: Result TLV - hexdump(len=2): 00 01 >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 08 00 50 19 00 17 03 01 00 20 49 75 23 10 cf ca 1a f7 56 80 57 02 23 dc 12 28 4d 37 1b 0f 3b f8 40 e3 b2 3f 5c 91 13 62 d8 5d 17 03 01 00 20 02 3c ce ea 9b de a3 a0 c6 39 60 71 f1 3c 12 fb 62 4f f0 23 ca 99 ec a7 f8 4f 76 a9 50 ca ec 7d >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=8): 01 00 00 04 03 08 00 04 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Success >EAP: EAP entering state SUCCESS >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state SUCCESS >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 23 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 23 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 23 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >EAPOL: Successfully fetched key (len=32) >WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED] >WPA: Renewed SNonce - hexdump(len=32): 0f 63 fb 71 45 96 97 b1 2e 70 16 54 bc fc d8 34 1e 96 be ce 07 63 f2 83 f1 85 a8 e9 53 83 f7 2b >WPA: PTK derivation - A1=00:1d:e0:98:a5:dd A2=00:c0:49:1c:ec:d4 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 0f 63 fb 71 45 96 97 b1 2e 70 16 54 bc fc d8 34 1e 96 be ce 07 63 f2 83 f1 85 a8 e9 53 83 f7 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 db 60 25 36 c7 ca 5c d0 e0 75 18 48 d1 7b b6 b6 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 23 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0b 7a ae 9c bf d5 c8 ec 7d fb 6e 06 cf 21 d5 e1 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=121 > EAPOL-Key type=254 > key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) > key_length=32 key_data_length=26 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 23 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 0b 7a ae 9c bf d5 c8 ec 7d fb 6e 06 cf 21 d5 e1 >WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 23 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0b 7a ae 9c bf d5 c8 ec 7d fb 6e 06 cf 21 d5 e1 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 3 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >WPA: Sending EAPOL-Key 4/4 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f3 55 75 9c 08 ce 29 7e c2 08 f7 8a fc 3e 30 93 00 00 >WPA: Installing PTK to the driver. >WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 >State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 25 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c 88 6a 33 06 84 b9 9b b9 9e 12 39 25 bb 92 ab 00 20 32 c4 c9 80 22 60 de 14 0c cd 0f d0 c5 0e e3 56 0d 83 6e 04 2d e6 61 03 9e 19 7b 99 dd a7 4c 33 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 25 > key_rsc - hexdump(len=8): 09 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 2c 88 6a 33 06 84 b9 9b b9 9e 12 39 25 bb 92 ab >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 25 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2c 88 6a 33 06 84 b9 9b b9 9e 12 39 25 bb 92 ab 00 20 32 c4 c9 80 22 60 de 14 0c cd 0f d0 c5 0e e3 56 0d 83 6e 04 2d e6 61 03 9e 19 7b 99 dd a7 4c 33 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 09 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 e8 48 d7 df 55 53 34 6e ff 5a d1 0f 37 7b be 00 00 >WPA: Key negotiation completed with 00:c0:49:1c:ec:d4 [PTK=TKIP GTK=TKIP] >Cancelling scan request >Cancelling authentication timeout >Removed BSSID 00:c0:49:1c:ec:d4 from blacklist >State: GROUP_HANDSHAKE -> COMPLETED >CTRL-EVENT-CONNECTED - Connection to 00:c0:49:1c:ec:d4 completed (reauth) [id=0 id_str=] >wpa_driver_wext_set_operstate: operstate 0->1 (UP) >WEXT: Operstate: linkmode=-1, operstate=6 >EAPOL: External notification - portValid=1 >EAPOL: SUPP_PAE entering state AUTHENTICATED >EAPOL authentication completed successfully >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 26 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 61 7b 7d db 32 68 bd 9b 51 f3 4c a5 3a ac 70 00 20 dc 55 4f 17 5e 04 68 6d 77 13 e7 1a 58 28 be c9 7a 99 d3 77 72 83 1e fc 4c 32 7b 85 da 6c 1b f0 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 26 > key_rsc - hexdump(len=8): 0a 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): b8 61 7b 7d db 32 68 bd 9b 51 f3 4c a5 3a ac 70 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 26 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 61 7b 7d db 32 68 bd 9b 51 f3 4c a5 3a ac 70 00 20 dc 55 4f 17 5e 04 68 6d 77 13 e7 1a 58 28 be c9 7a 99 d3 77 72 83 1e fc 4c 32 7b 85 da 6c 1b f0 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 0a 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8f 20 15 26 62 c6 93 d5 3e a1 ec c0 08 62 ab 9f 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 27 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 83 a0 19 67 a3 af 52 5b ae 73 e3 a9 80 d6 d0 00 20 e8 fb 98 86 84 0f e5 e5 a2 a3 bc 21 60 ba 89 61 b3 9c 01 7c ff 80 64 24 59 42 00 14 96 b2 c9 c4 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 27 > key_rsc - hexdump(len=8): 0c 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): f0 83 a0 19 67 a3 af 52 5b ae 73 e3 a9 80 d6 d0 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 27 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 83 a0 19 67 a3 af 52 5b ae 73 e3 a9 80 d6 d0 00 20 e8 fb 98 86 84 0f e5 e5 a2 a3 bc 21 60 ba 89 61 b3 9c 01 7c ff 80 64 24 59 42 00 14 96 b2 c9 c4 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 0c 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ab ef 28 b7 2f ad c9 15 ae 81 f1 26 58 dc 8a 32 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >Setting scan request: 0 sec 100000 usec >Added BSSID 00:c0:49:1c:ec:d4 into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: COMPLETED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >BSSID 00:00:00:00:00:00 blacklist count incremented to 3 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >Driver did not support SIOCSIWENCODEEXT >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=221 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00055353494431010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f201 RespIEs=010882848b0c1296182432043048606cdd180050f20201010000030f0000270f000052f75d0072732e00)' >Association info event >req_ies - hexdump(len=47): 00 05 53 53 49 44 31 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 00 00 03 0f 00 00 27 0f 00 00 52 f7 5d 00 72 73 2e 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:c0:49:1c:ec:d4 >State: SCANNING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:c0:49:1c:ec:d4 >No keys have been configured - skip key clearing >Associated with 00:c0:49:1c:ec:d4 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:c0:49:fd:9f:80 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - blacklisted >1: 00:c0:49:1c:ec:d4 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > selected based on WPA IE > selected WPA AP 00:c0:49:1c:ec:d4 ssid='NETWORKSID' >Try to find non-WPA AP >Already associated with the selected AP. >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=4): 01 01 00 00 >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=14): 01 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=5): > 68 65 6c 6c 6f hello >EAP: using anonymous identity - hexdump_ascii(len=9): > 61 6e 6f 6e 79 6d 6f 75 73 anonymous >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=18): 01 00 00 0e 02 00 00 0e 01 61 6e 6f 6e 79 6d 6f 75 73 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=10): 01 00 00 06 01 01 00 06 19 20 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=1 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Using previous method data for fast re-authentication >EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >EAP: EAP entering state METHOD >SSL: Received packet(len=6) - Flags 0x20 >EAP-PEAP: Start (server ver=0, own ver=0) >EAP-PEAP: Using PEAP version 0 >SSL: (where=0x10 ret=0x1) >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:before/connect initialization >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client hello A >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read server hello A >SSL: SSL_connect - want more data >SSL: 143 bytes pending from ssl_out >SSL: 143 bytes left to be sent out (of total 143 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=153): 01 00 00 95 02 01 00 95 19 00 16 03 01 00 8a 01 00 00 86 03 01 48 6d eb 34 20 6a 49 ba 60 dd 0a 31 4d ba 7a cf fd 82 a4 bd e3 18 b4 1c ca cf 55 88 41 de 19 8d 20 1f d9 36 20 48 e2 9d 23 c6 3b fc 42 8c 06 1a 04 1d 78 01 fd 27 09 6a d3 37 95 fb 44 cf 42 ff 91 00 38 00 39 00 38 00 35 00 88 00 87 00 84 00 16 00 13 00 0a 00 33 00 32 00 2f 00 9a 00 99 00 96 00 45 00 44 00 41 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 02 01 00 00 04 00 23 00 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1038): 01 00 04 0a 01 02 04 0a 19 c0 00 00 07 f7 16 03 01 00 4a 02 00 00 46 03 01 48 6d eb 6f c6 6d 80 73 81 34 4c eb 15 41 de 55 c2 8b 46 58 22 3d 18 84 52 e9 ba 84 6d d5 9c c3 20 0a e0 18 b3 14 43 32 86 06 aa bc b4 56 cf b6 db 94 ca c7 73 69 b0 17 a3 e8 6d bd 4d 4c ff ea 3b 00 39 00 16 03 01 06 88 0b 00 06 84 00 06 81 00 02 c2 30 82 02 be 30 82 02 27 a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 35 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 37 31 31 32 31 31 30 34 31 35 36 5a 30 81 8e 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 10 30 0e 06 03 55 04 03 13 07 52 4f 4f 54 20 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 e1 14 fe 0f 20 51 89 c1 68 0d 84 f7 15 45 0d 82 cf ce eb c4 57 3a dc 1e 8d 88 bd 0d 12 00 3a a2 8d 79 47 3e 3d a2 6e ab 68 a9 05 32 f3 e1 85 13 f9 a0 28 01 e0 4d df 2b 5c 99 fd d8 3f 62 75 f6 81 42 63 63 ef bc 67 8e 22 5e a2 f4 da d9 f1 40 71 26 11 3a 0a 73 2b 2f 18 db 20 98 5f c6 a1 fc d0 de 80 e0 c5 73 56 c4 9a 15 0c 0a 3b a7 89 bf 9b eb 63 13 06 01 83 83 be 7b 0a 74 af 7f 4a cf 02 03 01 00 01 a3 17 30 15 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 4c 8d 15 93 47 26 0f 59 2e 4e 7f d0 16 65 e4 8c c0 4c 73 17 07 9a 90 c1 52 27 b9 3e 56 8c 0c fa 9b 1c b8 90 a3 e4 2c 82 61 70 86 2d 8a c3 ca 45 14 b5 bb 55 00 ca 15 7c 0f 33 3f 19 08 37 e0 88 8e 53 e5 5a eb a5 78 eb 92 c8 89 95 7b c7 79 40 59 c7 4c 90 c2 c2 07 b9 68 80 5f 21 ff f4 b0 fd 83 ab 0f 97 e8 b0 f0 f3 80 d8 80 67 6a 9b 16 d3 26 af 4a 88 8e f2 a0 4b a6 72 b2 1c d6 5c c4 d5 00 03 b9 30 82 03 b5 30 82 03 1e a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 33 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 38 31 31 32 30 31 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1034) - Flags 0xc0 >SSL: TLS Message Length: 2039 >SSL: Need 1015 bytes more input data >SSL: Building ACK (type=25 id=2 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1025): 01 00 03 fd 01 03 03 fd 19 00 30 34 31 35 36 5a 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 97 8f 78 af a5 f4 70 a1 00 41 5b fa 62 28 19 69 f6 e5 f7 6a 1a 27 85 ca 8a 15 00 55 54 15 97 68 0b 2e 55 39 e4 b0 6b 76 55 86 84 53 7c 56 fc 74 52 da 73 a3 54 ae 74 47 64 9e 1f ff 1b 1e 3d 1c 8b c1 8d af 89 94 e9 0e d0 c9 56 83 52 c4 50 a9 24 81 10 3d 0a e7 7e 6e 7b 30 ae fd 1b 4d f8 96 87 3f 7d 72 2a cd fa 22 f9 cd 29 17 f4 da 15 eb de 6a de b3 e1 9d 2a c5 3b 3d ea 3c f6 a6 a6 71 02 03 01 00 01 a3 82 01 01 30 81 fe 30 1d 06 03 55 1d 0e 04 16 04 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f 30 81 ce 06 03 55 1d 23 04 81 c6 30 81 c3 80 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f a1 81 9f a4 81 9c 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 82 09 00 d9 c7 09 10 ab 9f 78 33 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 74 1a c9 c3 9b 7a a4 5a e4 16 4c d1 af 8e b6 95 20 80 ca 9e 5f 89 82 ba e7 99 63 da 67 b9 c0 7b 86 aa 51 3d 24 41 58 dd d9 2d e7 cb e6 6f 3a 8f 15 5e ca 21 5a f7 46 21 a3 bb b5 f6 9c d0 82 1b b5 f5 3d c9 ed 94 51 aa f2 ff ca 34 d0 48 05 2c 66 92 6f 50 c7 49 0e c4 2d 1d 19 a3 9c ca b9 f9 c0 b1 d0 17 b9 fe 80 90 d6 dd 2b 38 70 74 4e a7 53 99 3e bf cd 0e d4 79 bb 2f f5 8e ba 6c d1 69 16 03 01 01 0d 0c 00 01 09 00 40 c3 4a f6 2a e3 ab 87 b9 1c 92 96 23 c3 a2 11 50 ae 15 b2 0c de bc fb 0d 00 a3 98 83 d1 d1 c7 63 1d df 5f 35 06 a0 fa 4c 4e 01 3f 17 c1 05 aa 50 d0 3b 48 16 46 75 d5 37 8e 2c 82 9b 06 17 11 bb 00 01 02 00 40 1e 03 eb c7 c3 07 3a 76 44 f0 6e 64 93 38 f9 ff 18 25 8a c1 2f c5 bc 9d 02 29 5b db 25 f9 c4 a6 d1 43 48 db 22 dc 12 ae 4c 91 4a 66 b8 1e d1 31 c7 b0 39 bd 6c 35 8c 40 4b 1f 7f 03 db f4 8a 55 00 80 18 b0 65 cf dc e2 ff 10 8f 04 11 51 25 30 9b 05 82 02 a7 25 b3 ec 33 ce 7f a5 af 23 91 84 10 73 a0 25 8f 1a ef 18 5c 9a cc 64 d6 ad c9 1b 1d f6 15 9c de 45 70 0d 31 9f 86 b2 74 c5 5d f4 5e f0 4f e1 3f ca 87 e9 72 74 b5 3f 49 db 82 c0 ed e3 09 d8 50 76 df 44 36 27 75 42 fb 3b 5b 9b 24 a8 58 f3 85 c7 03 e6 2c a1 0b 5a f3 e8 dd ae ec 7d 9b 69 e8 d3 8f 6b e3 1f 53 23 d0 2b fe 3f d4 8a 16 03 01 00 04 0e 00 00 00 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1021) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server hello A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server certificate A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server done A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write change cipher spec A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write finished A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 flush data >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read finished A >SSL: SSL_connect - want more data >SSL: 134 bytes pending from ssl_out >SSL: 134 bytes left to be sent out (of total 134 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=144): 01 00 00 8c 02 03 00 8c 19 00 16 03 01 00 46 10 00 00 42 00 40 79 1c 6e 84 ae 19 04 cc 58 f2 ac b6 c7 1e e7 61 82 72 fc 26 b7 63 de bb 5f a1 2f cf 7e ce f1 d2 ae e3 5b 5f 76 88 b4 c9 98 31 9b 1d 36 e1 5a 5a 84 1f 6d 3e a0 a8 0e 31 8b e1 24 bb 3b 6c 23 48 14 03 01 00 01 01 16 03 01 00 30 ee d3 52 e3 78 bf 67 2a d2 71 ac f5 b2 a6 0f 8d 40 fe 87 c4 59 6e 20 dd 4e bc 05 4b dd 97 5e 42 ea 16 5b 06 0a f4 b4 5f 65 0a d5 3c d7 66 17 bf >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=69): 01 00 00 41 01 04 00 41 19 00 14 03 01 00 01 01 16 03 01 00 30 46 28 f4 e6 62 b8 63 fd fd 83 9c 38 28 70 4b 03 d5 4d 70 bc d1 8e 2e 37 eb 5d d6 77 e7 65 21 36 1e 8a b8 9f d3 60 f2 48 54 d5 83 bd 14 39 94 98 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=65) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read finished A >SSL: (where=0x20 ret=0x1) >SSL: (where=0x1002 ret=0x1) >SSL: 0 bytes pending from ssl_out >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >SSL: No data to be sent out >EAP-PEAP: TLS done, proceed to Phase 2 >EAP-PEAP: using label 'client EAP encryption' in key derivation >EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] >EAP-PEAP: Workaround - allow outer EAP-Success to terminate PEAP resumption >SSL: Building ACK (type=25 id=4 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=COND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 05 00 2b 19 00 17 03 01 00 20 77 50 9f 56 1c bd 3f 66 c0 b8 d3 c9 2b 3a 2e 4e bf 9e 37 fd ee 58 98 a0 40 84 f6 fe 5f 0f a6 69 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 05 00 05 01 >EAP-PEAP: received Phase 2: code=1 identifier=5 length=5 >EAP-PEAP: Phase 2 Request: type=1 >EAP: using real identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=10): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 05 00 50 19 00 17 03 01 00 20 28 c3 b4 a0 d7 6c 66 0c 2e e8 86 83 66 b1 a7 9a 4a 6f a0 1e e9 3b 1c 65 e4 71 63 26 71 35 10 4b 17 03 01 00 20 f0 0f fe d8 76 19 f1 3f 31 e5 fb 64 6a f8 a3 5d 54 94 f3 51 cf 8f b4 de 93 75 4e 17 6b f0 cf 01 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=63): 01 00 00 3b 01 06 00 3b 19 00 17 03 01 00 30 17 16 8f d2 7f 82 d8 a5 f8 62 ad 92 2d 45 9f d8 5b b9 27 d0 f4 47 45 05 81 1c 5a e2 7c 17 fb 44 85 f1 68 e0 64 e8 70 17 ee b2 8f 7a 12 f8 4c 8d >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=59) - Flags 0x00 >EAP-PEAP: received 53 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=27): 1a 01 06 00 1a 10 fa ae a6 94 50 69 93 0e 3e 41 ce a1 06 08 47 80 78 62 6f 74 6c >EAP-PEAP: received Phase 2: code=1 identifier=6 length=31 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 6 mschapv2_id 6 >EAP-MSCHAPV2: Received challenge >EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-MSCHAPV2: Generating Challenge Response >MSCHAPV2: Identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: Username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: auth_challenge - hexdump(len=16): fa ae a6 94 50 69 93 0e 3e 41 ce a1 06 08 47 80 >MSCHAPV2: peer_challenge - hexdump(len=16): a7 06 02 47 f1 71 37 bb 2c e5 79 75 8c d5 28 38 >MSCHAPV2: username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: password - hexdump_ascii(len=8): [REMOVED] >MSCHAPV2: NT Response - hexdump(len=24): 84 5b 2a 01 15 c9 4b aa 0c 29 38 ed 83 aa ed 5f ca 3f 9e 53 bf 94 f4 1c >MSCHAPV2: Auth Response - hexdump(len=20): ee ba b2 e2 20 95 81 a4 a6 2c fd b7 67 97 2f f8 38 4e 79 e4 >MSCHAPV2: Master Key - hexdump(len=16): [REMOVED] >EAP-MSCHAPV2: TX identifier 6 mschapv2_id 6 (response) >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=64): [REMOVED] >SSL: 138 bytes left to be sent out (of total 138 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=148): 01 00 00 90 02 06 00 90 19 00 17 03 01 00 20 f7 7b d7 a8 70 79 d1 89 51 70 22 f8 c9 b5 4d fe 28 71 dc ef 7c 7a c1 08 4d dd 70 1f 63 dd a3 2d 17 03 01 00 60 09 01 f8 15 19 c5 bf 8d 4a 48 aa 12 f6 7c 2c fe 1e 9a 8e 05 1d 25 63 9e f6 cb c1 cc 24 fc 22 51 29 e4 bc 8e 2e 7a fc 85 ba 01 55 aa 4d 37 6f 8c 6f 2e c9 ec 41 6c 9e e9 24 9d de 8d 55 bb a1 a9 3c 19 5e 90 dd a6 48 4c 83 c8 f1 42 45 18 8e 37 74 5f a5 13 d2 92 17 f1 4a 8e 04 ee b5 c4 91 fa >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=95): 01 00 00 5b 01 07 00 5b 19 00 17 03 01 00 50 a6 25 5a 26 69 27 fd 49 83 ec 40 79 ca a7 a3 fa 93 8c 2c 71 9a 35 54 c8 23 b8 13 fa 60 3a 9d 07 cd d8 82 25 49 dd 71 4d c8 03 bd 44 ef 54 d7 e9 43 6a ca d7 22 ba 94 88 d6 63 ce 03 3e fc 75 e0 2f 2e c7 ef 43 84 d9 c6 0b 4d 31 ee 4f 0c 5c ba >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=91) - Flags 0x00 >EAP-PEAP: received 85 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 06 00 2e 53 3d 45 45 42 41 42 32 45 32 32 30 39 35 38 31 41 34 41 36 32 43 46 44 42 37 36 37 39 37 32 46 46 38 33 38 34 45 37 39 45 34 >EAP-PEAP: received Phase 2: code=1 identifier=7 length=51 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 7 mschapv2_id 6 >EAP-MSCHAPV2: Received success >EAP-MSCHAPV2: Success message - hexdump_ascii(len=0): >EAP-MSCHAPV2: Authentication succeeded >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 07 00 50 19 00 17 03 01 00 20 a9 8d 1d 91 3f d1 58 f7 f5 54 fc 31 2b f1 ab 7a a5 dc 47 3c 29 3f 56 b4 0b 2b fd dd c7 e2 23 48 17 03 01 00 20 a1 1f 50 7c 05 a9 eb af 12 46 11 be 0a e7 f2 78 32 b4 fc 1c b0 b7 07 ab 3c 65 f0 ea e8 4e 75 db >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 08 00 2b 19 00 17 03 01 00 20 36 33 f3 a1 61 46 4b 92 11 ec 53 6b 22 6b 80 a3 06 c6 8f f1 9e 3c 77 5c 01 1d d7 cf b7 7b 8e 38 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 08 00 0b 21 80 03 00 02 00 01 >EAP-PEAP: received Phase 2: code=1 identifier=8 length=11 >EAP-PEAP: Phase 2 Request: type=33 >EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01 >EAP-TLV: Result TLV - hexdump(len=2): 00 01 >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 08 00 50 19 00 17 03 01 00 20 06 a4 95 34 4d 89 a5 17 c3 d6 9e 15 86 7b 57 22 56 c7 1c 7f 3c 10 22 8b 90 d4 36 60 34 2b a6 38 17 03 01 00 20 17 00 c3 1c 01 c9 d9 d3 bf a8 88 af 93 06 08 9e 5c f4 97 e2 05 91 b3 44 92 b2 c7 ba d7 38 70 33 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=8): 01 00 00 04 03 08 00 04 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Success >EAP: EAP entering state SUCCESS >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state SUCCESS >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 2a > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >EAPOL: Successfully fetched key (len=32) >WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED] >WPA: Renewed SNonce - hexdump(len=32): 94 41 6c ca 36 e3 10 f5 cc 8d 63 b0 a7 b1 81 ba 0c d4 85 d7 57 cb e6 77 56 ae 75 fb d7 c0 cf 4b >WPA: PTK derivation - A1=00:1d:e0:98:a5:dd A2=00:c0:49:1c:ec:d4 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 94 41 6c ca 36 e3 10 f5 cc 8d 63 b0 a7 b1 81 ba 0c d4 85 d7 57 cb e6 77 56 ae 75 fb d7 c0 cf 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 db cf e0 11 09 fe de 5a 1b 08 e9 e6 bd f5 8a cd 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 90 c1 ab 1e 88 b0 8b 44 4c 4a 2c 32 17 1f 33 2a 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=121 > EAPOL-Key type=254 > key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) > key_length=32 key_data_length=26 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 2a > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 90 c1 ab 1e 88 b0 8b 44 4c 4a 2c 32 17 1f 33 2a >WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 90 c1 ab 1e 88 b0 8b 44 4c 4a 2c 32 17 1f 33 2a 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 3 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >WPA: Sending EAPOL-Key 4/4 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 4d 4a 56 13 c0 17 02 27 c9 56 43 03 d4 c1 06 00 00 >WPA: Installing PTK to the driver. >WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 >State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 2c 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 93 46 42 0a 4e c2 00 6e 1a 1c 49 8d a6 e9 71 6b 00 20 c5 87 2f 58 e3 de 6f 96 54 5a d8 e6 95 8d a5 ec e0 70 df 90 dc 4a a9 3e 66 03 e5 ad 5a 04 58 01 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 2c > key_rsc - hexdump(len=8): 14 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 93 46 42 0a 4e c2 00 6e 1a 1c 49 8d a6 e9 71 6b >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 2c 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 93 46 42 0a 4e c2 00 6e 1a 1c 49 8d a6 e9 71 6b 00 20 c5 87 2f 58 e3 de 6f 96 54 5a d8 e6 95 8d a5 ec e0 70 df 90 dc 4a a9 3e 66 03 e5 ad 5a 04 58 01 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 14 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 cd 0a 2b a9 67 3c 30 25 b7 ff 28 5b 87 db d9 d6 00 00 >WPA: Key negotiation completed with 00:c0:49:1c:ec:d4 [PTK=TKIP GTK=TKIP] >Cancelling scan request >Cancelling authentication timeout >Removed BSSID 00:c0:49:1c:ec:d4 from blacklist >State: GROUP_HANDSHAKE -> COMPLETED >CTRL-EVENT-CONNECTED - Connection to 00:c0:49:1c:ec:d4 completed (reauth) [id=0 id_str=] >wpa_driver_wext_set_operstate: operstate 0->1 (UP) >WEXT: Operstate: linkmode=-1, operstate=6 >EAPOL: External notification - portValid=1 >EAPOL: SUPP_PAE entering state AUTHENTICATED >EAPOL authentication completed successfully >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 2d 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e1 40 81 38 f3 fc 14 d1 c2 46 d4 73 d1 5d e3 c7 00 20 65 20 b8 12 50 d5 05 73 81 e9 bf 9c 7e 76 2d 3e 8c 55 e9 0f d3 29 2a 84 53 75 c0 a9 11 5f e2 a2 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 2d > key_rsc - hexdump(len=8): 15 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): e1 40 81 38 f3 fc 14 d1 c2 46 d4 73 d1 5d e3 c7 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 2d 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e1 40 81 38 f3 fc 14 d1 c2 46 d4 73 d1 5d e3 c7 00 20 65 20 b8 12 50 d5 05 73 81 e9 bf 9c 7e 76 2d 3e 8c 55 e9 0f d3 29 2a 84 53 75 c0 a9 11 5f e2 a2 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 15 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d3 15 0d e1 c0 01 49 48 11 36 fb c6 fb 94 ea 6a 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 2e 17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b9 f1 4f 3d f1 17 be fa 95 f3 12 1b 8d bd e2 d6 00 20 5a 9c f8 5c d2 82 e9 72 fa c3 ab 20 11 b8 ed 74 6c 56 eb fb 6e 91 d5 0d e3 f8 0e 31 85 0f d3 06 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 2e > key_rsc - hexdump(len=8): 17 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): b9 f1 4f 3d f1 17 be fa 95 f3 12 1b 8d bd e2 d6 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 2e 17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b9 f1 4f 3d f1 17 be fa 95 f3 12 1b 8d bd e2 d6 00 20 5a 9c f8 5c d2 82 e9 72 fa c3 ab 20 11 b8 ed 74 6c 56 eb fb 6e 91 d5 0d e3 f8 0e 31 85 0f d3 06 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 17 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f9 ec c5 d5 92 55 cf 08 1f d0 f6 f0 38 b6 b8 4a 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >Setting scan request: 0 sec 100000 usec >Added BSSID 00:c0:49:1c:ec:d4 into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: COMPLETED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >BSSID 00:00:00:00:00:00 blacklist count incremented to 4 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >Driver did not support SIOCSIWENCODEEXT >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >State: DISCONNECTED -> SCANNING >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=5): > 53 53 49 44 31 NETWORKSID >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=221 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00055353494431010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f201 RespIEs=010882848b0c1296182432043048606cdd180050f20201010000030f0000270f000052f75d0072732e00)' >Association info event >req_ies - hexdump(len=47): 00 05 53 53 49 44 31 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 00 00 03 0f 00 00 27 0f 00 00 52 f7 5d 00 72 73 2e 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:c0:49:1c:ec:d4 >State: SCANNING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:c0:49:1c:ec:d4 >No keys have been configured - skip key clearing >Associated with 00:c0:49:1c:ec:d4 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:c0:49:fd:9f:80 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - blacklisted >1: 00:c0:49:1c:ec:d4 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > selected based on WPA IE > selected WPA AP 00:c0:49:1c:ec:d4 ssid='NETWORKSID' >Try to find non-WPA AP >Already associated with the selected AP. >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=4): 01 01 00 00 >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=14): 01 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=5): > 68 65 6c 6c 6f hello >EAP: using anonymous identity - hexdump_ascii(len=9): > 61 6e 6f 6e 79 6d 6f 75 73 anonymous >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=18): 01 00 00 0e 02 00 00 0e 01 61 6e 6f 6e 79 6d 6f 75 73 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=10): 01 00 00 06 01 01 00 06 19 20 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=1 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Using previous method data for fast re-authentication >EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >EAP: EAP entering state METHOD >SSL: Received packet(len=6) - Flags 0x20 >EAP-PEAP: Start (server ver=0, own ver=0) >EAP-PEAP: Using PEAP version 0 >SSL: (where=0x10 ret=0x1) >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:before/connect initialization >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client hello A >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read server hello A >SSL: SSL_connect - want more data >SSL: 143 bytes pending from ssl_out >SSL: 143 bytes left to be sent out (of total 143 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=153): 01 00 00 95 02 01 00 95 19 00 16 03 01 00 8a 01 00 00 86 03 01 48 6d eb 3b 98 dd 2f 64 86 15 c5 45 f3 94 1b 1d 87 9c 65 48 99 d3 6f 97 2f 8b d8 1a 67 1c dc 43 20 0a e0 18 b3 14 43 32 86 06 aa bc b4 56 cf b6 db 94 ca c7 73 69 b0 17 a3 e8 6d bd 4d 4c ff ea 3b 00 38 00 39 00 38 00 35 00 88 00 87 00 84 00 16 00 13 00 0a 00 33 00 32 00 2f 00 9a 00 99 00 96 00 45 00 44 00 41 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 02 01 00 00 04 00 23 00 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1038): 01 00 04 0a 01 02 04 0a 19 c0 00 00 07 f7 16 03 01 00 4a 02 00 00 46 03 01 48 6d eb 76 d6 eb 4b 4a 05 ed 29 67 6f 85 92 91 5a 44 bf b8 9d fb 80 22 cc 80 4a 24 66 bd bb 48 20 20 fe 03 2c 5e 65 5a d3 e6 a3 74 c6 2c 08 4c 5e 20 c0 8c b0 48 d1 7e 07 90 7a a7 bd 9a 4b 0e 67 00 39 00 16 03 01 06 88 0b 00 06 84 00 06 81 00 02 c2 30 82 02 be 30 82 02 27 a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 35 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 37 31 31 32 31 31 30 34 31 35 36 5a 30 81 8e 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 10 30 0e 06 03 55 04 03 13 07 52 4f 4f 54 20 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 e1 14 fe 0f 20 51 89 c1 68 0d 84 f7 15 45 0d 82 cf ce eb c4 57 3a dc 1e 8d 88 bd 0d 12 00 3a a2 8d 79 47 3e 3d a2 6e ab 68 a9 05 32 f3 e1 85 13 f9 a0 28 01 e0 4d df 2b 5c 99 fd d8 3f 62 75 f6 81 42 63 63 ef bc 67 8e 22 5e a2 f4 da d9 f1 40 71 26 11 3a 0a 73 2b 2f 18 db 20 98 5f c6 a1 fc d0 de 80 e0 c5 73 56 c4 9a 15 0c 0a 3b a7 89 bf 9b eb 63 13 06 01 83 83 be 7b 0a 74 af 7f 4a cf 02 03 01 00 01 a3 17 30 15 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 4c 8d 15 93 47 26 0f 59 2e 4e 7f d0 16 65 e4 8c c0 4c 73 17 07 9a 90 c1 52 27 b9 3e 56 8c 0c fa 9b 1c b8 90 a3 e4 2c 82 61 70 86 2d 8a c3 ca 45 14 b5 bb 55 00 ca 15 7c 0f 33 3f 19 08 37 e0 88 8e 53 e5 5a eb a5 78 eb 92 c8 89 95 7b c7 79 40 59 c7 4c 90 c2 c2 07 b9 68 80 5f 21 ff f4 b0 fd 83 ab 0f 97 e8 b0 f0 f3 80 d8 80 67 6a 9b 16 d3 26 af 4a 88 8e f2 a0 4b a6 72 b2 1c d6 5c c4 d5 00 03 b9 30 82 03 b5 30 82 03 1e a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 33 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 38 31 31 32 30 31 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1034) - Flags 0xc0 >SSL: TLS Message Length: 2039 >SSL: Need 1015 bytes more input data >SSL: Building ACK (type=25 id=2 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1025): 01 00 03 fd 01 03 03 fd 19 00 30 34 31 35 36 5a 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 97 8f 78 af a5 f4 70 a1 00 41 5b fa 62 28 19 69 f6 e5 f7 6a 1a 27 85 ca 8a 15 00 55 54 15 97 68 0b 2e 55 39 e4 b0 6b 76 55 86 84 53 7c 56 fc 74 52 da 73 a3 54 ae 74 47 64 9e 1f ff 1b 1e 3d 1c 8b c1 8d af 89 94 e9 0e d0 c9 56 83 52 c4 50 a9 24 81 10 3d 0a e7 7e 6e 7b 30 ae fd 1b 4d f8 96 87 3f 7d 72 2a cd fa 22 f9 cd 29 17 f4 da 15 eb de 6a de b3 e1 9d 2a c5 3b 3d ea 3c f6 a6 a6 71 02 03 01 00 01 a3 82 01 01 30 81 fe 30 1d 06 03 55 1d 0e 04 16 04 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f 30 81 ce 06 03 55 1d 23 04 81 c6 30 81 c3 80 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f a1 81 9f a4 81 9c 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 82 09 00 d9 c7 09 10 ab 9f 78 33 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 74 1a c9 c3 9b 7a a4 5a e4 16 4c d1 af 8e b6 95 20 80 ca 9e 5f 89 82 ba e7 99 63 da 67 b9 c0 7b 86 aa 51 3d 24 41 58 dd d9 2d e7 cb e6 6f 3a 8f 15 5e ca 21 5a f7 46 21 a3 bb b5 f6 9c d0 82 1b b5 f5 3d c9 ed 94 51 aa f2 ff ca 34 d0 48 05 2c 66 92 6f 50 c7 49 0e c4 2d 1d 19 a3 9c ca b9 f9 c0 b1 d0 17 b9 fe 80 90 d6 dd 2b 38 70 74 4e a7 53 99 3e bf cd 0e d4 79 bb 2f f5 8e ba 6c d1 69 16 03 01 01 0d 0c 00 01 09 00 40 c3 4a f6 2a e3 ab 87 b9 1c 92 96 23 c3 a2 11 50 ae 15 b2 0c de bc fb 0d 00 a3 98 83 d1 d1 c7 63 1d df 5f 35 06 a0 fa 4c 4e 01 3f 17 c1 05 aa 50 d0 3b 48 16 46 75 d5 37 8e 2c 82 9b 06 17 11 bb 00 01 02 00 40 bb 55 3f f5 e5 58 ef 88 37 8e eb d5 3c 03 35 3c 97 43 f9 19 da dd cf 85 e9 c1 de 28 48 c3 ef 16 3b 22 14 44 2f 40 6f 5f 42 88 41 a3 a2 39 b8 0f 48 7e 56 40 64 07 7a 2b ce 88 03 5e 63 0c 59 ef 00 80 d2 62 9e cb d0 b5 26 bd d3 f1 14 b7 42 f5 35 62 21 60 1b fe 82 8a 90 be f2 7d 0b 83 11 d5 96 57 22 57 87 15 16 73 d6 f4 6a c1 58 03 ca ca ed f0 92 47 f5 c9 d0 80 47 ad b5 ba 62 94 47 46 d3 2a 7e b1 fc 44 71 df 4c c0 47 28 49 45 83 e9 8f 15 b4 83 63 a4 50 28 b8 7c 30 81 f1 12 ce 78 d6 41 3c a7 35 47 cd f7 3d bd c0 25 47 f7 69 42 58 d4 8e 2d 4a 6f 63 e6 03 33 6d 12 24 33 98 3f 0e 9f 16 03 01 00 04 0e 00 00 00 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1021) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server hello A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server certificate A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server done A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write change cipher spec A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write finished A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 flush data >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read finished A >SSL: SSL_connect - want more data >SSL: 134 bytes pending from ssl_out >SSL: 134 bytes left to be sent out (of total 134 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=144): 01 00 00 8c 02 03 00 8c 19 00 16 03 01 00 46 10 00 00 42 00 40 7b 01 3f eb 09 f8 81 25 55 89 4a 16 f8 16 9a ee f3 01 68 c4 ce 48 f6 2d c2 63 2f d1 30 3d c7 98 5d cd bd b3 d9 f0 e0 0a c4 b0 e4 f4 89 80 90 b0 0e b1 78 bd 24 18 f3 83 10 71 27 6c 88 61 7e 47 14 03 01 00 01 01 16 03 01 00 30 80 4a b1 72 ec e0 63 d4 ae 70 83 f7 5b fd 53 3e b7 b0 18 c1 49 24 68 25 fd 81 9e 3c 13 8d 06 f9 5c 37 f4 d5 b7 6c 95 84 fd 30 d4 d2 18 a0 99 a7 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=69): 01 00 00 41 01 04 00 41 19 00 14 03 01 00 01 01 16 03 01 00 30 15 73 54 b5 dc 57 d7 6d da e7 ec d9 28 3d 58 a4 a5 9e bf a5 a7 4f d5 ea ab 03 e7 45 6b 6d e8 51 dc 41 7e e3 23 3a cc 73 9c bc 92 8c db a1 0b ef >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=65) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read finished A >SSL: (where=0x20 ret=0x1) >SSL: (where=0x1002 ret=0x1) >SSL: 0 bytes pending from ssl_out >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >SSL: No data to be sent out >EAP-PEAP: TLS done, proceed to Phase 2 >EAP-PEAP: using label 'client EAP encryption' in key derivation >EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] >EAP-PEAP: Workaround - allow outer EAP-Success to terminate PEAP resumption >SSL: Building ACK (type=25 id=4 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=COND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 05 00 2b 19 00 17 03 01 00 20 79 4a ad 89 f3 1c 7d 05 3a af 6b 67 44 eb 27 ea 26 73 14 85 b3 7a e3 68 5d 4a 2f a7 71 52 c0 f2 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 05 00 05 01 >EAP-PEAP: received Phase 2: code=1 identifier=5 length=5 >EAP-PEAP: Phase 2 Request: type=1 >EAP: using real identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=10): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 05 00 50 19 00 17 03 01 00 20 1b d4 96 cb 10 16 e2 2f df a6 05 2a d1 a1 a7 76 41 0c 19 c5 b0 3a e8 b2 69 ab db 38 ae 1c 95 f7 17 03 01 00 20 3d 3c e4 ef 7f f3 be 85 6b 52 5d 61 f5 fb 73 15 1e d4 cc 18 0d 38 82 cc 7d 56 d9 2f ee 85 9a 85 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=63): 01 00 00 3b 01 06 00 3b 19 00 17 03 01 00 30 c4 13 3e 78 e1 58 7a ad 77 0f d7 6e 4b 7a 41 fd d7 4b eb 73 cf 7c 01 df 6c 2b ca df 00 de 20 e6 2e 39 09 93 a4 ad c4 e2 f8 f4 10 32 c7 50 7a e2 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=59) - Flags 0x00 >EAP-PEAP: received 53 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=27): 1a 01 06 00 1a 10 5a a7 e2 56 1e 93 fe 44 63 61 33 19 eb a9 00 c7 78 62 6f 74 6c >EAP-PEAP: received Phase 2: code=1 identifier=6 length=31 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 6 mschapv2_id 6 >EAP-MSCHAPV2: Received challenge >EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-MSCHAPV2: Generating Challenge Response >MSCHAPV2: Identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: Username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: auth_challenge - hexdump(len=16): 5a a7 e2 56 1e 93 fe 44 63 61 33 19 eb a9 00 c7 >MSCHAPV2: peer_challenge - hexdump(len=16): c9 ef b7 92 bc 0f 67 e7 ab d7 e2 70 e6 53 03 52 >MSCHAPV2: username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: password - hexdump_ascii(len=8): [REMOVED] >MSCHAPV2: NT Response - hexdump(len=24): b2 f7 2a 5c 4a 99 59 a7 6b d2 99 6f b7 70 d3 12 0f 74 17 b1 f7 3b c7 9c >MSCHAPV2: Auth Response - hexdump(len=20): aa de fa 41 f0 e4 e0 0b 01 6c 04 0a 77 67 40 d7 86 2a 71 9c >MSCHAPV2: Master Key - hexdump(len=16): [REMOVED] >EAP-MSCHAPV2: TX identifier 6 mschapv2_id 6 (response) >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=64): [REMOVED] >SSL: 138 bytes left to be sent out (of total 138 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=148): 01 00 00 90 02 06 00 90 19 00 17 03 01 00 20 89 b8 00 2e 71 3c 0d 01 44 93 b1 e2 85 ed a6 99 8a d7 f1 a9 19 02 51 0b 86 bd a9 82 98 e6 e8 4b 17 03 01 00 60 5d f9 6a ab a6 e6 84 f5 bb 0e 94 6f 00 a5 fb 2a 42 f1 4f 1a 54 ce 1b 58 4f 49 f5 e2 3c cd c6 30 51 68 97 68 4b 6b 42 f6 37 0b 67 b0 70 5b d9 d4 4a 55 42 a7 53 e5 7b 18 ef ea 03 46 7c dc 2f d3 db ba b8 b5 1a 78 de fc 8b 5d df 84 7d 62 81 4c 72 d7 b1 ca f5 7f 97 eb 8e cc 02 25 c5 1a 15 4f >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=95): 01 00 00 5b 01 07 00 5b 19 00 17 03 01 00 50 96 39 bc cc 3a aa b6 1e 63 b7 da ac d5 c6 c7 5f 70 ff e3 c5 88 cc dd 02 77 c3 56 d9 37 e3 4a 2b 2c af 7f 33 5f b1 db 9c 30 79 85 85 c4 bc b5 4c d4 7e d5 aa f1 da cf 5d ae 51 c0 5c f3 fb 10 86 bb 29 37 c9 3d bd 10 7a 98 aa 44 59 f3 62 60 dd >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=91) - Flags 0x00 >EAP-PEAP: received 85 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 06 00 2e 53 3d 41 41 44 45 46 41 34 31 46 30 45 34 45 30 30 42 30 31 36 43 30 34 30 41 37 37 36 37 34 30 44 37 38 36 32 41 37 31 39 43 >EAP-PEAP: received Phase 2: code=1 identifier=7 length=51 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 7 mschapv2_id 6 >EAP-MSCHAPV2: Received success >EAP-MSCHAPV2: Success message - hexdump_ascii(len=0): >EAP-MSCHAPV2: Authentication succeeded >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 07 00 50 19 00 17 03 01 00 20 0f 73 87 cc 0f 15 eb 3f 34 47 f5 a4 75 f9 fe 11 71 57 fd d7 ec 0f 1e e0 6d 18 95 55 bc 52 b6 00 17 03 01 00 20 73 5b bb 23 f2 70 8d 0d 5a 5e b1 27 59 85 b8 08 d0 2c 2d c9 03 7d 96 e6 c1 28 3a 2a f9 f7 27 be >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 08 00 2b 19 00 17 03 01 00 20 6c 7b 0c cc a2 59 8e 3b 77 9f 2c 2d 85 56 83 02 a2 c0 ca 94 58 06 dd 8e 40 8e e6 50 0d 9f bf 0a >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 08 00 0b 21 80 03 00 02 00 01 >EAP-PEAP: received Phase 2: code=1 identifier=8 length=11 >EAP-PEAP: Phase 2 Request: type=33 >EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01 >EAP-TLV: Result TLV - hexdump(len=2): 00 01 >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 08 00 50 19 00 17 03 01 00 20 52 ab 4d 03 ee 89 67 d6 7f 8a a3 d9 b2 5a f4 b2 b7 6f 04 b5 d8 e5 5b 72 d0 50 1c 71 0c bc c5 74 17 03 01 00 20 0b d2 d3 3d 34 66 5c d9 79 d6 e2 ae 7f 0d 3e 39 89 eb 87 f6 7f b0 2f ed d4 a2 03 06 92 c5 d7 59 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=8): 01 00 00 04 03 08 00 04 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Success >EAP: EAP entering state SUCCESS >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state SUCCESS >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 33 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 33 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 33 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >EAPOL: Successfully fetched key (len=32) >WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED] >WPA: Renewed SNonce - hexdump(len=32): 98 98 a3 a9 4a eb 2b d4 40 bb aa 07 76 2a 04 bf 30 f9 8c 9f 2a a7 7d f6 8a 90 89 93 c4 47 b5 0e >WPA: PTK derivation - A1=00:1d:e0:98:a5:dd A2=00:c0:49:1c:ec:d4 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 98 98 a3 a9 4a eb 2b d4 40 bb aa 07 76 2a 04 bf 30 f9 8c 9f 2a a7 7d f6 8a 90 89 93 c4 47 b5 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e2 0c 91 9f 0a 11 d9 87 44 02 f5 2a c6 02 17 0f 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 33 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 39 9c 39 a5 7f 97 ef dd 25 6f 6e bf c7 32 f4 01 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=121 > EAPOL-Key type=254 > key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) > key_length=32 key_data_length=26 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 33 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 39 9c 39 a5 7f 97 ef dd 25 6f 6e bf c7 32 f4 01 >WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 33 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 39 9c 39 a5 7f 97 ef dd 25 6f 6e bf c7 32 f4 01 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 3 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >WPA: Sending EAPOL-Key 4/4 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 2a b5 d4 9d 88 b1 0e 92 fa d4 2a bd 5f c8 c8 00 00 >WPA: Installing PTK to the driver. >WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 >State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 35 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2b 1d 1c 8d 90 be e3 f5 85 4b 1e 9d d5 5c 91 ec 00 20 9a d0 a4 c0 86 8f 7b fa 01 ff db b5 fc 93 8e 19 00 9f 70 f6 e8 0e 66 9a 9e 45 70 34 ce 61 d5 f1 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 35 > key_rsc - hexdump(len=8): 1e 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 2b 1d 1c 8d 90 be e3 f5 85 4b 1e 9d d5 5c 91 ec >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 35 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2b 1d 1c 8d 90 be e3 f5 85 4b 1e 9d d5 5c 91 ec 00 20 9a d0 a4 c0 86 8f 7b fa 01 ff db b5 fc 93 8e 19 00 9f 70 f6 e8 0e 66 9a 9e 45 70 34 ce 61 d5 f1 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 1e 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 23 47 cb 99 f9 07 f2 dd 8d 14 01 b3 14 ed 34 32 00 00 >WPA: Key negotiation completed with 00:c0:49:1c:ec:d4 [PTK=TKIP GTK=TKIP] >Cancelling scan request >Cancelling authentication timeout >Removed BSSID 00:c0:49:1c:ec:d4 from blacklist >State: GROUP_HANDSHAKE -> COMPLETED >CTRL-EVENT-CONNECTED - Connection to 00:c0:49:1c:ec:d4 completed (reauth) [id=0 id_str=] >wpa_driver_wext_set_operstate: operstate 0->1 (UP) >WEXT: Operstate: linkmode=-1, operstate=6 >EAPOL: External notification - portValid=1 >EAPOL: SUPP_PAE entering state AUTHENTICATED >EAPOL authentication completed successfully >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 36 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bf 5c 8c 49 82 77 e1 3d 94 e7 81 7e a6 93 88 02 00 20 6f 76 e2 79 90 ff 61 e3 08 66 b2 63 24 88 5a 27 c7 e2 fa 31 c1 8f 87 ac 05 d0 c8 cd 7c ed ab 6d >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 36 > key_rsc - hexdump(len=8): 1e 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): bf 5c 8c 49 82 77 e1 3d 94 e7 81 7e a6 93 88 02 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 36 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bf 5c 8c 49 82 77 e1 3d 94 e7 81 7e a6 93 88 02 00 20 6f 76 e2 79 90 ff 61 e3 08 66 b2 63 24 88 5a 27 c7 e2 fa 31 c1 8f 87 ac 05 d0 c8 cd 7c ed ab 6d >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 1e 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 b0 af d2 08 da 27 0e 6e 4f 8a 2b 4b 80 5d 5c 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 37 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b1 d7 e1 49 fb 7a ca fd 48 04 06 d5 b6 d8 a2 d4 00 20 34 17 76 b8 67 ba e1 28 2a 6a 63 72 fb 80 1e 15 72 59 01 2d 84 0c 18 e7 86 1f d2 39 48 6a a1 ab >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 37 > key_rsc - hexdump(len=8): 1f 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): b1 d7 e1 49 fb 7a ca fd 48 04 06 d5 b6 d8 a2 d4 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 37 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b1 d7 e1 49 fb 7a ca fd 48 04 06 d5 b6 d8 a2 d4 00 20 34 17 76 b8 67 ba e1 28 2a 6a 63 72 fb 80 1e 15 72 59 01 2d 84 0c 18 e7 86 1f d2 39 48 6a a1 ab >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 1f 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a6 3d 51 a2 d2 40 4e af 4f 47 8d 99 5a 0a e3 7a 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >Setting scan request: 0 sec 100000 usec >Added BSSID 00:c0:49:1c:ec:d4 into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: COMPLETED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >BSSID 00:00:00:00:00:00 blacklist count incremented to 5 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >Driver did not support SIOCSIWENCODEEXT >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=221 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00055353494431010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f201 RespIEs=010882848b0c1296182432043048606cdd180050f20201010000030f0000270f000052f75d0072732e00)' >Association info event >req_ies - hexdump(len=47): 00 05 53 53 49 44 31 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 00 00 03 0f 00 00 27 0f 00 00 52 f7 5d 00 72 73 2e 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:c0:49:1c:ec:d4 >State: SCANNING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:c0:49:1c:ec:d4 >No keys have been configured - skip key clearing >Associated with 00:c0:49:1c:ec:d4 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b1a len=16 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b2a len=16 >wpa_driver_wext_disassociate >No keys have been configured - skip key clearing >State: ASSOCIATED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >No keys have been configured - skip key clearing >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >BSSID 00:00:00:00:00:00 blacklist count incremented to 6 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >Driver did not support SIOCSIWENCODEEXT >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >EAPOL: startWhen --> 0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >BSSID 00:00:00:00:00:00 blacklist count incremented to 7 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >Driver did not support SIOCSIWENCODEEXT >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >BSSID 00:00:00:00:00:00 blacklist count incremented to 8 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >Driver did not support SIOCSIWENCODEEXT >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >Authentication with 00:00:00:00:00:00 timed out. >BSSID 00:00:00:00:00:00 blacklist count incremented to 9 >No keys have been configured - skip key clearing >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >Setting scan request: 0 sec 0 usec >EAPOL: authWhile --> 0 >Setting scan request: 0 sec 0 usec >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >EAPOL: idleWhile --> 0 >EAPOL: disable timer tick >Setting scan request: 0 sec 0 usec >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Setting scan request: 0 sec 0 usec >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Setting scan request: 0 sec 0 usec >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Setting scan request: 0 sec 0 usec >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Setting scan request: 0 sec 0 usec >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Setting scan request: 0 sec 0 usec >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Setting scan request: 0 sec 0 usec >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >No keys have been configured - skip key clearing >State: SCANNING -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >pairwise: 0x18 >ssid - hexdump_ascii(len=5): > 53 53 49 44 31 NETWORKSID >group: 0x1e >fragment_size=1300 (0x514) >eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 >proto: 0x3 >key_mgmt: 0x1 >password - hexdump_ascii(len=8): > 42 30 74 2e 31 75 43 2e password >anonymous_identity - hexdump_ascii(len=9): > 61 6e 6f 6e 79 6d 6f 75 73 anonymous >phase1 - hexdump_ascii(len=9): > 70 65 61 70 76 65 72 3d 30 peapver=0 >scan_ssid=1 (0x1) >phase2 - hexdump_ascii(len=13): > 61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 >identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >Setting scan request: 0 sec 0 usec >State: DISCONNECTED -> SCANNING >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=5): > 53 53 49 44 31 NETWORKSID >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:c0:49:fd:9f:80 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - blacklisted >1: 00:c0:49:1c:ec:d4 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > selected based on WPA IE > selected WPA AP 00:c0:49:1c:ec:d4 ssid='NETWORKSID' >Try to find non-WPA AP >Trying to associate with 00:c0:49:1c:ec:d4 (SSID='NETWORKSID' freq=2412 MHz) >Cancelling scan request >WPA: clearing own WPA/RSN IE >Automatic auth_alg selection: 0x1 >WPA: using IEEE 802.11i/D3.0 >WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 1 proto 1 >WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >WPA: clearing AP RSN IE >WPA: using GTK TKIP >WPA: using PTK TKIP >WPA: using KEY_MGMT 802.1X >WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >No keys have been configured - skip key clearing >wpa_driver_wext_set_drop_unencrypted >State: SCANNING -> ASSOCIATING >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_associate >Setting authentication timeout: 20 sec 0 usec >EAPOL: External notification - portControl=Auto >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b06 len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b04 len=16 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b1a len=21 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:c0:49:fd:9f:80 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - blacklisted >1: 00:c0:49:1c:ec:d4 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > selected based on WPA IE > selected WPA AP 00:c0:49:1c:ec:d4 ssid='NETWORKSID' >Try to find non-WPA AP >Already associated with the selected AP. >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=221 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00055353494431010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f201 RespIEs=010882848b0c1296182432043048606cdd180050f20201010000030f0000270f000052f75d0072732e00)' >Association info event >req_ies - hexdump(len=47): 00 05 53 53 49 44 31 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 00 00 03 0f 00 00 27 0f 00 00 52 f7 5d 00 72 73 2e 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=14): 01 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:c0:49:1c:ec:d4 >State: ASSOCIATING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:c0:49:1c:ec:d4 >No keys have been configured - skip key clearing >Associated with 00:c0:49:1c:ec:d4 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: enable timer tick >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=4): 01 01 00 00 >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=14): 01 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=5): > 68 65 6c 6c 6f hello >EAP: using anonymous identity - hexdump_ascii(len=9): > 61 6e 6f 6e 79 6d 6f 75 73 anonymous >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=18): 01 00 00 0e 02 00 00 0e 01 61 6e 6f 6e 79 6d 6f 75 73 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=10): 01 00 00 06 01 01 00 06 19 20 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=1 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Using previous method data for fast re-authentication >EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >EAP: EAP entering state METHOD >SSL: Received packet(len=6) - Flags 0x20 >EAP-PEAP: Start (server ver=0, own ver=0) >EAP-PEAP: Using PEAP version 0 >SSL: (where=0x10 ret=0x1) >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:before/connect initialization >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client hello A >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read server hello A >SSL: SSL_connect - want more data >SSL: 143 bytes pending from ssl_out >SSL: 143 bytes left to be sent out (of total 143 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=153): 01 00 00 95 02 01 00 95 19 00 16 03 01 00 8a 01 00 00 86 03 01 48 6d ed 4f 03 89 25 f9 a9 a1 45 c8 f6 02 db e0 6b a1 b3 05 dd 51 37 97 24 60 7e 91 1a 5f 64 19 20 20 fe 03 2c 5e 65 5a d3 e6 a3 74 c6 2c 08 4c 5e 20 c0 8c b0 48 d1 7e 07 90 7a a7 bd 9a 4b 0e 67 00 38 00 39 00 38 00 35 00 88 00 87 00 84 00 16 00 13 00 0a 00 33 00 32 00 2f 00 9a 00 99 00 96 00 45 00 44 00 41 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 02 01 00 00 04 00 23 00 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1038): 01 00 04 0a 01 02 04 0a 19 c0 00 00 07 f7 16 03 01 00 4a 02 00 00 46 03 01 48 6d ed 89 da 4a 49 99 24 17 8d 57 a0 59 77 e3 1c 50 43 5d e4 2b 8d c1 3b 18 66 b7 5f ad cf 80 20 af b7 8d 7e 7b e4 b1 73 b1 5a 36 b8 55 fe d8 de 82 9d 7f ab c2 89 db 53 5d 2b 6d 1c 48 59 a4 25 00 39 00 16 03 01 06 88 0b 00 06 84 00 06 81 00 02 c2 30 82 02 be 30 82 02 27 a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 35 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 37 31 31 32 31 31 30 34 31 35 36 5a 30 81 8e 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 10 30 0e 06 03 55 04 03 13 07 52 4f 4f 54 20 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 e1 14 fe 0f 20 51 89 c1 68 0d 84 f7 15 45 0d 82 cf ce eb c4 57 3a dc 1e 8d 88 bd 0d 12 00 3a a2 8d 79 47 3e 3d a2 6e ab 68 a9 05 32 f3 e1 85 13 f9 a0 28 01 e0 4d df 2b 5c 99 fd d8 3f 62 75 f6 81 42 63 63 ef bc 67 8e 22 5e a2 f4 da d9 f1 40 71 26 11 3a 0a 73 2b 2f 18 db 20 98 5f c6 a1 fc d0 de 80 e0 c5 73 56 c4 9a 15 0c 0a 3b a7 89 bf 9b eb 63 13 06 01 83 83 be 7b 0a 74 af 7f 4a cf 02 03 01 00 01 a3 17 30 15 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 4c 8d 15 93 47 26 0f 59 2e 4e 7f d0 16 65 e4 8c c0 4c 73 17 07 9a 90 c1 52 27 b9 3e 56 8c 0c fa 9b 1c b8 90 a3 e4 2c 82 61 70 86 2d 8a c3 ca 45 14 b5 bb 55 00 ca 15 7c 0f 33 3f 19 08 37 e0 88 8e 53 e5 5a eb a5 78 eb 92 c8 89 95 7b c7 79 40 59 c7 4c 90 c2 c2 07 b9 68 80 5f 21 ff f4 b0 fd 83 ab 0f 97 e8 b0 f0 f3 80 d8 80 67 6a 9b 16 d3 26 af 4a 88 8e f2 a0 4b a6 72 b2 1c d6 5c c4 d5 00 03 b9 30 82 03 b5 30 82 03 1e a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 33 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 38 31 31 32 30 31 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1034) - Flags 0xc0 >SSL: TLS Message Length: 2039 >SSL: Need 1015 bytes more input data >SSL: Building ACK (type=25 id=2 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1025): 01 00 03 fd 01 03 03 fd 19 00 30 34 31 35 36 5a 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 97 8f 78 af a5 f4 70 a1 00 41 5b fa 62 28 19 69 f6 e5 f7 6a 1a 27 85 ca 8a 15 00 55 54 15 97 68 0b 2e 55 39 e4 b0 6b 76 55 86 84 53 7c 56 fc 74 52 da 73 a3 54 ae 74 47 64 9e 1f ff 1b 1e 3d 1c 8b c1 8d af 89 94 e9 0e d0 c9 56 83 52 c4 50 a9 24 81 10 3d 0a e7 7e 6e 7b 30 ae fd 1b 4d f8 96 87 3f 7d 72 2a cd fa 22 f9 cd 29 17 f4 da 15 eb de 6a de b3 e1 9d 2a c5 3b 3d ea 3c f6 a6 a6 71 02 03 01 00 01 a3 82 01 01 30 81 fe 30 1d 06 03 55 1d 0e 04 16 04 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f 30 81 ce 06 03 55 1d 23 04 81 c6 30 81 c3 80 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f a1 81 9f a4 81 9c 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 82 09 00 d9 c7 09 10 ab 9f 78 33 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 74 1a c9 c3 9b 7a a4 5a e4 16 4c d1 af 8e b6 95 20 80 ca 9e 5f 89 82 ba e7 99 63 da 67 b9 c0 7b 86 aa 51 3d 24 41 58 dd d9 2d e7 cb e6 6f 3a 8f 15 5e ca 21 5a f7 46 21 a3 bb b5 f6 9c d0 82 1b b5 f5 3d c9 ed 94 51 aa f2 ff ca 34 d0 48 05 2c 66 92 6f 50 c7 49 0e c4 2d 1d 19 a3 9c ca b9 f9 c0 b1 d0 17 b9 fe 80 90 d6 dd 2b 38 70 74 4e a7 53 99 3e bf cd 0e d4 79 bb 2f f5 8e ba 6c d1 69 16 03 01 01 0d 0c 00 01 09 00 40 c3 4a f6 2a e3 ab 87 b9 1c 92 96 23 c3 a2 11 50 ae 15 b2 0c de bc fb 0d 00 a3 98 83 d1 d1 c7 63 1d df 5f 35 06 a0 fa 4c 4e 01 3f 17 c1 05 aa 50 d0 3b 48 16 46 75 d5 37 8e 2c 82 9b 06 17 11 bb 00 01 02 00 40 79 54 b0 6c 10 6c cd 45 43 01 5b 69 83 8d ca 24 66 c7 af f9 50 86 ff 41 8c 18 0d 8c 6a 47 51 31 c3 68 65 a0 12 cb 5b 52 3b 6f 69 fd e3 76 e5 56 1c 9b a3 5d 2e 6b 0a db ed d9 fa d3 a1 f6 43 0d 00 80 a2 c9 1a 5d 60 27 39 f5 b7 f7 b3 d8 d7 35 c8 92 36 fb db f1 21 4f 79 55 cf 1f bc 4d e4 2d ce 8a e9 dd 81 fc d8 de 82 5d 32 f8 86 57 fe e2 dc e4 2b 78 10 09 84 91 79 cd 61 af 61 51 a3 3c 69 19 c6 ca 1d a5 ac 0a a6 83 ed 8d 47 4d 18 2f 14 77 f0 e7 37 b3 93 88 5d 32 c9 8e 58 eb 00 0b 8f eb 57 c4 38 61 23 1d 9e 6e 77 15 7f 67 2e 86 76 8e 05 4b cd 9e 59 88 dc f6 51 e6 8d 5e 31 cf c0 0d 16 03 01 00 04 0e 00 00 00 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1021) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server hello A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server certificate A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server done A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write change cipher spec A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write finished A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 flush data >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read finished A >SSL: SSL_connect - want more data >SSL: 134 bytes pending from ssl_out >SSL: 134 bytes left to be sent out (of total 134 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=144): 01 00 00 8c 02 03 00 8c 19 00 16 03 01 00 46 10 00 00 42 00 40 50 5f 8f 12 3f 94 40 26 2a d5 40 cb e4 88 0e 2e 38 08 50 7d 83 c8 83 80 97 87 1a 3f f5 66 50 36 5d ed af 63 37 86 f5 ec ca 6e 4a 40 5b 20 fd 81 08 23 05 6e d7 47 d9 a9 0e 58 3a 62 dc 06 ee cf 14 03 01 00 01 01 16 03 01 00 30 37 71 09 cb 44 4b cd 50 56 ab 94 22 32 5f 53 12 b1 07 fe 08 2f 0d 81 bb 09 ea 48 ca be f2 f6 bd aa 5e d6 79 9a 73 ea 77 49 86 c5 23 01 69 16 c6 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=69): 01 00 00 41 01 04 00 41 19 00 14 03 01 00 01 01 16 03 01 00 30 f3 d4 a9 40 02 5c 92 bb fb 29 71 cd 53 8d 4e f9 59 cd c5 e6 c0 ce fd 36 3b 7c 1f d1 cf ac 56 20 c1 be 40 e6 53 5a cd e3 3f 98 1c 4a 32 e9 f3 23 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=65) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read finished A >SSL: (where=0x20 ret=0x1) >SSL: (where=0x1002 ret=0x1) >SSL: 0 bytes pending from ssl_out >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >SSL: No data to be sent out >EAP-PEAP: TLS done, proceed to Phase 2 >EAP-PEAP: using label 'client EAP encryption' in key derivation >EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] >EAP-PEAP: Workaround - allow outer EAP-Success to terminate PEAP resumption >SSL: Building ACK (type=25 id=4 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=COND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 05 00 2b 19 00 17 03 01 00 20 ab 93 48 44 95 43 17 2f 13 86 f4 da 29 58 b1 e3 34 cb 10 2c aa 50 b1 38 7a 17 b4 b5 ce 42 21 8f >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 05 00 05 01 >EAP-PEAP: received Phase 2: code=1 identifier=5 length=5 >EAP-PEAP: Phase 2 Request: type=1 >EAP: using real identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=10): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 05 00 50 19 00 17 03 01 00 20 af bd c2 21 56 1b 4c bd 61 14 db b1 ef 3c 2b ea 10 18 5a 51 d3 ad fd 1d 34 eb a0 d1 3d de 21 60 17 03 01 00 20 8c bd ae 07 55 98 5a 44 da 5a de e9 a2 4e d8 8a 7d e5 19 10 74 91 58 e3 63 3e c4 e3 7f c0 1a bd >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=63): 01 00 00 3b 01 06 00 3b 19 00 17 03 01 00 30 22 c4 86 43 48 e5 cd 18 d9 3b e1 ef 22 82 d3 66 80 a0 cf f6 cc 34 6f 52 ba 27 c8 ad 67 8c 29 f6 80 3d 2d 58 2e e4 5e c1 b0 11 5f 4e 4a 4e cb 29 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=59) - Flags 0x00 >EAP-PEAP: received 53 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=27): 1a 01 06 00 1a 10 e8 2c d9 da 24 40 c3 49 fa ae a6 94 50 69 93 0e 78 62 6f 74 6c >EAP-PEAP: received Phase 2: code=1 identifier=6 length=31 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 6 mschapv2_id 6 >EAP-MSCHAPV2: Received challenge >EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-MSCHAPV2: Generating Challenge Response >MSCHAPV2: Identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: Username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: auth_challenge - hexdump(len=16): e8 2c d9 da 24 40 c3 49 fa ae a6 94 50 69 93 0e >MSCHAPV2: peer_challenge - hexdump(len=16): 9b 95 16 26 69 80 58 4f 2e 48 50 cb 9e 44 16 aa >MSCHAPV2: username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: password - hexdump_ascii(len=8): [REMOVED] >MSCHAPV2: NT Response - hexdump(len=24): a4 08 2a 08 25 14 74 50 17 5e 24 fe 82 2b 29 20 a9 5e 64 82 e5 fd a2 ab >MSCHAPV2: Auth Response - hexdump(len=20): 8d 72 ad 7d 9d 71 d4 5b 6f 43 ce 1b e8 ac e4 07 6a 8d 40 38 >MSCHAPV2: Master Key - hexdump(len=16): [REMOVED] >EAP-MSCHAPV2: TX identifier 6 mschapv2_id 6 (response) >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=64): [REMOVED] >SSL: 138 bytes left to be sent out (of total 138 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=148): 01 00 00 90 02 06 00 90 19 00 17 03 01 00 20 d6 94 6c ae 26 17 ff 8a 76 5e 8b 2c 91 e8 b5 81 8d 3e d5 0a 76 6c 4f ce 68 1d d3 aa c8 97 ca a8 17 03 01 00 60 35 96 ce 58 f8 51 39 b9 ff d7 f6 16 a2 aa 57 f5 32 0b 9f aa 67 7f 90 f1 2e 32 38 fa 6d 70 ac d9 c0 79 cb e6 49 1e e5 a1 cd 8c cb fd 5f 42 a2 ec d0 1c d8 5b c4 a3 86 b4 43 73 de 8a 5d c3 25 b2 62 2f 5b 0a ad 82 d4 7e a0 61 c4 91 c0 3b cb c6 2b eb 6e 03 34 a3 c5 f7 80 d8 ef c3 8a 25 34 2e >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=95): 01 00 00 5b 01 07 00 5b 19 00 17 03 01 00 50 38 f9 f5 9c 11 f4 9b ca 8e 40 02 9c 80 ba 62 70 37 b4 68 94 af 7a 7e 6a 2b 7e a9 e6 2e 84 ce ae 64 7b 18 41 9c 8c ac 05 c8 27 39 96 42 68 62 d0 e7 f6 68 1d 20 61 81 fe 7d 07 7f 3b c9 69 65 84 a4 60 e6 26 05 2d 71 6e 25 e9 32 c5 ce 3c c3 82 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=91) - Flags 0x00 >EAP-PEAP: received 85 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 06 00 2e 53 3d 38 44 37 32 41 44 37 44 39 44 37 31 44 34 35 42 36 46 34 33 43 45 31 42 45 38 41 43 45 34 30 37 36 41 38 44 34 30 33 38 >EAP-PEAP: received Phase 2: code=1 identifier=7 length=51 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 7 mschapv2_id 6 >EAP-MSCHAPV2: Received success >EAP-MSCHAPV2: Success message - hexdump_ascii(len=0): >EAP-MSCHAPV2: Authentication succeeded >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 07 00 50 19 00 17 03 01 00 20 cd a3 4e 94 50 15 82 a3 3f 90 12 31 52 5f a1 19 a6 b3 95 5e a1 22 72 50 95 7b d4 2a 02 ff 4f cf 17 03 01 00 20 11 f5 9f f0 6e c5 38 63 04 b4 78 e3 9e 5f 5a 66 71 0a f3 60 7e 6a 6b f7 28 6f 73 70 ac 29 67 e1 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 08 00 2b 19 00 17 03 01 00 20 f3 ee f3 d4 ae f0 ea e3 82 93 2b 3f 2b a7 b5 09 e6 4f 99 52 55 45 8b 5d e2 fa 30 cd be 0a 75 52 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 08 00 0b 21 80 03 00 02 00 01 >EAP-PEAP: received Phase 2: code=1 identifier=8 length=11 >EAP-PEAP: Phase 2 Request: type=33 >EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01 >EAP-TLV: Result TLV - hexdump(len=2): 00 01 >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 08 00 50 19 00 17 03 01 00 20 53 77 92 2c cd 32 aa 82 a4 60 a5 98 6c 0e 76 ab 4a 7d bc fb f8 d3 da ea b7 d3 16 1f 4d 34 fa 23 17 03 01 00 20 93 45 c4 06 7a d2 a4 05 8a 9a 7c df 52 8f cc 18 e2 03 3e 72 ea 6d c0 7b c5 95 72 44 36 80 a3 5e >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=8): 01 00 00 04 03 08 00 04 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Success >EAP: EAP entering state SUCCESS >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state SUCCESS >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 3a > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >EAPOL: Successfully fetched key (len=32) >WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED] >WPA: Renewed SNonce - hexdump(len=32): 65 59 5c e6 6a df f1 9c 94 34 bd a7 9a 20 8a 74 00 7b c4 a8 88 22 52 fb 29 e2 e1 00 b7 bc 58 74 >WPA: PTK derivation - A1=00:1d:e0:98:a5:dd A2=00:c0:49:1c:ec:d4 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 65 59 5c e6 6a df f1 9c 94 34 bd a7 9a 20 8a 74 00 7b c4 a8 88 22 52 fb 29 e2 e1 00 b7 bc 58 74 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 23 1c 30 c6 38 9a cb ec d7 e8 e7 08 4d 85 20 a3 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 70 c3 c1 ef 90 bb 64 3e 01 dd 07 6c 0a 53 45 10 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=121 > EAPOL-Key type=254 > key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) > key_length=32 key_data_length=26 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 3a > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 70 c3 c1 ef 90 bb 64 3e 01 dd 07 6c 0a 53 45 10 >WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 70 c3 c1 ef 90 bb 64 3e 01 dd 07 6c 0a 53 45 10 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 3 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >WPA: Sending EAPOL-Key 4/4 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 0c c0 4a ac a6 7b f4 29 4e c8 f4 06 a9 68 b9 00 00 >WPA: Installing PTK to the driver. >WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 >State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 3c 27 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4e 5d 80 78 79 0a e8 5f 13 08 d7 ea 9d 5b bc 4e 00 20 19 9b 25 77 36 45 3f ae 26 c4 5c 42 ec 96 36 fa c2 d2 0f 0a 26 57 63 17 bf 1f dd ec 18 a6 81 67 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 3c > key_rsc - hexdump(len=8): 27 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 4e 5d 80 78 79 0a e8 5f 13 08 d7 ea 9d 5b bc 4e >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 3c 27 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4e 5d 80 78 79 0a e8 5f 13 08 d7 ea 9d 5b bc 4e 00 20 19 9b 25 77 36 45 3f ae 26 c4 5c 42 ec 96 36 fa c2 d2 0f 0a 26 57 63 17 bf 1f dd ec 18 a6 81 67 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 27 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c4 6c d9 58 98 89 36 38 7b 8d 7f 1c ea cf 4e 0d 00 00 >WPA: Key negotiation completed with 00:c0:49:1c:ec:d4 [PTK=TKIP GTK=TKIP] >Cancelling scan request >Cancelling authentication timeout >Removed BSSID 00:c0:49:1c:ec:d4 from blacklist >State: GROUP_HANDSHAKE -> COMPLETED >CTRL-EVENT-CONNECTED - Connection to 00:c0:49:1c:ec:d4 completed (reauth) [id=0 id_str=] >wpa_driver_wext_set_operstate: operstate 0->1 (UP) >WEXT: Operstate: linkmode=-1, operstate=6 >EAPOL: External notification - portValid=1 >EAPOL: SUPP_PAE entering state AUTHENTICATED >EAPOL authentication completed successfully >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 3d 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e5 26 97 d5 c4 77 cb 38 4c 89 16 44 11 27 54 79 00 20 64 3a 2a 71 62 57 5e 1b 7a 17 02 96 b5 4f b7 44 10 28 aa 6e 76 b0 b9 a1 0d fb e9 69 e2 d6 14 77 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 3d > key_rsc - hexdump(len=8): 28 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): e5 26 97 d5 c4 77 cb 38 4c 89 16 44 11 27 54 79 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 3d 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e5 26 97 d5 c4 77 cb 38 4c 89 16 44 11 27 54 79 00 20 64 3a 2a 71 62 57 5e 1b 7a 17 02 96 b5 4f b7 44 10 28 aa 6e 76 b0 b9 a1 0d fb e9 69 e2 d6 14 77 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 28 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5f 35 7a 13 49 f0 c5 08 bb 4e bb fb 69 a5 54 fe 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 3e 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 45 ef 0a 88 49 c6 a2 04 88 2a 29 25 cf ef 99 85 00 20 a0 d5 25 5e c2 f2 91 f8 ef 76 d0 71 73 b6 06 dd 90 c1 74 ac 9c 3b b5 6b 31 b9 97 89 2d 9e d4 47 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 3e > key_rsc - hexdump(len=8): 28 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 45 ef 0a 88 49 c6 a2 04 88 2a 29 25 cf ef 99 85 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 3e 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 45 ef 0a 88 49 c6 a2 04 88 2a 29 25 cf ef 99 85 00 20 a0 d5 25 5e c2 f2 91 f8 ef 76 d0 71 73 b6 06 dd 90 c1 74 ac 9c 3b b5 6b 31 b9 97 89 2d 9e d4 47 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 28 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5c f0 75 72 e5 fe e7 09 5f dc 4c 3a 30 ec cd 27 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >Setting scan request: 0 sec 100000 usec >Added BSSID 00:c0:49:1c:ec:d4 into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: COMPLETED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >BSSID 00:00:00:00:00:00 blacklist count incremented to 10 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >Driver did not support SIOCSIWENCODEEXT >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >Setting scan request: 0 sec 0 usec >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=5): > 53 53 49 44 31 NETWORKSID >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=221 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00055353494431010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f201 RespIEs=010882848b0c1296182432043048606cdd180050f20201010000030f0000270f000052f75d0072732e00)' >Association info event >req_ies - hexdump(len=47): 00 05 53 53 49 44 31 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 00 00 03 0f 00 00 27 0f 00 00 52 f7 5d 00 72 73 2e 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:c0:49:1c:ec:d4 >State: SCANNING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:c0:49:1c:ec:d4 >No keys have been configured - skip key clearing >Associated with 00:c0:49:1c:ec:d4 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:c0:49:fd:9f:80 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - blacklisted >1: 00:c0:49:1c:ec:d4 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > selected based on WPA IE > selected WPA AP 00:c0:49:1c:ec:d4 ssid='NETWORKSID' >Try to find non-WPA AP >Already associated with the selected AP. >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=4): 01 01 00 00 >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=14): 01 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=5): > 68 65 6c 6c 6f hello >EAP: using anonymous identity - hexdump_ascii(len=9): > 61 6e 6f 6e 79 6d 6f 75 73 anonymous >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=18): 01 00 00 0e 02 00 00 0e 01 61 6e 6f 6e 79 6d 6f 75 73 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=10): 01 00 00 06 01 01 00 06 19 20 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=1 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Using previous method data for fast re-authentication >EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >EAP: EAP entering state METHOD >SSL: Received packet(len=6) - Flags 0x20 >EAP-PEAP: Start (server ver=0, own ver=0) >EAP-PEAP: Using PEAP version 0 >SSL: (where=0x10 ret=0x1) >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:before/connect initialization >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client hello A >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read server hello A >SSL: SSL_connect - want more data >SSL: 143 bytes pending from ssl_out >SSL: 143 bytes left to be sent out (of total 143 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=153): 01 00 00 95 02 01 00 95 19 00 16 03 01 00 8a 01 00 00 86 03 01 48 6d ed 56 f9 bf 3a 25 af 7e 46 03 1d 85 db 69 66 d1 20 e6 ee 02 aa 6a 48 1c 15 45 65 3c 20 bd 20 af b7 8d 7e 7b e4 b1 73 b1 5a 36 b8 55 fe d8 de 82 9d 7f ab c2 89 db 53 5d 2b 6d 1c 48 59 a4 25 00 38 00 39 00 38 00 35 00 88 00 87 00 84 00 16 00 13 00 0a 00 33 00 32 00 2f 00 9a 00 99 00 96 00 45 00 44 00 41 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 02 01 00 00 04 00 23 00 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1038): 01 00 04 0a 01 02 04 0a 19 c0 00 00 07 f7 16 03 01 00 4a 02 00 00 46 03 01 48 6d ed 90 f7 47 4b 6b 5e 76 2b 92 ce 0c af ca 8b fc b5 0c dc 8f e3 63 a2 83 60 f0 ab 87 e5 1e 20 96 fc 6a 25 f5 66 00 02 da c8 de ea 2e 24 68 42 fa 89 06 a8 96 34 64 4f 27 bb 2c e2 db ae 1b a2 00 39 00 16 03 01 06 88 0b 00 06 84 00 06 81 00 02 c2 30 82 02 be 30 82 02 27 a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 35 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 37 31 31 32 31 31 30 34 31 35 36 5a 30 81 8e 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 10 30 0e 06 03 55 04 03 13 07 52 4f 4f 54 20 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 e1 14 fe 0f 20 51 89 c1 68 0d 84 f7 15 45 0d 82 cf ce eb c4 57 3a dc 1e 8d 88 bd 0d 12 00 3a a2 8d 79 47 3e 3d a2 6e ab 68 a9 05 32 f3 e1 85 13 f9 a0 28 01 e0 4d df 2b 5c 99 fd d8 3f 62 75 f6 81 42 63 63 ef bc 67 8e 22 5e a2 f4 da d9 f1 40 71 26 11 3a 0a 73 2b 2f 18 db 20 98 5f c6 a1 fc d0 de 80 e0 c5 73 56 c4 9a 15 0c 0a 3b a7 89 bf 9b eb 63 13 06 01 83 83 be 7b 0a 74 af 7f 4a cf 02 03 01 00 01 a3 17 30 15 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 4c 8d 15 93 47 26 0f 59 2e 4e 7f d0 16 65 e4 8c c0 4c 73 17 07 9a 90 c1 52 27 b9 3e 56 8c 0c fa 9b 1c b8 90 a3 e4 2c 82 61 70 86 2d 8a c3 ca 45 14 b5 bb 55 00 ca 15 7c 0f 33 3f 19 08 37 e0 88 8e 53 e5 5a eb a5 78 eb 92 c8 89 95 7b c7 79 40 59 c7 4c 90 c2 c2 07 b9 68 80 5f 21 ff f4 b0 fd 83 ab 0f 97 e8 b0 f0 f3 80 d8 80 67 6a 9b 16 d3 26 af 4a 88 8e f2 a0 4b a6 72 b2 1c d6 5c c4 d5 00 03 b9 30 82 03 b5 30 82 03 1e a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 33 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 38 31 31 32 30 31 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1034) - Flags 0xc0 >SSL: TLS Message Length: 2039 >SSL: Need 1015 bytes more input data >SSL: Building ACK (type=25 id=2 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1025): 01 00 03 fd 01 03 03 fd 19 00 30 34 31 35 36 5a 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 97 8f 78 af a5 f4 70 a1 00 41 5b fa 62 28 19 69 f6 e5 f7 6a 1a 27 85 ca 8a 15 00 55 54 15 97 68 0b 2e 55 39 e4 b0 6b 76 55 86 84 53 7c 56 fc 74 52 da 73 a3 54 ae 74 47 64 9e 1f ff 1b 1e 3d 1c 8b c1 8d af 89 94 e9 0e d0 c9 56 83 52 c4 50 a9 24 81 10 3d 0a e7 7e 6e 7b 30 ae fd 1b 4d f8 96 87 3f 7d 72 2a cd fa 22 f9 cd 29 17 f4 da 15 eb de 6a de b3 e1 9d 2a c5 3b 3d ea 3c f6 a6 a6 71 02 03 01 00 01 a3 82 01 01 30 81 fe 30 1d 06 03 55 1d 0e 04 16 04 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f 30 81 ce 06 03 55 1d 23 04 81 c6 30 81 c3 80 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f a1 81 9f a4 81 9c 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 82 09 00 d9 c7 09 10 ab 9f 78 33 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 74 1a c9 c3 9b 7a a4 5a e4 16 4c d1 af 8e b6 95 20 80 ca 9e 5f 89 82 ba e7 99 63 da 67 b9 c0 7b 86 aa 51 3d 24 41 58 dd d9 2d e7 cb e6 6f 3a 8f 15 5e ca 21 5a f7 46 21 a3 bb b5 f6 9c d0 82 1b b5 f5 3d c9 ed 94 51 aa f2 ff ca 34 d0 48 05 2c 66 92 6f 50 c7 49 0e c4 2d 1d 19 a3 9c ca b9 f9 c0 b1 d0 17 b9 fe 80 90 d6 dd 2b 38 70 74 4e a7 53 99 3e bf cd 0e d4 79 bb 2f f5 8e ba 6c d1 69 16 03 01 01 0d 0c 00 01 09 00 40 c3 4a f6 2a e3 ab 87 b9 1c 92 96 23 c3 a2 11 50 ae 15 b2 0c de bc fb 0d 00 a3 98 83 d1 d1 c7 63 1d df 5f 35 06 a0 fa 4c 4e 01 3f 17 c1 05 aa 50 d0 3b 48 16 46 75 d5 37 8e 2c 82 9b 06 17 11 bb 00 01 02 00 40 7c 42 d0 01 e1 4b 85 e7 23 8a ab e4 b5 93 fe b1 07 c3 0e 59 e1 e8 33 dd a1 0e d6 a9 cc 27 5e c0 1d 60 d8 4e 43 ac 94 bc 0a 90 9a 60 b3 ae 01 85 96 46 05 d1 a5 d8 a7 6e f0 d1 29 f4 19 09 f2 11 00 80 1f c5 6a ee 80 e8 89 b1 e6 c2 87 b2 f0 47 ec 98 8a f3 24 51 00 af a8 dd d6 90 28 f9 79 80 47 fd fb ae 90 30 68 f3 c1 3b e8 de 6a 10 72 8d df c8 67 6e 38 f3 fd bc cc 50 90 39 14 2b 5d 66 a3 9e ab eb 39 09 14 e6 f4 6b 0c fb 3b 03 95 47 59 e3 c8 83 a3 99 b6 a1 39 e6 a8 0d 19 39 68 f6 b9 b7 b1 fb ae 3d 5b 45 18 ef a4 11 b6 f6 c4 fd fa 19 8e c7 85 d2 1f 5a 5f 97 4c c3 0b 5c 97 08 5d 59 16 03 01 00 04 0e 00 00 00 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1021) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server hello A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server certificate A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server done A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write change cipher spec A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write finished A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 flush data >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read finished A >SSL: SSL_connect - want more data >SSL: 134 bytes pending from ssl_out >SSL: 134 bytes left to be sent out (of total 134 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=144): 01 00 00 8c 02 03 00 8c 19 00 16 03 01 00 46 10 00 00 42 00 40 35 ed 8a 60 0e 93 0f 04 f1 f3 f8 4b 85 27 3a 7f 9a 1f 70 e5 25 5e d0 dd b8 f1 61 22 20 7e 0e d5 35 a5 1e 4c ed 76 a3 03 7f 9c 0e ad 49 11 d6 41 00 b2 4e 97 98 64 d7 99 8a f9 42 56 49 78 14 16 14 03 01 00 01 01 16 03 01 00 30 2b 93 41 88 d8 ba 60 80 8e f0 d8 13 9a d2 07 9c b8 ab 6b 0f 71 b5 58 d1 6e 63 01 05 1f dd a8 64 ee 38 8a 27 d5 ec dd 56 8d 71 08 38 0b 94 27 c8 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=69): 01 00 00 41 01 04 00 41 19 00 14 03 01 00 01 01 16 03 01 00 30 1c e0 6b 25 4a 66 3d 70 cd 57 cc aa a8 ab da d3 87 49 17 c8 6a 8d 75 4c 8c 91 12 4c e7 64 05 b0 13 8b 6e cf ce d0 29 be 1f e6 92 d2 3e 36 5a d4 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=65) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read finished A >SSL: (where=0x20 ret=0x1) >SSL: (where=0x1002 ret=0x1) >SSL: 0 bytes pending from ssl_out >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >SSL: No data to be sent out >EAP-PEAP: TLS done, proceed to Phase 2 >EAP-PEAP: using label 'client EAP encryption' in key derivation >EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] >EAP-PEAP: Workaround - allow outer EAP-Success to terminate PEAP resumption >SSL: Building ACK (type=25 id=4 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=COND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 05 00 2b 19 00 17 03 01 00 20 82 39 2b b6 ed a1 46 6b 0e 0e 30 3c 3d 64 15 43 43 7d 1a d5 9b 10 bb 35 ec fe 89 92 a2 02 5b 6e >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 05 00 05 01 >EAP-PEAP: received Phase 2: code=1 identifier=5 length=5 >EAP-PEAP: Phase 2 Request: type=1 >EAP: using real identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=10): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 05 00 50 19 00 17 03 01 00 20 0e 70 ea 19 3b 00 fb 43 0d 11 0b 09 2d 75 15 f9 4a af 81 aa 0d 40 d5 bc 81 8f f4 00 38 de 79 e4 17 03 01 00 20 51 de 2f d6 14 f8 db fa 23 d4 d4 e8 4c 15 dc af 2f 32 72 1d 43 8b 80 63 14 a8 70 19 b9 f9 0a d8 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=63): 01 00 00 3b 01 06 00 3b 19 00 17 03 01 00 30 df 5c 96 3d ca 7c 59 45 ce 34 da cd 57 ae af 01 e5 9e 26 c0 51 e3 ce 26 42 15 6d 5b 81 88 11 3a 9f e3 f0 69 51 82 23 e6 9d 5f 12 0b cc 52 ac 4a >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=59) - Flags 0x00 >EAP-PEAP: received 53 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=27): 1a 01 06 00 1a 10 88 5f 0f 6e d6 bd 0d a6 5a a7 e2 56 1e 93 fe 44 78 62 6f 74 6c >EAP-PEAP: received Phase 2: code=1 identifier=6 length=31 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 6 mschapv2_id 6 >EAP-MSCHAPV2: Received challenge >EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-MSCHAPV2: Generating Challenge Response >MSCHAPV2: Identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: Username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: auth_challenge - hexdump(len=16): 88 5f 0f 6e d6 bd 0d a6 5a a7 e2 56 1e 93 fe 44 >MSCHAPV2: peer_challenge - hexdump(len=16): 87 82 01 c5 c5 e3 05 4e cb 3d da 80 22 63 04 8e >MSCHAPV2: username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: password - hexdump_ascii(len=8): [REMOVED] >MSCHAPV2: NT Response - hexdump(len=24): b0 41 19 c7 52 37 d2 b9 a3 74 41 1a 1e e6 cb 92 d1 cf 60 e3 29 36 a8 5a >MSCHAPV2: Auth Response - hexdump(len=20): 5c cc 10 6e aa 8f c4 4d c6 11 4b df 5b 54 79 93 03 8f 3f 0b >MSCHAPV2: Master Key - hexdump(len=16): [REMOVED] >EAP-MSCHAPV2: TX identifier 6 mschapv2_id 6 (response) >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=64): [REMOVED] >SSL: 138 bytes left to be sent out (of total 138 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=148): 01 00 00 90 02 06 00 90 19 00 17 03 01 00 20 c7 82 aa 09 ad eb 29 7f 97 ee 22 d3 c9 57 47 92 c5 54 20 dd e8 66 75 5f 58 c9 81 2a fc ea 97 fa 17 03 01 00 60 48 a3 b5 8a 86 f1 7c 1a 1e 1e 07 b3 b7 ba a4 37 aa 2b 32 31 17 df 94 1e 5c bd c0 bc 76 04 de c4 d2 6a 47 04 92 47 d9 2f 3e 16 0c a6 66 7f 02 f5 c5 06 52 ce 48 84 e5 2b 38 b0 7d b0 e1 5d 50 a8 7e 36 67 4d 1e ea 1d ec 96 67 a4 86 52 6b dd d0 0f c7 c5 24 e6 8f 04 30 6f 45 59 8b 62 b5 7b 49 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=95): 01 00 00 5b 01 07 00 5b 19 00 17 03 01 00 50 63 58 a1 2d 86 c3 5c 70 67 7c af 45 af 65 51 52 d9 93 fb a2 f9 cb b0 8b 8a 41 3f 3f 57 0d e8 a1 e3 2c ef ef 49 92 ef 8f c7 2e 41 c6 2a 11 67 cc 4d 3b b5 b6 16 51 32 f7 dd f4 b3 5e 0b 86 21 ad 66 df 31 c4 75 12 60 74 db da 14 8f 67 d5 c0 2c >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=91) - Flags 0x00 >EAP-PEAP: received 85 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 06 00 2e 53 3d 35 43 43 43 31 30 36 45 41 41 38 46 43 34 34 44 43 36 31 31 34 42 44 46 35 42 35 34 37 39 39 33 30 33 38 46 33 46 30 42 >EAP-PEAP: received Phase 2: code=1 identifier=7 length=51 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 7 mschapv2_id 6 >EAP-MSCHAPV2: Received success >EAP-MSCHAPV2: Success message - hexdump_ascii(len=0): >EAP-MSCHAPV2: Authentication succeeded >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 07 00 50 19 00 17 03 01 00 20 3a 05 cb 7f c5 b1 fc da 1f dd 04 fd 16 53 16 63 dc 36 dd 26 c2 fe 54 24 30 cf a3 dc 1b f5 92 e6 17 03 01 00 20 9d ae 68 f9 a7 d7 0b 89 45 10 c0 ab 72 eb 9c 91 0c 28 42 57 38 36 1f 9a 8f c5 70 73 89 3c 47 69 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 08 00 2b 19 00 17 03 01 00 20 90 e2 90 74 82 ff 00 a4 e9 17 84 cc 9a 1c 22 50 a9 a0 b1 c0 cc 7d ca af 22 a8 64 ed cd d3 3c ad >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 08 00 0b 21 80 03 00 02 00 01 >EAP-PEAP: received Phase 2: code=1 identifier=8 length=11 >EAP-PEAP: Phase 2 Request: type=33 >EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01 >EAP-TLV: Result TLV - hexdump(len=2): 00 01 >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 08 00 50 19 00 17 03 01 00 20 5d 31 ff 7b 03 5f 3e 00 96 03 20 98 ca 7a f1 a1 c6 ed e7 cc a2 5c 00 af c1 10 d8 d5 6f 54 75 49 17 03 01 00 20 d0 b5 64 97 b5 a9 6b f6 64 31 e8 84 3d 09 1c 91 46 68 62 2c 70 65 99 5f 53 47 29 26 10 7f a5 9c >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=8): 01 00 00 04 03 08 00 04 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Success >EAP: EAP entering state SUCCESS >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state SUCCESS >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 40 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >EAPOL: Successfully fetched key (len=32) >WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED] >WPA: Renewed SNonce - hexdump(len=32): 3f 98 d6 6a f2 a3 2f 55 70 ac f8 fd 33 37 4f 17 ef aa e7 65 22 3f f7 d4 15 ed c1 db 12 0b 47 f6 >WPA: PTK derivation - A1=00:1d:e0:98:a5:dd A2=00:c0:49:1c:ec:d4 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 3f 98 d6 6a f2 a3 2f 55 70 ac f8 fd 33 37 4f 17 ef aa e7 65 22 3f f7 d4 15 ed c1 db 12 0b 47 f6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 be 0c 7c 37 78 b3 bc 67 3e bb 5a 2f f1 2a 7d 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 46 51 86 36 41 95 55 c6 c1 cf ec 97 13 d2 59 4b 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=121 > EAPOL-Key type=254 > key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) > key_length=32 key_data_length=26 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 40 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 46 51 86 36 41 95 55 c6 c1 cf ec 97 13 d2 59 4b >WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 46 51 86 36 41 95 55 c6 c1 cf ec 97 13 d2 59 4b 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 3 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >WPA: Sending EAPOL-Key 4/4 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7c 7e c6 55 8a 31 1a 20 2a d2 f2 27 ae a8 65 1b 00 00 >WPA: Installing PTK to the driver. >WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 >State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 42 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f5 02 6f 19 a5 c2 d2 5c a1 a0 70 84 f6 3d 73 d1 00 20 a8 52 05 f3 10 2a 81 d0 57 32 f2 33 24 77 f5 25 9a ec a8 18 0a 0c f4 01 28 b5 bd bd 41 13 c0 c5 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 42 > key_rsc - hexdump(len=8): 30 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): f5 02 6f 19 a5 c2 d2 5c a1 a0 70 84 f6 3d 73 d1 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 42 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f5 02 6f 19 a5 c2 d2 5c a1 a0 70 84 f6 3d 73 d1 00 20 a8 52 05 f3 10 2a 81 d0 57 32 f2 33 24 77 f5 25 9a ec a8 18 0a 0c f4 01 28 b5 bd bd 41 13 c0 c5 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 30 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 51 92 56 3c 1a 99 31 7c f6 07 14 e2 44 1d 50 c3 00 00 >WPA: Key negotiation completed with 00:c0:49:1c:ec:d4 [PTK=TKIP GTK=TKIP] >Cancelling scan request >Cancelling authentication timeout >Removed BSSID 00:c0:49:1c:ec:d4 from blacklist >State: GROUP_HANDSHAKE -> COMPLETED >CTRL-EVENT-CONNECTED - Connection to 00:c0:49:1c:ec:d4 completed (reauth) [id=0 id_str=] >wpa_driver_wext_set_operstate: operstate 0->1 (UP) >WEXT: Operstate: linkmode=-1, operstate=6 >EAPOL: External notification - portValid=1 >EAPOL: SUPP_PAE entering state AUTHENTICATED >EAPOL authentication completed successfully >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 43 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 76 58 11 dd 87 fa 74 cb 3d 19 d2 f7 e8 5f e5 f9 00 20 4b e9 1b 29 98 6d 79 60 9f c9 47 c7 d7 56 be 10 9f 81 fe 57 88 0c c4 f0 56 d8 87 4a 56 34 8f 7a >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 43 > key_rsc - hexdump(len=8): 30 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 76 58 11 dd 87 fa 74 cb 3d 19 d2 f7 e8 5f e5 f9 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 43 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 76 58 11 dd 87 fa 74 cb 3d 19 d2 f7 e8 5f e5 f9 00 20 4b e9 1b 29 98 6d 79 60 9f c9 47 c7 d7 56 be 10 9f 81 fe 57 88 0c c4 f0 56 d8 87 4a 56 34 8f 7a >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 30 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3e 50 f1 f6 d5 b9 3f 72 61 7f 92 08 a5 12 cb cf 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 44 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 c0 b3 0a 75 76 bd 29 06 b5 0e b2 60 78 46 89 00 20 98 3f ab 51 91 c4 33 39 ed a6 ea 7e 67 3d 21 4f 6d d1 1a 27 8b 45 b2 ef 8a 58 14 f4 1a e7 ac 6d >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 44 > key_rsc - hexdump(len=8): 34 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): b8 c0 b3 0a 75 76 bd 29 06 b5 0e b2 60 78 46 89 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 44 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 c0 b3 0a 75 76 bd 29 06 b5 0e b2 60 78 46 89 00 20 98 3f ab 51 91 c4 33 39 ed a6 ea 7e 67 3d 21 4f 6d d1 1a 27 8b 45 b2 ef 8a 58 14 f4 1a e7 ac 6d >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 34 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f3 f6 1c 4b 22 c5 eb 21 21 41 25 b8 5b 62 49 1c 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >Setting scan request: 0 sec 100000 usec >Added BSSID 00:c0:49:1c:ec:d4 into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: COMPLETED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >BSSID 00:00:00:00:00:00 blacklist count incremented to 11 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >Driver did not support SIOCSIWENCODEEXT >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=221 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00055353494431010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f201 RespIEs=010882848b0c1296182432043048606cdd180050f20201010000030f0000270f000052f75d0072732e00)' >Association info event >req_ies - hexdump(len=47): 00 05 53 53 49 44 31 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 00 00 03 0f 00 00 27 0f 00 00 52 f7 5d 00 72 73 2e 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:c0:49:1c:ec:d4 >State: SCANNING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:c0:49:1c:ec:d4 >No keys have been configured - skip key clearing >Associated with 00:c0:49:1c:ec:d4 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:c0:49:fd:9f:80 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - blacklisted >1: 00:c0:49:1c:ec:d4 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > selected based on WPA IE > selected WPA AP 00:c0:49:1c:ec:d4 ssid='NETWORKSID' >Try to find non-WPA AP >Already associated with the selected AP. >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=4): 01 01 00 00 >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=14): 01 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=5): > 68 65 6c 6c 6f hello >EAP: using anonymous identity - hexdump_ascii(len=9): > 61 6e 6f 6e 79 6d 6f 75 73 anonymous >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=18): 01 00 00 0e 02 00 00 0e 01 61 6e 6f 6e 79 6d 6f 75 73 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=10): 01 00 00 06 01 01 00 06 19 20 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=1 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Using previous method data for fast re-authentication >EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >EAP: EAP entering state METHOD >SSL: Received packet(len=6) - Flags 0x20 >EAP-PEAP: Start (server ver=0, own ver=0) >EAP-PEAP: Using PEAP version 0 >SSL: (where=0x10 ret=0x1) >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:before/connect initialization >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client hello A >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read server hello A >SSL: SSL_connect - want more data >SSL: 143 bytes pending from ssl_out >SSL: 143 bytes left to be sent out (of total 143 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=153): 01 00 00 95 02 01 00 95 19 00 16 03 01 00 8a 01 00 00 86 03 01 48 6d ed 5d b2 cc e2 6d a4 75 d9 c2 c4 5e 59 40 c6 bf 6f 90 4f 4d a8 fb 46 87 3c 4f 22 7d 86 21 20 96 fc 6a 25 f5 66 00 02 da c8 de ea 2e 24 68 42 fa 89 06 a8 96 34 64 4f 27 bb 2c e2 db ae 1b a2 00 38 00 39 00 38 00 35 00 88 00 87 00 84 00 16 00 13 00 0a 00 33 00 32 00 2f 00 9a 00 99 00 96 00 45 00 44 00 41 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 02 01 00 00 04 00 23 00 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1038): 01 00 04 0a 01 02 04 0a 19 c0 00 00 07 f7 16 03 01 00 4a 02 00 00 46 03 01 48 6d ed 97 15 a7 c6 c0 b4 4d 38 b2 9b 65 17 03 ad c3 10 23 11 69 5d 51 ea 34 19 31 c5 78 66 59 20 b3 68 0d 0d 3f 8e 47 01 09 23 05 e8 b7 0a 68 3b 92 78 7f 6e 04 a2 54 73 d9 31 1e 93 e1 ee a6 ec 00 39 00 16 03 01 06 88 0b 00 06 84 00 06 81 00 02 c2 30 82 02 be 30 82 02 27 a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 35 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 37 31 31 32 31 31 30 34 31 35 36 5a 30 81 8e 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 10 30 0e 06 03 55 04 03 13 07 52 4f 4f 54 20 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 e1 14 fe 0f 20 51 89 c1 68 0d 84 f7 15 45 0d 82 cf ce eb c4 57 3a dc 1e 8d 88 bd 0d 12 00 3a a2 8d 79 47 3e 3d a2 6e ab 68 a9 05 32 f3 e1 85 13 f9 a0 28 01 e0 4d df 2b 5c 99 fd d8 3f 62 75 f6 81 42 63 63 ef bc 67 8e 22 5e a2 f4 da d9 f1 40 71 26 11 3a 0a 73 2b 2f 18 db 20 98 5f c6 a1 fc d0 de 80 e0 c5 73 56 c4 9a 15 0c 0a 3b a7 89 bf 9b eb 63 13 06 01 83 83 be 7b 0a 74 af 7f 4a cf 02 03 01 00 01 a3 17 30 15 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 4c 8d 15 93 47 26 0f 59 2e 4e 7f d0 16 65 e4 8c c0 4c 73 17 07 9a 90 c1 52 27 b9 3e 56 8c 0c fa 9b 1c b8 90 a3 e4 2c 82 61 70 86 2d 8a c3 ca 45 14 b5 bb 55 00 ca 15 7c 0f 33 3f 19 08 37 e0 88 8e 53 e5 5a eb a5 78 eb 92 c8 89 95 7b c7 79 40 59 c7 4c 90 c2 c2 07 b9 68 80 5f 21 ff f4 b0 fd 83 ab 0f 97 e8 b0 f0 f3 80 d8 80 67 6a 9b 16 d3 26 af 4a 88 8e f2 a0 4b a6 72 b2 1c d6 5c c4 d5 00 03 b9 30 82 03 b5 30 82 03 1e a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 33 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 38 31 31 32 30 31 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1034) - Flags 0xc0 >SSL: TLS Message Length: 2039 >SSL: Need 1015 bytes more input data >SSL: Building ACK (type=25 id=2 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1025): 01 00 03 fd 01 03 03 fd 19 00 30 34 31 35 36 5a 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 97 8f 78 af a5 f4 70 a1 00 41 5b fa 62 28 19 69 f6 e5 f7 6a 1a 27 85 ca 8a 15 00 55 54 15 97 68 0b 2e 55 39 e4 b0 6b 76 55 86 84 53 7c 56 fc 74 52 da 73 a3 54 ae 74 47 64 9e 1f ff 1b 1e 3d 1c 8b c1 8d af 89 94 e9 0e d0 c9 56 83 52 c4 50 a9 24 81 10 3d 0a e7 7e 6e 7b 30 ae fd 1b 4d f8 96 87 3f 7d 72 2a cd fa 22 f9 cd 29 17 f4 da 15 eb de 6a de b3 e1 9d 2a c5 3b 3d ea 3c f6 a6 a6 71 02 03 01 00 01 a3 82 01 01 30 81 fe 30 1d 06 03 55 1d 0e 04 16 04 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f 30 81 ce 06 03 55 1d 23 04 81 c6 30 81 c3 80 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f a1 81 9f a4 81 9c 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 82 09 00 d9 c7 09 10 ab 9f 78 33 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 74 1a c9 c3 9b 7a a4 5a e4 16 4c d1 af 8e b6 95 20 80 ca 9e 5f 89 82 ba e7 99 63 da 67 b9 c0 7b 86 aa 51 3d 24 41 58 dd d9 2d e7 cb e6 6f 3a 8f 15 5e ca 21 5a f7 46 21 a3 bb b5 f6 9c d0 82 1b b5 f5 3d c9 ed 94 51 aa f2 ff ca 34 d0 48 05 2c 66 92 6f 50 c7 49 0e c4 2d 1d 19 a3 9c ca b9 f9 c0 b1 d0 17 b9 fe 80 90 d6 dd 2b 38 70 74 4e a7 53 99 3e bf cd 0e d4 79 bb 2f f5 8e ba 6c d1 69 16 03 01 01 0d 0c 00 01 09 00 40 c3 4a f6 2a e3 ab 87 b9 1c 92 96 23 c3 a2 11 50 ae 15 b2 0c de bc fb 0d 00 a3 98 83 d1 d1 c7 63 1d df 5f 35 06 a0 fa 4c 4e 01 3f 17 c1 05 aa 50 d0 3b 48 16 46 75 d5 37 8e 2c 82 9b 06 17 11 bb 00 01 02 00 40 b4 e9 07 71 c0 ab 2a 4c 7d ea 63 55 ca dc f0 7f be d8 8d 63 55 79 f8 34 af 5e c3 e7 77 48 e7 cb 64 e5 02 94 1b 6b 88 18 06 72 cd dd 77 8b 01 e5 28 01 67 ca 90 97 6c 1d ea 3a 06 13 cf a0 8c b6 00 80 b6 35 bb b7 c6 ae 8f 5e 46 68 00 d3 af 3d e7 95 34 dc 7a 0e 38 27 b3 44 94 5a 11 6d 9f b3 5d c8 f3 d1 84 99 db ba c2 23 3e 2e eb c6 01 84 9a 4f ef bb b9 18 0a 7f 56 b5 8f b3 af 85 8a 0e f3 10 b4 37 28 3f 7e 2c 07 27 8f 2c 06 42 3e c9 c4 2a 5d 4f 34 dc aa b6 39 e7 69 2d f3 25 da 90 92 ec a3 4a 5d f9 9b c4 37 4d 86 b5 9d 80 17 5f 62 6e f5 24 d6 4f 93 ae ed 5a e7 36 80 00 ce da 26 c7 16 03 01 00 04 0e 00 00 00 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1021) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server hello A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server certificate A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server done A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write change cipher spec A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write finished A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 flush data >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read finished A >SSL: SSL_connect - want more data >SSL: 134 bytes pending from ssl_out >SSL: 134 bytes left to be sent out (of total 134 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=144): 01 00 00 8c 02 03 00 8c 19 00 16 03 01 00 46 10 00 00 42 00 40 9a ee 9e 0c 4a 1f 5b 28 1f 61 67 f8 66 b0 66 2c 5d 2b ca 95 0e 2d ed 92 e9 53 1d bc 99 7c 7e db bd d1 0d 96 ab 4d d6 34 84 91 18 27 6d 62 4e 29 e3 80 7f 4c e7 2b 1d ad 47 69 d1 0e 5a af 7d 8a 14 03 01 00 01 01 16 03 01 00 30 ae d1 62 ca a4 0f 65 eb 7c ff d7 e4 27 59 2b 55 8f a0 a0 fe 22 2e 96 34 b8 04 0a 0d 1e bc 6b f7 40 aa b0 93 ab fc 3d 84 9f 2b 7b d8 67 a2 98 70 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=69): 01 00 00 41 01 04 00 41 19 00 14 03 01 00 01 01 16 03 01 00 30 f6 b7 06 f8 e1 b7 86 8e 0a ca 9c 18 78 d2 fa 08 cc d8 69 33 76 01 c3 93 08 ce 0c fe c3 a1 4d 52 9d d8 cb 03 9f 6a 07 87 83 0c f8 86 d6 1e ca 5d >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=65) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read finished A >SSL: (where=0x20 ret=0x1) >SSL: (where=0x1002 ret=0x1) >SSL: 0 bytes pending from ssl_out >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >SSL: No data to be sent out >EAP-PEAP: TLS done, proceed to Phase 2 >EAP-PEAP: using label 'client EAP encryption' in key derivation >EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] >EAP-PEAP: Workaround - allow outer EAP-Success to terminate PEAP resumption >SSL: Building ACK (type=25 id=4 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=COND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 05 00 2b 19 00 17 03 01 00 20 f8 69 ea 96 e5 b3 13 38 5a 4e 4f 3b ed f1 00 35 60 b4 ed b9 f1 5c 7b e1 99 d7 1c 36 bc 1c 90 9a >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 05 00 05 01 >EAP-PEAP: received Phase 2: code=1 identifier=5 length=5 >EAP-PEAP: Phase 2 Request: type=1 >EAP: using real identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=10): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 05 00 50 19 00 17 03 01 00 20 c6 48 b8 86 9b 5c fd 17 42 59 b4 1c 2e b9 41 9a 64 8e 8e d1 96 25 5f c5 5f d8 fe 94 12 c5 d6 b6 17 03 01 00 20 91 4a 66 25 33 54 32 4f 49 ff f7 1c 23 ea 06 8e d7 d1 30 1f cc 40 b9 a1 d2 01 d5 88 f9 b6 f5 dc >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=63): 01 00 00 3b 01 06 00 3b 19 00 17 03 01 00 30 25 d0 51 af 9e 64 44 1e d3 dd 67 46 78 ad 02 91 22 f8 6e 01 70 0f f2 b5 c5 cc ba 62 ae a6 13 bc f6 2e ea 42 bd a3 02 a3 96 b3 0f f1 cb 8c cc 1e >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=59) - Flags 0x00 >EAP-PEAP: received 53 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=27): 1a 01 06 00 1a 10 df fb b2 1b e8 8b 38 88 75 26 29 38 69 eb c2 21 78 62 6f 74 6c >EAP-PEAP: received Phase 2: code=1 identifier=6 length=31 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 6 mschapv2_id 6 >EAP-MSCHAPV2: Received challenge >EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-MSCHAPV2: Generating Challenge Response >MSCHAPV2: Identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: Username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: auth_challenge - hexdump(len=16): df fb b2 1b e8 8b 38 88 75 26 29 38 69 eb c2 21 >MSCHAPV2: peer_challenge - hexdump(len=16): 34 1b fb 5b 78 48 1e 22 22 dc ee 1b 3d 73 28 48 >MSCHAPV2: username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: password - hexdump_ascii(len=8): [REMOVED] >MSCHAPV2: NT Response - hexdump(len=24): 64 74 d7 5a b0 06 70 7a da 66 9d da 7a fd d9 2e 18 4f 64 ca 1b 64 9c 3c >MSCHAPV2: Auth Response - hexdump(len=20): f9 0b d4 4f e4 08 e8 84 c8 a8 27 84 bd 1d 0d 2b 99 33 d1 7f >MSCHAPV2: Master Key - hexdump(len=16): [REMOVED] >EAP-MSCHAPV2: TX identifier 6 mschapv2_id 6 (response) >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=64): [REMOVED] >SSL: 138 bytes left to be sent out (of total 138 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=148): 01 00 00 90 02 06 00 90 19 00 17 03 01 00 20 be 97 06 1f 4d e8 35 7c db 94 9b e1 c3 44 8a ba 8e e2 80 6f 42 28 b3 82 e3 11 d5 2d f9 68 88 34 17 03 01 00 60 41 31 11 3c c5 3d 5f 25 5b 5d 61 68 b7 f6 24 7e 13 14 05 e5 b7 46 0b fb 3b 75 ee 84 6f 41 1b ea b0 f1 a2 d2 c2 02 2f f4 bb f7 0f 3d e8 ef 54 59 ad d6 5f 60 12 d8 24 b0 df 1a 39 0c d2 c2 b8 fe bd 29 85 d4 8a ca 7a 68 81 d1 4a 5e 20 9b 75 46 9a d9 28 ab 56 89 0c 05 da e6 98 bb 0b f1 5c 87 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=95): 01 00 00 5b 01 07 00 5b 19 00 17 03 01 00 50 65 e5 b1 c0 2f cf 48 1e 5a 8a 61 e6 d6 dc 4c 32 58 39 49 6a 10 6f a0 d6 5a d1 21 dc ce b6 71 fa ac 07 62 23 32 9f 69 28 c6 87 a9 b9 b3 c9 bc 38 66 d8 e4 87 96 9e 64 61 3a c1 da bc 20 15 f3 ba 9c 7e c7 13 3f cf 5d e3 4b 7f 0c 13 c7 ca 49 03 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=91) - Flags 0x00 >EAP-PEAP: received 85 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 06 00 2e 53 3d 46 39 30 42 44 34 34 46 45 34 30 38 45 38 38 34 43 38 41 38 32 37 38 34 42 44 31 44 30 44 32 42 39 39 33 33 44 31 37 46 >EAP-PEAP: received Phase 2: code=1 identifier=7 length=51 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 7 mschapv2_id 6 >EAP-MSCHAPV2: Received success >EAP-MSCHAPV2: Success message - hexdump_ascii(len=0): >EAP-MSCHAPV2: Authentication succeeded >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 07 00 50 19 00 17 03 01 00 20 d2 38 8c 40 21 cc 4a f8 4d 31 5a f5 ec b5 b2 7a fc 59 b2 76 aa 74 65 2a 15 c0 39 c3 ac 59 01 60 17 03 01 00 20 df bc ff 09 e5 5c 83 72 07 56 b5 6c 52 bd f9 f0 2c 73 d9 48 2b 6e 33 77 45 58 51 98 66 97 34 6e >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 08 00 2b 19 00 17 03 01 00 20 8d 11 96 25 df f5 8c ea 2c ec 22 de a3 55 e4 13 3b f0 79 03 c8 3a c6 42 6e 6d 06 c2 a2 42 0c a1 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 08 00 0b 21 80 03 00 02 00 01 >EAP-PEAP: received Phase 2: code=1 identifier=8 length=11 >EAP-PEAP: Phase 2 Request: type=33 >EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01 >EAP-TLV: Result TLV - hexdump(len=2): 00 01 >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 08 00 50 19 00 17 03 01 00 20 f8 5b 8b 83 4c 5f 74 10 af f5 c5 82 d7 99 75 24 15 95 83 76 37 3b 4e 82 50 eb 4d 67 31 59 38 93 17 03 01 00 20 dd ce f5 4c d8 a8 c6 c8 76 ec 7b 17 ab f2 00 0c 0a fd bf 83 bb ce 8d fb 14 cb d1 82 fd 8d 7e 09 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=8): 01 00 00 04 03 08 00 04 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Success >EAP: EAP entering state SUCCESS >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state SUCCESS >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 46 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 46 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 46 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >EAPOL: Successfully fetched key (len=32) >WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED] >WPA: Renewed SNonce - hexdump(len=32): f7 52 f7 ec 38 81 1e 52 81 24 93 d6 b2 27 71 5c 42 fa f3 fd 00 5a a5 2e 71 a2 32 19 e9 0c 49 60 >WPA: PTK derivation - A1=00:1d:e0:98:a5:dd A2=00:c0:49:1c:ec:d4 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 f7 52 f7 ec 38 81 1e 52 81 24 93 d6 b2 27 71 5c 42 fa f3 fd 00 5a a5 2e 71 a2 32 19 e9 0c 49 60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 31 0f a0 4d 60 ad d4 81 36 ad 81 cb c3 45 e1 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 46 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 93 f2 fe 92 70 fe 75 18 11 9b df d9 a2 cd 14 df 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=121 > EAPOL-Key type=254 > key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) > key_length=32 key_data_length=26 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 46 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 93 f2 fe 92 70 fe 75 18 11 9b df d9 a2 cd 14 df >WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 46 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 93 f2 fe 92 70 fe 75 18 11 9b df d9 a2 cd 14 df 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 3 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >WPA: Sending EAPOL-Key 4/4 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f3 fc 21 75 db 83 27 5b 22 c8 ad 27 07 01 ed ff 00 00 >WPA: Installing PTK to the driver. >WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 >State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 48 3b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 73 63 cb bf 97 65 c5 31 31 7f 4c 88 d6 a9 73 b5 00 20 68 27 ca 36 16 2b b1 b3 91 3e 3a 16 9c c6 3b e5 47 cf 19 39 72 f1 34 bb d2 ea bb 62 d7 88 f9 48 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 48 > key_rsc - hexdump(len=8): 3b 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 73 63 cb bf 97 65 c5 31 31 7f 4c 88 d6 a9 73 b5 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 48 3b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 73 63 cb bf 97 65 c5 31 31 7f 4c 88 d6 a9 73 b5 00 20 68 27 ca 36 16 2b b1 b3 91 3e 3a 16 9c c6 3b e5 47 cf 19 39 72 f1 34 bb d2 ea bb 62 d7 88 f9 48 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 3b 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b2 5e a3 96 0b 30 b3 fd 10 5e 10 70 09 16 97 31 00 00 >WPA: Key negotiation completed with 00:c0:49:1c:ec:d4 [PTK=TKIP GTK=TKIP] >Cancelling scan request >Cancelling authentication timeout >Removed BSSID 00:c0:49:1c:ec:d4 from blacklist >State: GROUP_HANDSHAKE -> COMPLETED >CTRL-EVENT-CONNECTED - Connection to 00:c0:49:1c:ec:d4 completed (reauth) [id=0 id_str=] >wpa_driver_wext_set_operstate: operstate 0->1 (UP) >WEXT: Operstate: linkmode=-1, operstate=6 >EAPOL: External notification - portValid=1 >EAPOL: SUPP_PAE entering state AUTHENTICATED >EAPOL authentication completed successfully >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 49 3c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 06 72 69 68 b1 5a 2a 73 21 dc 77 1d b8 49 43 60 00 20 e8 e8 ef 37 d6 ba 99 af 5f aa a7 e6 93 b6 75 1c 22 b0 49 13 8e 18 1a 8b 13 ce f9 04 53 3c de f2 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 49 > key_rsc - hexdump(len=8): 3c 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 06 72 69 68 b1 5a 2a 73 21 dc 77 1d b8 49 43 60 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 49 3c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 06 72 69 68 b1 5a 2a 73 21 dc 77 1d b8 49 43 60 00 20 e8 e8 ef 37 d6 ba 99 af 5f aa a7 e6 93 b6 75 1c 22 b0 49 13 8e 18 1a 8b 13 ce f9 04 53 3c de f2 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 3c 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 14 b9 58 b6 ef ff 54 29 b6 6c 7f 2e 70 74 8e a7 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 4a 3c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 5b 45 8e 61 74 76 09 95 72 a2 65 f3 70 56 0d 00 20 12 b1 1d 6d 0a 79 82 2b e7 7c 09 b2 4f 01 2b f2 2b 07 8b c1 25 1e 42 db 48 a1 d3 e7 b9 aa 0e 34 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 4a > key_rsc - hexdump(len=8): 3c 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 02 5b 45 8e 61 74 76 09 95 72 a2 65 f3 70 56 0d >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 4a 3c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 5b 45 8e 61 74 76 09 95 72 a2 65 f3 70 56 0d 00 20 12 b1 1d 6d 0a 79 82 2b e7 7c 09 b2 4f 01 2b f2 2b 07 8b c1 25 1e 42 db 48 a1 d3 e7 b9 aa 0e 34 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 3c 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 34 40 62 3d 5e ea 71 ce 40 2b 25 a2 76 5a e9 d0 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >Setting scan request: 0 sec 100000 usec >Added BSSID 00:c0:49:1c:ec:d4 into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: COMPLETED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >BSSID 00:00:00:00:00:00 blacklist count incremented to 12 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >Driver did not support SIOCSIWENCODEEXT >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >State: DISCONNECTED -> SCANNING >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=5): > 53 53 49 44 31 NETWORKSID >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=221 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00055353494431010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f201 RespIEs=010882848b0c1296182432043048606cdd180050f20201010000030f0000270f000052f75d0072732e00)' >Association info event >req_ies - hexdump(len=47): 00 05 53 53 49 44 31 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 00 00 03 0f 00 00 27 0f 00 00 52 f7 5d 00 72 73 2e 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:c0:49:1c:ec:d4 >State: SCANNING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:c0:49:1c:ec:d4 >No keys have been configured - skip key clearing >Associated with 00:c0:49:1c:ec:d4 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:c0:49:fd:9f:80 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - blacklisted >1: 00:c0:49:1c:ec:d4 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > selected based on WPA IE > selected WPA AP 00:c0:49:1c:ec:d4 ssid='NETWORKSID' >Try to find non-WPA AP >Already associated with the selected AP. >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=4): 01 01 00 00 >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=14): 01 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=5): > 68 65 6c 6c 6f hello >EAP: using anonymous identity - hexdump_ascii(len=9): > 61 6e 6f 6e 79 6d 6f 75 73 anonymous >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=18): 01 00 00 0e 02 00 00 0e 01 61 6e 6f 6e 79 6d 6f 75 73 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=10): 01 00 00 06 01 01 00 06 19 20 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=1 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Using previous method data for fast re-authentication >EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >EAP: EAP entering state METHOD >SSL: Received packet(len=6) - Flags 0x20 >EAP-PEAP: Start (server ver=0, own ver=0) >EAP-PEAP: Using PEAP version 0 >SSL: (where=0x10 ret=0x1) >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:before/connect initialization >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client hello A >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read server hello A >SSL: SSL_connect - want more data >SSL: 143 bytes pending from ssl_out >SSL: 143 bytes left to be sent out (of total 143 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=153): 01 00 00 95 02 01 00 95 19 00 16 03 01 00 8a 01 00 00 86 03 01 48 6d ed 64 c7 91 45 86 de 9e a3 81 b6 d6 6f c3 bd 77 91 44 84 3d 2b 2a 61 6f 69 56 c3 1e 1c 63 20 b3 68 0d 0d 3f 8e 47 01 09 23 05 e8 b7 0a 68 3b 92 78 7f 6e 04 a2 54 73 d9 31 1e 93 e1 ee a6 ec 00 38 00 39 00 38 00 35 00 88 00 87 00 84 00 16 00 13 00 0a 00 33 00 32 00 2f 00 9a 00 99 00 96 00 45 00 44 00 41 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 02 01 00 00 04 00 23 00 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1038): 01 00 04 0a 01 02 04 0a 19 c0 00 00 07 f7 16 03 01 00 4a 02 00 00 46 03 01 48 6d ed 9e 9d f4 5b e0 98 bd fd 7b b8 2c 41 ed 4a 9c fe 1c b8 c3 c4 ac 69 40 00 da bc 5a 8c c1 20 15 d3 14 96 cd 3c d9 97 38 02 0b 29 f6 57 d9 be d3 94 81 bd 32 0f 93 29 7c 14 67 e1 52 7e f2 83 00 39 00 16 03 01 06 88 0b 00 06 84 00 06 81 00 02 c2 30 82 02 be 30 82 02 27 a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 35 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 37 31 31 32 31 31 30 34 31 35 36 5a 30 81 8e 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 10 30 0e 06 03 55 04 03 13 07 52 4f 4f 54 20 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 e1 14 fe 0f 20 51 89 c1 68 0d 84 f7 15 45 0d 82 cf ce eb c4 57 3a dc 1e 8d 88 bd 0d 12 00 3a a2 8d 79 47 3e 3d a2 6e ab 68 a9 05 32 f3 e1 85 13 f9 a0 28 01 e0 4d df 2b 5c 99 fd d8 3f 62 75 f6 81 42 63 63 ef bc 67 8e 22 5e a2 f4 da d9 f1 40 71 26 11 3a 0a 73 2b 2f 18 db 20 98 5f c6 a1 fc d0 de 80 e0 c5 73 56 c4 9a 15 0c 0a 3b a7 89 bf 9b eb 63 13 06 01 83 83 be 7b 0a 74 af 7f 4a cf 02 03 01 00 01 a3 17 30 15 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 4c 8d 15 93 47 26 0f 59 2e 4e 7f d0 16 65 e4 8c c0 4c 73 17 07 9a 90 c1 52 27 b9 3e 56 8c 0c fa 9b 1c b8 90 a3 e4 2c 82 61 70 86 2d 8a c3 ca 45 14 b5 bb 55 00 ca 15 7c 0f 33 3f 19 08 37 e0 88 8e 53 e5 5a eb a5 78 eb 92 c8 89 95 7b c7 79 40 59 c7 4c 90 c2 c2 07 b9 68 80 5f 21 ff f4 b0 fd 83 ab 0f 97 e8 b0 f0 f3 80 d8 80 67 6a 9b 16 d3 26 af 4a 88 8e f2 a0 4b a6 72 b2 1c d6 5c c4 d5 00 03 b9 30 82 03 b5 30 82 03 1e a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 33 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 38 31 31 32 30 31 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1034) - Flags 0xc0 >SSL: TLS Message Length: 2039 >SSL: Need 1015 bytes more input data >SSL: Building ACK (type=25 id=2 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1025): 01 00 03 fd 01 03 03 fd 19 00 30 34 31 35 36 5a 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 97 8f 78 af a5 f4 70 a1 00 41 5b fa 62 28 19 69 f6 e5 f7 6a 1a 27 85 ca 8a 15 00 55 54 15 97 68 0b 2e 55 39 e4 b0 6b 76 55 86 84 53 7c 56 fc 74 52 da 73 a3 54 ae 74 47 64 9e 1f ff 1b 1e 3d 1c 8b c1 8d af 89 94 e9 0e d0 c9 56 83 52 c4 50 a9 24 81 10 3d 0a e7 7e 6e 7b 30 ae fd 1b 4d f8 96 87 3f 7d 72 2a cd fa 22 f9 cd 29 17 f4 da 15 eb de 6a de b3 e1 9d 2a c5 3b 3d ea 3c f6 a6 a6 71 02 03 01 00 01 a3 82 01 01 30 81 fe 30 1d 06 03 55 1d 0e 04 16 04 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f 30 81 ce 06 03 55 1d 23 04 81 c6 30 81 c3 80 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f a1 81 9f a4 81 9c 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 82 09 00 d9 c7 09 10 ab 9f 78 33 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 74 1a c9 c3 9b 7a a4 5a e4 16 4c d1 af 8e b6 95 20 80 ca 9e 5f 89 82 ba e7 99 63 da 67 b9 c0 7b 86 aa 51 3d 24 41 58 dd d9 2d e7 cb e6 6f 3a 8f 15 5e ca 21 5a f7 46 21 a3 bb b5 f6 9c d0 82 1b b5 f5 3d c9 ed 94 51 aa f2 ff ca 34 d0 48 05 2c 66 92 6f 50 c7 49 0e c4 2d 1d 19 a3 9c ca b9 f9 c0 b1 d0 17 b9 fe 80 90 d6 dd 2b 38 70 74 4e a7 53 99 3e bf cd 0e d4 79 bb 2f f5 8e ba 6c d1 69 16 03 01 01 0d 0c 00 01 09 00 40 c3 4a f6 2a e3 ab 87 b9 1c 92 96 23 c3 a2 11 50 ae 15 b2 0c de bc fb 0d 00 a3 98 83 d1 d1 c7 63 1d df 5f 35 06 a0 fa 4c 4e 01 3f 17 c1 05 aa 50 d0 3b 48 16 46 75 d5 37 8e 2c 82 9b 06 17 11 bb 00 01 02 00 40 24 23 e9 5a 0b d1 1d 47 4a 87 4c 04 7d e2 dc 35 73 aa 12 eb 21 26 97 a6 3e ae f5 34 94 55 06 4a 55 7c 72 1d af 20 ea 54 8b af 60 7d 24 46 7c a1 87 fa 98 47 27 8a ce 85 59 60 05 0f 65 b3 7f 3d 00 80 8b c5 b7 ab f2 b1 69 e6 e2 18 8a 00 07 57 d5 66 32 5e a0 69 a8 9d 7c 36 68 87 38 30 ca 3b 8d b3 fe ed 34 53 73 0b c4 f6 bb e1 2f 7e 3c 33 2e 5b 58 80 ba ef d8 5f 4f 44 9b d7 91 9a ec 8b 92 c3 69 80 15 8e 91 22 29 51 a6 d0 e2 ca be 02 dd 4a 92 9f b5 8d 69 6c 2d 9c fe 37 f7 fc 3f 87 4a dc 89 55 3b 3a 69 b8 38 97 bc 73 53 eb ab d2 78 31 60 b8 65 01 39 a0 de 11 ee da 7d 67 da b0 f1 37 16 03 01 00 04 0e 00 00 00 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1021) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server hello A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server certificate A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server done A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write change cipher spec A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write finished A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 flush data >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read finished A >SSL: SSL_connect - want more data >SSL: 134 bytes pending from ssl_out >SSL: 134 bytes left to be sent out (of total 134 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=144): 01 00 00 8c 02 03 00 8c 19 00 16 03 01 00 46 10 00 00 42 00 40 61 ef 8e 40 f8 80 2c 89 10 a2 ff bd 25 13 dd f9 8a f9 16 36 6b c8 2f de 12 fd 4c 3c 4a 1b 4a e1 ca 0c 10 f3 3d b5 9d b1 58 b0 0a 6a 7f d5 50 90 16 db 08 82 4a 35 3c 1a 1e 9e 29 b7 1f 40 a5 8c 14 03 01 00 01 01 16 03 01 00 30 75 2d aa 15 46 ab 08 21 9d 26 9b eb a7 23 f1 74 72 91 f9 ae c7 02 17 34 5e cf ac 66 99 a9 fe 0a ab 6f 28 91 6f 2b 32 75 92 81 e5 5b 45 81 03 31 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=69): 01 00 00 41 01 04 00 41 19 00 14 03 01 00 01 01 16 03 01 00 30 40 fa d5 86 9c eb ca 4b 02 7b b8 5e de 9d ac 41 92 d1 03 5f 6c 52 c6 cf 2b b7 42 73 b1 26 c8 bc 9d f1 2a 8b 94 83 cf 66 fc 4e 3d 5b 7b d3 27 eb >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=65) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read finished A >SSL: (where=0x20 ret=0x1) >SSL: (where=0x1002 ret=0x1) >SSL: 0 bytes pending from ssl_out >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >SSL: No data to be sent out >EAP-PEAP: TLS done, proceed to Phase 2 >EAP-PEAP: using label 'client EAP encryption' in key derivation >EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] >EAP-PEAP: Workaround - allow outer EAP-Success to terminate PEAP resumption >SSL: Building ACK (type=25 id=4 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=COND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 05 00 2b 19 00 17 03 01 00 20 d2 62 6d 12 88 c9 7f 1f 33 32 6c 1a c4 39 a1 00 56 1a 0d bb ba fb f4 ce 01 4b 3d 9e e8 f2 3c c4 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 05 00 05 01 >EAP-PEAP: received Phase 2: code=1 identifier=5 length=5 >EAP-PEAP: Phase 2 Request: type=1 >EAP: using real identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=10): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 05 00 50 19 00 17 03 01 00 20 00 99 fc fd 5f 2c fa 5d 75 b4 38 86 8b 2c a9 ab b4 74 1b 61 7d a3 60 d5 f4 d5 9f fb ea aa 10 89 17 03 01 00 20 be 64 bd af a0 0a 65 43 bb fd f3 e3 12 bf 8d f8 4a 4a d6 fd 5e d4 28 e7 81 65 a5 7b 4c be 92 f9 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=63): 01 00 00 3b 01 06 00 3b 19 00 17 03 01 00 30 47 e6 17 0c 93 fd eb f4 86 14 9a 19 13 7d d3 13 e5 f3 c7 a0 e7 bc 63 f1 07 5f 7f e4 92 f5 a3 31 00 ab 41 e6 72 ca e0 5a da 0f 65 a2 69 dc 4f 76 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=59) - Flags 0x00 >EAP-PEAP: received 53 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=27): 1a 01 06 00 1a 10 7f 33 2f 3d 5c bf 95 ee 7b dc b7 3a ee 5a b8 aa 78 62 6f 74 6c >EAP-PEAP: received Phase 2: code=1 identifier=6 length=31 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 6 mschapv2_id 6 >EAP-MSCHAPV2: Received challenge >EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-MSCHAPV2: Generating Challenge Response >MSCHAPV2: Identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: Username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: auth_challenge - hexdump(len=16): 7f 33 2f 3d 5c bf 95 ee 7b dc b7 3a ee 5a b8 aa >MSCHAPV2: peer_challenge - hexdump(len=16): 26 5e dc e4 f6 0e 0b 14 59 09 1c 60 88 5e 03 d7 >MSCHAPV2: username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: password - hexdump_ascii(len=8): [REMOVED] >MSCHAPV2: NT Response - hexdump(len=24): 49 0e 1f d6 95 5c 43 5c 30 f6 57 9c 49 d5 03 8d 74 e8 5b 8b 91 a7 6f 76 >MSCHAPV2: Auth Response - hexdump(len=20): 45 eb e8 05 15 e0 56 34 a6 bc 12 18 85 b4 f6 5a b5 8b cb 0a >MSCHAPV2: Master Key - hexdump(len=16): [REMOVED] >EAP-MSCHAPV2: TX identifier 6 mschapv2_id 6 (response) >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=64): [REMOVED] >SSL: 138 bytes left to be sent out (of total 138 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=148): 01 00 00 90 02 06 00 90 19 00 17 03 01 00 20 af dd 7a 16 53 57 df 28 00 c5 16 c4 b7 29 91 18 d4 62 8c 9c 93 d8 b8 cc c1 56 00 58 0b 1b 79 3f 17 03 01 00 60 3e 3a 27 07 fb a8 15 8b dd 39 e3 e6 19 54 13 e3 4b d9 9d ae f9 a2 b5 93 3f 08 de 79 34 e7 f6 1c a7 53 d2 33 82 af 42 e9 f1 a0 eb 8a 43 73 a2 be 3b 37 87 1c ba 45 82 71 8c 7a f4 11 6e c8 c0 94 6b fb 80 5e 6f cf 62 fc 8c bd 46 11 31 7e 23 1b fb a6 64 12 26 b9 0a bd c4 f8 65 af ed a4 50 14 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=95): 01 00 00 5b 01 07 00 5b 19 00 17 03 01 00 50 1c ef 0e 8d 18 19 b2 39 a9 b4 aa 1d d3 98 be cd 88 bd af a5 86 f8 dc c7 e7 df 76 31 f7 0f b0 8a c6 d9 3b 79 58 8b 82 f6 56 a5 9e 6f d8 28 c9 d0 54 b2 84 c3 c3 ef de 72 0e 95 c5 61 b1 da 40 2d d5 69 1d de a3 fc 40 9d 2c 3e 8e b5 1f 53 09 ba >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=91) - Flags 0x00 >EAP-PEAP: received 85 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 06 00 2e 53 3d 34 35 45 42 45 38 30 35 31 35 45 30 35 36 33 34 41 36 42 43 31 32 31 38 38 35 42 34 46 36 35 41 42 35 38 42 43 42 30 41 >EAP-PEAP: received Phase 2: code=1 identifier=7 length=51 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 7 mschapv2_id 6 >EAP-MSCHAPV2: Received success >EAP-MSCHAPV2: Success message - hexdump_ascii(len=0): >EAP-MSCHAPV2: Authentication succeeded >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 07 00 50 19 00 17 03 01 00 20 d1 50 8f f8 ff 0b 33 1c 2d 44 e1 18 f5 0c 8b 54 c2 98 ec 5b 2a 2e 75 f6 fb 38 2f 5f f3 a1 07 c8 17 03 01 00 20 cd 03 cd b8 3c 2b eb ca 3b 97 ae 56 06 f6 2b 03 2d 66 3e 49 19 8b 55 b2 c3 56 30 9f 89 9c 01 46 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 08 00 2b 19 00 17 03 01 00 20 96 01 96 98 b3 c9 e5 80 ae 5f 8e 83 df 78 34 ad bc 45 78 16 c6 e8 4e 0a 6d f1 71 de 82 55 a4 03 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 08 00 0b 21 80 03 00 02 00 01 >EAP-PEAP: received Phase 2: code=1 identifier=8 length=11 >EAP-PEAP: Phase 2 Request: type=33 >EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01 >EAP-TLV: Result TLV - hexdump(len=2): 00 01 >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 08 00 50 19 00 17 03 01 00 20 be c4 03 5a 85 0c b5 5b 56 b0 f2 23 61 e8 c6 32 d6 b6 30 d2 bd b1 17 a3 f8 b4 32 14 35 03 31 ee 17 03 01 00 20 84 6b 94 90 99 d0 81 77 d3 58 b2 2c ba b6 5e e6 e5 fe 0b 37 de c8 9a e8 07 c5 48 78 45 2c 49 15 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=8): 01 00 00 04 03 08 00 04 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Success >EAP: EAP entering state SUCCESS >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state SUCCESS >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 4d > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >EAPOL: Successfully fetched key (len=32) >WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED] >WPA: Renewed SNonce - hexdump(len=32): 49 4d b5 aa e6 d4 35 40 71 ac ec cd 45 c1 74 e1 5e a8 2d 1a 93 78 02 f2 86 b1 9c 6c 80 8b 73 f0 >WPA: PTK derivation - A1=00:1d:e0:98:a5:dd A2=00:c0:49:1c:ec:d4 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 49 4d b5 aa e6 d4 35 40 71 ac ec cd 45 c1 74 e1 5e a8 2d 1a 93 78 02 f2 86 b1 9c 6c 80 8b 73 f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4d db b9 b8 7c 71 e2 9d be 9e 34 0b 45 17 ea 9b 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ae 38 41 98 41 3a d7 22 e4 49 89 58 d6 95 8d dc 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=121 > EAPOL-Key type=254 > key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) > key_length=32 key_data_length=26 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 4d > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): ae 38 41 98 41 3a d7 22 e4 49 89 58 d6 95 8d dc >WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ae 38 41 98 41 3a d7 22 e4 49 89 58 d6 95 8d dc 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 3 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >WPA: Sending EAPOL-Key 4/4 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7b 49 f4 ca 4e 75 f6 3f 5e 30 81 d0 a6 73 d1 01 00 00 >WPA: Installing PTK to the driver. >WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 >State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 4f 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ad 47 83 c9 d2 c8 80 1c 91 f9 3a 38 cf 75 26 98 00 20 b9 9f 38 17 9b c5 86 51 5d 95 13 a3 a7 55 8e 40 ca 44 62 b4 9a 29 e1 3e bf 7a 95 4e 85 41 27 71 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 4f > key_rsc - hexdump(len=8): 42 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): ad 47 83 c9 d2 c8 80 1c 91 f9 3a 38 cf 75 26 98 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 4f 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ad 47 83 c9 d2 c8 80 1c 91 f9 3a 38 cf 75 26 98 00 20 b9 9f 38 17 9b c5 86 51 5d 95 13 a3 a7 55 8e 40 ca 44 62 b4 9a 29 e1 3e bf 7a 95 4e 85 41 27 71 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 42 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e4 12 76 bd 80 55 d8 32 8d 24 21 5b b4 6f 36 dd 00 00 >WPA: Key negotiation completed with 00:c0:49:1c:ec:d4 [PTK=TKIP GTK=TKIP] >Cancelling scan request >Cancelling authentication timeout >Removed BSSID 00:c0:49:1c:ec:d4 from blacklist >State: GROUP_HANDSHAKE -> COMPLETED >CTRL-EVENT-CONNECTED - Connection to 00:c0:49:1c:ec:d4 completed (reauth) [id=0 id_str=] >wpa_driver_wext_set_operstate: operstate 0->1 (UP) >WEXT: Operstate: linkmode=-1, operstate=6 >EAPOL: External notification - portValid=1 >EAPOL: SUPP_PAE entering state AUTHENTICATED >EAPOL authentication completed successfully >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 50 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 91 ba f7 a5 5f c9 2b 71 83 a0 1f ff 8a d5 ce 9e 00 20 e2 36 ab b2 ee 94 10 2f 2c 48 20 b0 a7 e5 0f 33 c7 ce ed 3e e6 1d 75 fd ad c6 c2 d7 c5 2e 07 60 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 50 > key_rsc - hexdump(len=8): 42 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 91 ba f7 a5 5f c9 2b 71 83 a0 1f ff 8a d5 ce 9e >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 50 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 91 ba f7 a5 5f c9 2b 71 83 a0 1f ff 8a d5 ce 9e 00 20 e2 36 ab b2 ee 94 10 2f 2c 48 20 b0 a7 e5 0f 33 c7 ce ed 3e e6 1d 75 fd ad c6 c2 d7 c5 2e 07 60 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 42 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 25 7f 0f 52 30 78 40 d0 d9 d8 52 bc 5a 1c 09 2e 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 51 43 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7b 3e 3e e5 d3 1f 80 55 d1 68 44 69 1f fc 9f 42 00 20 ee ff c8 73 2b 0d d2 ce fc 23 86 af af d2 07 95 3f 5b 5e 35 57 1a df ec 34 bc 46 83 c3 3a 76 5b >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 51 > key_rsc - hexdump(len=8): 43 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 7b 3e 3e e5 d3 1f 80 55 d1 68 44 69 1f fc 9f 42 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 51 43 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7b 3e 3e e5 d3 1f 80 55 d1 68 44 69 1f fc 9f 42 00 20 ee ff c8 73 2b 0d d2 ce fc 23 86 af af d2 07 95 3f 5b 5e 35 57 1a df ec 34 bc 46 83 c3 3a 76 5b >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 43 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e6 72 74 25 34 67 8c c8 eb 2f 8e ce 09 2f 4b b0 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >Setting scan request: 0 sec 100000 usec >Added BSSID 00:c0:49:1c:ec:d4 into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: COMPLETED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >BSSID 00:00:00:00:00:00 blacklist count incremented to 13 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >Driver did not support SIOCSIWENCODEEXT >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=221 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00055353494431010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f201 RespIEs=010882848b0c1296182432043048606cdd180050f20201010000030f0000270f000052f75d0072732e00)' >Association info event >req_ies - hexdump(len=47): 00 05 53 53 49 44 31 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 00 00 03 0f 00 00 27 0f 00 00 52 f7 5d 00 72 73 2e 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=14): 01 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f >EAPOL: Received EAP-Packet frame >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:c0:49:1c:ec:d4 >State: SCANNING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:c0:49:1c:ec:d4 >No keys have been configured - skip key clearing >Associated with 00:c0:49:1c:ec:d4 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:c0:49:fd:9f:80 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - blacklisted >1: 00:c0:49:1c:ec:d4 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > selected based on WPA IE > selected WPA AP 00:c0:49:1c:ec:d4 ssid='NETWORKSID' >Try to find non-WPA AP >Already associated with the selected AP. >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=4): 01 01 00 00 >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=14): 01 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=5): > 68 65 6c 6c 6f hello >EAP: using anonymous identity - hexdump_ascii(len=9): > 61 6e 6f 6e 79 6d 6f 75 73 anonymous >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=18): 01 00 00 0e 02 00 00 0e 01 61 6e 6f 6e 79 6d 6f 75 73 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=10): 01 00 00 06 01 01 00 06 19 20 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=1 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Using previous method data for fast re-authentication >EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >EAP: EAP entering state METHOD >SSL: Received packet(len=6) - Flags 0x20 >EAP-PEAP: Start (server ver=0, own ver=0) >EAP-PEAP: Using PEAP version 0 >SSL: (where=0x10 ret=0x1) >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:before/connect initialization >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client hello A >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read server hello A >SSL: SSL_connect - want more data >SSL: 143 bytes pending from ssl_out >SSL: 143 bytes left to be sent out (of total 143 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=153): 01 00 00 95 02 01 00 95 19 00 16 03 01 00 8a 01 00 00 86 03 01 48 6d ed 6b 51 50 56 26 09 45 d6 a4 50 2d 02 71 d9 25 70 e6 eb c2 9d 3d 2d 17 de 53 22 e8 d5 d7 20 15 d3 14 96 cd 3c d9 97 38 02 0b 29 f6 57 d9 be d3 94 81 bd 32 0f 93 29 7c 14 67 e1 52 7e f2 83 00 38 00 39 00 38 00 35 00 88 00 87 00 84 00 16 00 13 00 0a 00 33 00 32 00 2f 00 9a 00 99 00 96 00 45 00 44 00 41 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 02 01 00 00 04 00 23 00 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1038): 01 00 04 0a 01 02 04 0a 19 c0 00 00 07 f7 16 03 01 00 4a 02 00 00 46 03 01 48 6d ed a5 29 0b f3 14 28 f3 02 7f 97 6f 6b c8 b8 8c 37 cf a7 a9 55 8c 8f 66 87 bc 61 8a ee b8 20 d2 a3 9d 95 e5 df 3f f3 95 61 a8 25 4f f4 02 75 7d 2f 3b 07 78 4c aa 1f 23 58 a0 0b 13 03 bf 94 00 39 00 16 03 01 06 88 0b 00 06 84 00 06 81 00 02 c2 30 82 02 be 30 82 02 27 a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 35 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 37 31 31 32 31 31 30 34 31 35 36 5a 30 81 8e 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 10 30 0e 06 03 55 04 03 13 07 52 4f 4f 54 20 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 e1 14 fe 0f 20 51 89 c1 68 0d 84 f7 15 45 0d 82 cf ce eb c4 57 3a dc 1e 8d 88 bd 0d 12 00 3a a2 8d 79 47 3e 3d a2 6e ab 68 a9 05 32 f3 e1 85 13 f9 a0 28 01 e0 4d df 2b 5c 99 fd d8 3f 62 75 f6 81 42 63 63 ef bc 67 8e 22 5e a2 f4 da d9 f1 40 71 26 11 3a 0a 73 2b 2f 18 db 20 98 5f c6 a1 fc d0 de 80 e0 c5 73 56 c4 9a 15 0c 0a 3b a7 89 bf 9b eb 63 13 06 01 83 83 be 7b 0a 74 af 7f 4a cf 02 03 01 00 01 a3 17 30 15 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 4c 8d 15 93 47 26 0f 59 2e 4e 7f d0 16 65 e4 8c c0 4c 73 17 07 9a 90 c1 52 27 b9 3e 56 8c 0c fa 9b 1c b8 90 a3 e4 2c 82 61 70 86 2d 8a c3 ca 45 14 b5 bb 55 00 ca 15 7c 0f 33 3f 19 08 37 e0 88 8e 53 e5 5a eb a5 78 eb 92 c8 89 95 7b c7 79 40 59 c7 4c 90 c2 c2 07 b9 68 80 5f 21 ff f4 b0 fd 83 ab 0f 97 e8 b0 f0 f3 80 d8 80 67 6a 9b 16 d3 26 af 4a 88 8e f2 a0 4b a6 72 b2 1c d6 5c c4 d5 00 03 b9 30 82 03 b5 30 82 03 1e a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 33 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 38 31 31 32 30 31 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1034) - Flags 0xc0 >SSL: TLS Message Length: 2039 >SSL: Need 1015 bytes more input data >SSL: Building ACK (type=25 id=2 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1025): 01 00 03 fd 01 03 03 fd 19 00 30 34 31 35 36 5a 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 97 8f 78 af a5 f4 70 a1 00 41 5b fa 62 28 19 69 f6 e5 f7 6a 1a 27 85 ca 8a 15 00 55 54 15 97 68 0b 2e 55 39 e4 b0 6b 76 55 86 84 53 7c 56 fc 74 52 da 73 a3 54 ae 74 47 64 9e 1f ff 1b 1e 3d 1c 8b c1 8d af 89 94 e9 0e d0 c9 56 83 52 c4 50 a9 24 81 10 3d 0a e7 7e 6e 7b 30 ae fd 1b 4d f8 96 87 3f 7d 72 2a cd fa 22 f9 cd 29 17 f4 da 15 eb de 6a de b3 e1 9d 2a c5 3b 3d ea 3c f6 a6 a6 71 02 03 01 00 01 a3 82 01 01 30 81 fe 30 1d 06 03 55 1d 0e 04 16 04 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f 30 81 ce 06 03 55 1d 23 04 81 c6 30 81 c3 80 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f a1 81 9f a4 81 9c 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 82 09 00 d9 c7 09 10 ab 9f 78 33 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 74 1a c9 c3 9b 7a a4 5a e4 16 4c d1 af 8e b6 95 20 80 ca 9e 5f 89 82 ba e7 99 63 da 67 b9 c0 7b 86 aa 51 3d 24 41 58 dd d9 2d e7 cb e6 6f 3a 8f 15 5e ca 21 5a f7 46 21 a3 bb b5 f6 9c d0 82 1b b5 f5 3d c9 ed 94 51 aa f2 ff ca 34 d0 48 05 2c 66 92 6f 50 c7 49 0e c4 2d 1d 19 a3 9c ca b9 f9 c0 b1 d0 17 b9 fe 80 90 d6 dd 2b 38 70 74 4e a7 53 99 3e bf cd 0e d4 79 bb 2f f5 8e ba 6c d1 69 16 03 01 01 0d 0c 00 01 09 00 40 c3 4a f6 2a e3 ab 87 b9 1c 92 96 23 c3 a2 11 50 ae 15 b2 0c de bc fb 0d 00 a3 98 83 d1 d1 c7 63 1d df 5f 35 06 a0 fa 4c 4e 01 3f 17 c1 05 aa 50 d0 3b 48 16 46 75 d5 37 8e 2c 82 9b 06 17 11 bb 00 01 02 00 40 1c 3c 3f 01 b8 76 78 8b 32 db 48 7f 09 5f 71 14 29 1a ba 51 84 09 1c e6 24 d6 a7 ea dc 1a 81 5d 77 25 19 6f 5c 97 b9 83 d3 93 d3 e7 e6 ff 47 7f 3f 0d 3d aa 50 8b 77 18 a0 c6 60 76 44 8c ed 64 00 80 dd 73 ff a7 eb 32 28 e1 71 45 d2 e3 e1 b3 ca b3 1f 1c 06 67 d7 27 bf 66 09 c1 42 03 4f 29 f8 cf 8e ab 3f fb 28 22 8d 5e ca 52 59 e5 61 f6 a0 96 3f b1 98 6b 3d 6a 81 f9 b6 08 0d c9 83 1f 5c 5b 10 f6 e6 be 2a 1c b1 56 99 41 fc c8 41 7a 6d cf 09 95 f4 b0 57 bc d2 71 ed 53 23 96 b3 db 60 c7 d8 98 15 6a 22 ff 93 fd 29 64 03 88 88 1a 01 75 05 5b 0b 5c 50 30 51 d0 aa ee 7d e2 b3 ee be fd 16 03 01 00 04 0e 00 00 00 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1021) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server hello A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server certificate A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server done A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write change cipher spec A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write finished A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 flush data >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read finished A >SSL: SSL_connect - want more data >SSL: 134 bytes pending from ssl_out >SSL: 134 bytes left to be sent out (of total 134 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=144): 01 00 00 8c 02 03 00 8c 19 00 16 03 01 00 46 10 00 00 42 00 40 6a cd cf 1d 02 f8 bf 2f d4 ed 63 8a a1 e6 01 47 9c 9d 38 53 a6 3e 90 31 7a 19 f8 0f 8f 86 81 7c be a1 96 55 51 ce 90 4b f7 a5 63 26 68 6e 82 84 b5 8f 90 0e e6 d9 71 5a 42 13 06 0c 2a bf 86 cb 14 03 01 00 01 01 16 03 01 00 30 a8 a6 a8 3d ce d4 a9 8b e5 f0 64 09 59 8c 8b 90 7d bf 57 20 b8 d8 34 9a e5 39 62 e1 2a 83 9a bf 1f 75 4b db d4 b2 df 95 7c 7f 43 d7 07 fe f6 10 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=69): 01 00 00 41 01 04 00 41 19 00 14 03 01 00 01 01 16 03 01 00 30 ba 2d 92 4b 5c 50 17 3c 8d 04 36 f9 54 33 c7 d2 f5 19 87 4f f7 77 b1 3e c2 10 e5 16 9f dd f3 99 d4 eb 9a cd 71 0f 40 f6 31 08 db f9 b6 f8 d0 56 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=65) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read finished A >SSL: (where=0x20 ret=0x1) >SSL: (where=0x1002 ret=0x1) >SSL: 0 bytes pending from ssl_out >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >SSL: No data to be sent out >EAP-PEAP: TLS done, proceed to Phase 2 >EAP-PEAP: using label 'client EAP encryption' in key derivation >EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] >EAP-PEAP: Workaround - allow outer EAP-Success to terminate PEAP resumption >SSL: Building ACK (type=25 id=4 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=COND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 05 00 2b 19 00 17 03 01 00 20 f8 13 6e 91 de 5f 14 e8 4b a0 d2 e2 fb 99 1b c8 37 f1 5d 03 7c 7b ec 10 79 50 ea d1 e2 ad 38 3e >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 05 00 05 01 >EAP-PEAP: received Phase 2: code=1 identifier=5 length=5 >EAP-PEAP: Phase 2 Request: type=1 >EAP: using real identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=10): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 05 00 50 19 00 17 03 01 00 20 f7 32 66 99 23 b6 23 4a 6e 05 a1 68 0b 23 eb 87 1a d8 42 f0 b7 1e 8b 22 36 fe 73 8a d5 aa 9e cf 17 03 01 00 20 0a b5 32 19 17 7e c4 6b 1d b4 01 55 fc 81 9a d6 1e 2c 1c c6 4c 95 e9 6d 06 9f 14 9d 11 ed 76 ce >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=63): 01 00 00 3b 01 06 00 3b 19 00 17 03 01 00 30 fd 0c c6 2b ab bf 93 ca a7 aa 9f 1c ed ec 96 d9 1d 1b bb e4 0a a6 63 4e b0 b4 2f e2 22 7b 4a 15 c6 b6 cf 9d 46 ee 14 c9 8a 52 90 42 77 d6 a8 95 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=59) - Flags 0x00 >EAP-PEAP: received 53 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=27): 1a 01 06 00 1a 10 83 b7 0c 1a 6f 4a d2 20 df fb b2 1b e8 8b 38 88 78 62 6f 74 6c >EAP-PEAP: received Phase 2: code=1 identifier=6 length=31 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 6 mschapv2_id 6 >EAP-MSCHAPV2: Received challenge >EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-MSCHAPV2: Generating Challenge Response >MSCHAPV2: Identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: Username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: auth_challenge - hexdump(len=16): 83 b7 0c 1a 6f 4a d2 20 df fb b2 1b e8 8b 38 88 >MSCHAPV2: peer_challenge - hexdump(len=16): a0 3a 6a b0 60 ac 67 f4 ae 4b f1 f4 1a ea da 4f >MSCHAPV2: username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: password - hexdump_ascii(len=8): [REMOVED] >MSCHAPV2: NT Response - hexdump(len=24): 14 ce e6 4c 66 47 c4 ea 9f 1a 40 1d 88 b7 83 96 c3 83 07 e1 79 65 c6 be >MSCHAPV2: Auth Response - hexdump(len=20): 91 29 2d 13 0a d0 c1 6b 63 3d 12 b4 d6 1c 3e b9 92 91 bf f5 >MSCHAPV2: Master Key - hexdump(len=16): [REMOVED] >EAP-MSCHAPV2: TX identifier 6 mschapv2_id 6 (response) >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=64): [REMOVED] >SSL: 138 bytes left to be sent out (of total 138 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=148): 01 00 00 90 02 06 00 90 19 00 17 03 01 00 20 3c 2b c5 31 fd 8a 8e d6 1a 37 4f 44 37 87 c3 e9 56 c8 f6 4d 94 a6 7e 62 cc de 01 d9 37 9f a1 10 17 03 01 00 60 0f 1a 8c 19 90 98 54 5a 8a 12 57 f6 e4 d6 83 74 74 a4 04 1b f3 3f 02 0e 34 d5 b9 02 7a 64 d5 e1 e3 00 c9 14 3d 00 0f ba d4 ae f7 86 62 58 ed 16 d3 bf db 74 4e cc 60 c3 68 cd 68 89 22 9d dc 09 f7 39 56 84 87 7b 21 7f ed ae b0 cb f5 be ac e8 48 64 5a af 20 89 25 3a 5b 36 51 0f 07 30 1f 64 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=95): 01 00 00 5b 01 07 00 5b 19 00 17 03 01 00 50 89 3c 42 11 0a 7a 78 b2 e4 c5 7b 88 d1 87 45 2e a6 1e ef 27 60 02 f3 52 c0 a8 e6 5b 59 d1 64 a3 19 dc c3 d2 d7 8c 3b d1 ea 77 c5 59 2a 80 9f 2d da 1e 34 b5 da d4 c5 96 ac 3a 28 43 ca 09 97 e5 d4 2a e0 08 6e d5 8f 52 59 d8 98 6b 72 b5 bd 64 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=91) - Flags 0x00 >EAP-PEAP: received 85 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 06 00 2e 53 3d 39 31 32 39 32 44 31 33 30 41 44 30 43 31 36 42 36 33 33 44 31 32 42 34 44 36 31 43 33 45 42 39 39 32 39 31 42 46 46 35 >EAP-PEAP: received Phase 2: code=1 identifier=7 length=51 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 7 mschapv2_id 6 >EAP-MSCHAPV2: Received success >EAP-MSCHAPV2: Success message - hexdump_ascii(len=0): >EAP-MSCHAPV2: Authentication succeeded >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 07 00 50 19 00 17 03 01 00 20 50 9a 3c 5e a2 e0 ed 0b 6d 9d d4 7b a3 51 d1 3d 34 91 41 07 b3 20 53 c9 97 95 b9 13 32 f6 f9 38 17 03 01 00 20 b1 d2 79 57 ef 3b e3 69 02 1d 85 d1 b5 3e df 3f b9 6e 86 dc df 44 f5 f4 aa d7 40 57 d2 e0 7a 37 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 08 00 2b 19 00 17 03 01 00 20 3d 74 f0 b9 4f 2f 49 4e 5c eb ef d5 a8 57 15 f2 ee fe e9 d5 f6 ac d2 cf b3 33 cd 95 7e 03 8d 89 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 08 00 0b 21 80 03 00 02 00 01 >EAP-PEAP: received Phase 2: code=1 identifier=8 length=11 >EAP-PEAP: Phase 2 Request: type=33 >EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01 >EAP-TLV: Result TLV - hexdump(len=2): 00 01 >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 08 00 50 19 00 17 03 01 00 20 42 3f 66 36 76 a1 e9 2d 0f 9e 46 29 eb dd d0 e7 eb cd b4 3c ee 3e a5 38 cb ba d8 01 97 df 23 3c 17 03 01 00 20 d0 a6 ef af cc 69 f1 50 26 97 f6 b0 53 79 70 14 54 46 15 8e 2f 71 c6 de ff ce a4 9d 20 7b e3 52 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=8): 01 00 00 04 03 08 00 04 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Success >EAP: EAP entering state SUCCESS >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state SUCCESS >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 53 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 53 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 53 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >EAPOL: Successfully fetched key (len=32) >WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED] >WPA: Renewed SNonce - hexdump(len=32): 9b e2 4b 1c 68 c8 c1 b5 e1 f7 33 e4 ec 11 7b 0f 5d 74 29 1a 07 aa af 55 86 f9 73 98 fd f1 d0 3e >WPA: PTK derivation - A1=00:1d:e0:98:a5:dd A2=00:c0:49:1c:ec:d4 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 9b e2 4b 1c 68 c8 c1 b5 e1 f7 33 e4 ec 11 7b 0f 5d 74 29 1a 07 aa af 55 86 f9 73 98 fd f1 d0 3e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09 b5 07 d9 fd db 22 0e 7c c0 37 93 8b 5d 9e e7 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 53 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 23 65 6c 77 d8 e4 cd 3b ac 1f 40 64 3f 16 f4 f8 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=121 > EAPOL-Key type=254 > key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) > key_length=32 key_data_length=26 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 53 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 23 65 6c 77 d8 e4 cd 3b ac 1f 40 64 3f 16 f4 f8 >WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 53 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 23 65 6c 77 d8 e4 cd 3b ac 1f 40 64 3f 16 f4 f8 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 3 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >WPA: Sending EAPOL-Key 4/4 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 73 b1 73 98 b0 e7 b5 d5 ea 5a f3 40 e7 9c 9b e8 00 00 >WPA: Installing PTK to the driver. >WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 >State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 55 47 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 22 30 d7 9d 51 d8 aa 1d ec c0 d4 76 cb de 94 8b 00 20 a6 16 9b 1c ba e3 97 df 95 04 81 52 d2 de d9 58 36 03 20 15 4a af 47 90 30 f6 9f 70 80 3c 55 0e >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 55 > key_rsc - hexdump(len=8): 47 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 22 30 d7 9d 51 d8 aa 1d ec c0 d4 76 cb de 94 8b >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 55 47 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 22 30 d7 9d 51 d8 aa 1d ec c0 d4 76 cb de 94 8b 00 20 a6 16 9b 1c ba e3 97 df 95 04 81 52 d2 de d9 58 36 03 20 15 4a af 47 90 30 f6 9f 70 80 3c 55 0e >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 47 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6f ec 14 1b 68 15 b2 b2 1b 76 ff 1f b5 74 12 3a 00 00 >WPA: Key negotiation completed with 00:c0:49:1c:ec:d4 [PTK=TKIP GTK=TKIP] >Cancelling scan request >Cancelling authentication timeout >Removed BSSID 00:c0:49:1c:ec:d4 from blacklist >State: GROUP_HANDSHAKE -> COMPLETED >CTRL-EVENT-CONNECTED - Connection to 00:c0:49:1c:ec:d4 completed (reauth) [id=0 id_str=] >wpa_driver_wext_set_operstate: operstate 0->1 (UP) >WEXT: Operstate: linkmode=-1, operstate=6 >EAPOL: External notification - portValid=1 >EAPOL: SUPP_PAE entering state AUTHENTICATED >EAPOL authentication completed successfully >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 56 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dc e4 47 14 e5 d7 e4 af 9f 4a 43 ef 77 a1 02 6c 00 20 f5 12 83 ba ec 85 1c 91 bc 53 75 b5 11 f4 60 fe f8 27 05 42 8e 9c 97 f1 e7 2a 5f f9 43 e0 d2 ba >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 56 > key_rsc - hexdump(len=8): 48 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): dc e4 47 14 e5 d7 e4 af 9f 4a 43 ef 77 a1 02 6c >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 56 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dc e4 47 14 e5 d7 e4 af 9f 4a 43 ef 77 a1 02 6c 00 20 f5 12 83 ba ec 85 1c 91 bc 53 75 b5 11 f4 60 fe f8 27 05 42 8e 9c 97 f1 e7 2a 5f f9 43 e0 d2 ba >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 48 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 88 1b e5 57 de 49 80 d0 5f ea 0d 7c a8 f8 70 5f 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 57 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 59 43 f2 50 0c 91 7d a9 52 ac 64 47 1a e0 c9 50 00 20 1b 45 ef dc 56 b8 92 4e fe 5d cb 92 3f 5f cb 58 9d 9a b6 17 22 e1 b5 77 cf 08 7f 77 48 a7 50 98 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 57 > key_rsc - hexdump(len=8): 48 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 59 43 f2 50 0c 91 7d a9 52 ac 64 47 1a e0 c9 50 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 57 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 59 43 f2 50 0c 91 7d a9 52 ac 64 47 1a e0 c9 50 00 20 1b 45 ef dc 56 b8 92 4e fe 5d cb 92 3f 5f cb 58 9d 9a b6 17 22 e1 b5 77 cf 08 7f 77 48 a7 50 98 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 48 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f6 09 9d 06 94 50 22 7f 61 29 0e 83 96 2a 2e 9a 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >Setting scan request: 0 sec 100000 usec >Added BSSID 00:c0:49:1c:ec:d4 into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: COMPLETED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >BSSID 00:00:00:00:00:00 blacklist count incremented to 14 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >Driver did not support SIOCSIWENCODEEXT >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >State: DISCONNECTED -> SCANNING >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=5): > 53 53 49 44 31 NETWORKSID >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=221 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00055353494431010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f201 RespIEs=010882848b0c1296182432043048606cdd180050f20201010000030f0000270f000052f75d0072732e00)' >Association info event >req_ies - hexdump(len=47): 00 05 53 53 49 44 31 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 00 00 03 0f 00 00 27 0f 00 00 52 f7 5d 00 72 73 2e 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:c0:49:1c:ec:d4 >State: SCANNING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:c0:49:1c:ec:d4 >No keys have been configured - skip key clearing >Associated with 00:c0:49:1c:ec:d4 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:c0:49:fd:9f:80 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - blacklisted >1: 00:c0:49:1c:ec:d4 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > selected based on WPA IE > selected WPA AP 00:c0:49:1c:ec:d4 ssid='NETWORKSID' >Try to find non-WPA AP >Already associated with the selected AP. >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=4): 01 01 00 00 >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=14): 01 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=5): > 68 65 6c 6c 6f hello >EAP: using anonymous identity - hexdump_ascii(len=9): > 61 6e 6f 6e 79 6d 6f 75 73 anonymous >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=18): 01 00 00 0e 02 00 00 0e 01 61 6e 6f 6e 79 6d 6f 75 73 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=10): 01 00 00 06 01 01 00 06 19 20 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=1 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Using previous method data for fast re-authentication >EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >EAP: EAP entering state METHOD >SSL: Received packet(len=6) - Flags 0x20 >EAP-PEAP: Start (server ver=0, own ver=0) >EAP-PEAP: Using PEAP version 0 >SSL: (where=0x10 ret=0x1) >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:before/connect initialization >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client hello A >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read server hello A >SSL: SSL_connect - want more data >SSL: 143 bytes pending from ssl_out >SSL: 143 bytes left to be sent out (of total 143 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=153): 01 00 00 95 02 01 00 95 19 00 16 03 01 00 8a 01 00 00 86 03 01 48 6d ed 72 78 f6 31 ad 72 55 38 62 b0 c1 26 d1 16 4d b4 c9 b1 4c 2f 67 00 c8 2e 53 05 89 fc 0a 20 d2 a3 9d 95 e5 df 3f f3 95 61 a8 25 4f f4 02 75 7d 2f 3b 07 78 4c aa 1f 23 58 a0 0b 13 03 bf 94 00 38 00 39 00 38 00 35 00 88 00 87 00 84 00 16 00 13 00 0a 00 33 00 32 00 2f 00 9a 00 99 00 96 00 45 00 44 00 41 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 02 01 00 00 04 00 23 00 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1038): 01 00 04 0a 01 02 04 0a 19 c0 00 00 07 f7 16 03 01 00 4a 02 00 00 46 03 01 48 6d ed ac 0e 1d ad 34 c4 dc 2b 97 e8 d3 ab 37 56 e6 80 6a 58 37 c4 9e 9c 0c 08 7c 2c aa 8a b1 20 2e f3 b7 69 85 6a 95 d2 5d b6 0d b9 ba a7 a2 bb 0f ed de 19 36 fa b7 a5 23 da 54 7f a3 08 d2 0d 00 39 00 16 03 01 06 88 0b 00 06 84 00 06 81 00 02 c2 30 82 02 be 30 82 02 27 a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 35 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 37 31 31 32 31 31 30 34 31 35 36 5a 30 81 8e 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 10 30 0e 06 03 55 04 03 13 07 52 4f 4f 54 20 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 e1 14 fe 0f 20 51 89 c1 68 0d 84 f7 15 45 0d 82 cf ce eb c4 57 3a dc 1e 8d 88 bd 0d 12 00 3a a2 8d 79 47 3e 3d a2 6e ab 68 a9 05 32 f3 e1 85 13 f9 a0 28 01 e0 4d df 2b 5c 99 fd d8 3f 62 75 f6 81 42 63 63 ef bc 67 8e 22 5e a2 f4 da d9 f1 40 71 26 11 3a 0a 73 2b 2f 18 db 20 98 5f c6 a1 fc d0 de 80 e0 c5 73 56 c4 9a 15 0c 0a 3b a7 89 bf 9b eb 63 13 06 01 83 83 be 7b 0a 74 af 7f 4a cf 02 03 01 00 01 a3 17 30 15 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 4c 8d 15 93 47 26 0f 59 2e 4e 7f d0 16 65 e4 8c c0 4c 73 17 07 9a 90 c1 52 27 b9 3e 56 8c 0c fa 9b 1c b8 90 a3 e4 2c 82 61 70 86 2d 8a c3 ca 45 14 b5 bb 55 00 ca 15 7c 0f 33 3f 19 08 37 e0 88 8e 53 e5 5a eb a5 78 eb 92 c8 89 95 7b c7 79 40 59 c7 4c 90 c2 c2 07 b9 68 80 5f 21 ff f4 b0 fd 83 ab 0f 97 e8 b0 f0 f3 80 d8 80 67 6a 9b 16 d3 26 af 4a 88 8e f2 a0 4b a6 72 b2 1c d6 5c c4 d5 00 03 b9 30 82 03 b5 30 82 03 1e a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 33 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 38 31 31 32 30 31 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1034) - Flags 0xc0 >SSL: TLS Message Length: 2039 >SSL: Need 1015 bytes more input data >SSL: Building ACK (type=25 id=2 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1025): 01 00 03 fd 01 03 03 fd 19 00 30 34 31 35 36 5a 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 97 8f 78 af a5 f4 70 a1 00 41 5b fa 62 28 19 69 f6 e5 f7 6a 1a 27 85 ca 8a 15 00 55 54 15 97 68 0b 2e 55 39 e4 b0 6b 76 55 86 84 53 7c 56 fc 74 52 da 73 a3 54 ae 74 47 64 9e 1f ff 1b 1e 3d 1c 8b c1 8d af 89 94 e9 0e d0 c9 56 83 52 c4 50 a9 24 81 10 3d 0a e7 7e 6e 7b 30 ae fd 1b 4d f8 96 87 3f 7d 72 2a cd fa 22 f9 cd 29 17 f4 da 15 eb de 6a de b3 e1 9d 2a c5 3b 3d ea 3c f6 a6 a6 71 02 03 01 00 01 a3 82 01 01 30 81 fe 30 1d 06 03 55 1d 0e 04 16 04 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f 30 81 ce 06 03 55 1d 23 04 81 c6 30 81 c3 80 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f a1 81 9f a4 81 9c 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 82 09 00 d9 c7 09 10 ab 9f 78 33 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 74 1a c9 c3 9b 7a a4 5a e4 16 4c d1 af 8e b6 95 20 80 ca 9e 5f 89 82 ba e7 99 63 da 67 b9 c0 7b 86 aa 51 3d 24 41 58 dd d9 2d e7 cb e6 6f 3a 8f 15 5e ca 21 5a f7 46 21 a3 bb b5 f6 9c d0 82 1b b5 f5 3d c9 ed 94 51 aa f2 ff ca 34 d0 48 05 2c 66 92 6f 50 c7 49 0e c4 2d 1d 19 a3 9c ca b9 f9 c0 b1 d0 17 b9 fe 80 90 d6 dd 2b 38 70 74 4e a7 53 99 3e bf cd 0e d4 79 bb 2f f5 8e ba 6c d1 69 16 03 01 01 0d 0c 00 01 09 00 40 c3 4a f6 2a e3 ab 87 b9 1c 92 96 23 c3 a2 11 50 ae 15 b2 0c de bc fb 0d 00 a3 98 83 d1 d1 c7 63 1d df 5f 35 06 a0 fa 4c 4e 01 3f 17 c1 05 aa 50 d0 3b 48 16 46 75 d5 37 8e 2c 82 9b 06 17 11 bb 00 01 02 00 40 65 9b a8 bd ba e7 4c dd 4b fe e8 28 71 65 1b 95 05 84 af 4e 55 c2 d6 16 34 bb b4 35 fc 68 ae cd c0 29 a6 30 98 b4 24 87 1c 25 3d aa ee 08 0f 34 70 9b b5 0b 44 13 93 e2 2d 4b 0f 2f 6f bb 45 fd 00 80 2d 04 69 86 d0 62 0c 55 c7 b8 3b df 41 20 ae 5e 26 35 4a 9b 5b 2b da 51 ad 8d 43 78 d5 bd 9d c4 cf 8b 5f b8 8f ec 83 14 0c b4 66 0a 7f 03 48 21 04 6e 6b e6 66 eb 43 2c 53 fa 38 f0 17 04 bf a2 22 1a f4 43 d0 4a 9b 8e df 47 d0 e6 e7 d9 f1 2c 5e 57 07 c9 e4 4d c3 59 b9 99 91 1d fb 09 5e 1c a3 80 af b7 33 a6 6e b4 da 7e 8b 92 43 6e c0 58 69 50 d1 d4 8a db 96 13 6d 82 6e 8c 82 11 8f 1d 16 03 01 00 04 0e 00 00 00 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1021) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server hello A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server certificate A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server done A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write change cipher spec A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write finished A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 flush data >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read finished A >SSL: SSL_connect - want more data >SSL: 134 bytes pending from ssl_out >SSL: 134 bytes left to be sent out (of total 134 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=144): 01 00 00 8c 02 03 00 8c 19 00 16 03 01 00 46 10 00 00 42 00 40 b9 c8 76 7c 6f f6 18 ce 47 ab d3 e8 3a 3c 61 5d fd 32 cf f1 17 af 08 33 08 98 14 57 96 1a 01 17 d0 3d 6d 0f c6 18 3d 1e 7f 11 ba 45 c8 23 fa 48 40 a5 32 9a 8e 1d 24 37 ee 9f 4f 19 49 dd 1b d7 14 03 01 00 01 01 16 03 01 00 30 c6 a0 30 bd 5d 59 4a 10 09 28 a7 21 a0 12 a4 e3 16 a1 2e 34 06 f2 1e 3a 76 27 a2 25 9e f5 ab 71 01 f6 06 f9 86 ac bb 94 81 fa d3 4a 7d 3d b0 b5 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=69): 01 00 00 41 01 04 00 41 19 00 14 03 01 00 01 01 16 03 01 00 30 8c dd 20 d7 e1 0c 40 88 12 ce 63 1c db 21 ea 70 2e f7 38 7c 85 4c 8b 26 15 1f c0 9d 2d 1a 2a 9a 8e 7d 62 20 c4 4e 13 d7 62 bb 3f 5c 16 d5 3e 6a >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=65) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read finished A >SSL: (where=0x20 ret=0x1) >SSL: (where=0x1002 ret=0x1) >SSL: 0 bytes pending from ssl_out >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >SSL: No data to be sent out >EAP-PEAP: TLS done, proceed to Phase 2 >EAP-PEAP: using label 'client EAP encryption' in key derivation >EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] >EAP-PEAP: Workaround - allow outer EAP-Success to terminate PEAP resumption >SSL: Building ACK (type=25 id=4 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=COND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 05 00 2b 19 00 17 03 01 00 20 4c ce 47 d9 b2 f1 83 3d ac 41 ad 28 db 0f 66 e7 26 ac a4 55 a9 41 60 07 3d 7d 98 ad 2f 9d 56 49 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 05 00 05 01 >EAP-PEAP: received Phase 2: code=1 identifier=5 length=5 >EAP-PEAP: Phase 2 Request: type=1 >EAP: using real identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=10): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 05 00 50 19 00 17 03 01 00 20 6d 0c 26 cd 40 84 ef b8 7c 3f 84 7b d1 5f 7e a6 10 dc 12 c1 5b b4 65 03 06 a2 de b5 56 3f da 1d 17 03 01 00 20 f6 14 02 29 1d 60 2a 84 72 cf 7e ab e1 0a 18 fa 3f e0 a3 3d 59 46 ef a7 23 e6 2d 42 dc e1 de 93 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=63): 01 00 00 3b 01 06 00 3b 19 00 17 03 01 00 30 83 ff 75 92 39 0a 5d 11 12 d5 41 1b d7 60 f8 94 2f d9 e1 21 82 88 60 c5 1a 42 82 08 64 66 95 94 86 f3 35 75 74 52 6b bb e4 97 85 38 f9 fb 47 d9 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=59) - Flags 0x00 >EAP-PEAP: received 53 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=27): 1a 01 06 00 1a 10 50 8c d4 fa 24 7a 9a b5 7f 33 2f 3d 5c bf 95 ee 78 62 6f 74 6c >EAP-PEAP: received Phase 2: code=1 identifier=6 length=31 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 6 mschapv2_id 6 >EAP-MSCHAPV2: Received challenge >EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-MSCHAPV2: Generating Challenge Response >MSCHAPV2: Identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: Username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: auth_challenge - hexdump(len=16): 50 8c d4 fa 24 7a 9a b5 7f 33 2f 3d 5c bf 95 ee >MSCHAPV2: peer_challenge - hexdump(len=16): 88 35 02 9e d2 5a 0d 99 83 5c b9 e8 ad 77 7b 5f >MSCHAPV2: username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: password - hexdump_ascii(len=8): [REMOVED] >MSCHAPV2: NT Response - hexdump(len=24): 4c 67 8c 72 6d ad f1 44 8f 15 12 cf ef 09 18 82 bb 1b e7 ef 5b 88 ae 6d >MSCHAPV2: Auth Response - hexdump(len=20): d6 2b b8 34 02 fa c0 ba ab d8 52 78 23 0b f2 be 9f 02 ed 56 >MSCHAPV2: Master Key - hexdump(len=16): [REMOVED] >EAP-MSCHAPV2: TX identifier 6 mschapv2_id 6 (response) >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=64): [REMOVED] >SSL: 138 bytes left to be sent out (of total 138 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=148): 01 00 00 90 02 06 00 90 19 00 17 03 01 00 20 ea f2 1c ea 27 e5 70 9a bb 3b c3 3b cb 23 68 2f 6b 0f dd 01 c5 f8 73 27 7f 6a dd f1 1d d1 87 23 17 03 01 00 60 4c e3 a0 89 e8 6b 7c 00 96 9d fa 44 2a f2 18 fa c3 9e 49 3a 30 fa 33 ec 49 84 d1 2c 8f 73 78 74 68 88 3c a1 13 17 a5 ce c9 26 d9 2b 8b 76 46 11 0b 6c 1b 70 f6 8c c8 bf 50 f7 43 8c 0d 6a bc d2 4d e9 13 a6 61 9b cf f8 6a 0e a0 df 5d cb 3c a4 8d b2 f4 a0 c1 ea 72 85 9b fc d6 e2 0b f8 61 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=95): 01 00 00 5b 01 07 00 5b 19 00 17 03 01 00 50 c5 43 3c 32 95 d4 a4 b2 5b b1 f2 0a 4a dd 7c e7 90 f9 2e ea 8f 83 6f 2a 0d 0f e0 9f f3 0d d2 3a b5 0a 41 88 09 e7 4b 39 a4 f1 12 67 5f cc 73 cc 6a 8e 9a 07 36 9a 8a e1 21 2b 26 47 94 ff e6 e1 18 77 47 e8 5d b8 de d6 84 c1 6c 4f 45 40 6a 8e >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=91) - Flags 0x00 >EAP-PEAP: received 85 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 06 00 2e 53 3d 44 36 32 42 42 38 33 34 30 32 46 41 43 30 42 41 41 42 44 38 35 32 37 38 32 33 30 42 46 32 42 45 39 46 30 32 45 44 35 36 >EAP-PEAP: received Phase 2: code=1 identifier=7 length=51 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 7 mschapv2_id 6 >EAP-MSCHAPV2: Received success >EAP-MSCHAPV2: Success message - hexdump_ascii(len=0): >EAP-MSCHAPV2: Authentication succeeded >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 07 00 50 19 00 17 03 01 00 20 4c b3 42 fc b4 bb 86 96 64 b2 4d 60 60 12 4d e4 43 60 a7 a9 fd 41 30 af 10 d7 01 2a 08 73 58 e0 17 03 01 00 20 93 86 0b 6c ce 3d 98 c0 d9 70 8b 72 ee bb a4 2e 52 92 26 1e e8 cd ba 57 b2 31 ad 15 36 f5 b1 f6 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 08 00 2b 19 00 17 03 01 00 20 da b2 d9 19 e2 c3 92 5f fc 5c ea a0 a3 0a 2b d6 8b 2c 69 bb a6 d2 fb 81 59 2b 9b 61 fb 51 89 32 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 08 00 0b 21 80 03 00 02 00 01 >EAP-PEAP: received Phase 2: code=1 identifier=8 length=11 >EAP-PEAP: Phase 2 Request: type=33 >EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01 >EAP-TLV: Result TLV - hexdump(len=2): 00 01 >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 08 00 50 19 00 17 03 01 00 20 e9 de a9 73 da c9 6a 77 ac 15 c5 d8 e2 63 2e 12 5d 54 12 14 77 18 08 8d 93 bc 85 aa ae c4 8d 99 17 03 01 00 20 23 e3 32 49 cf b5 c2 dd 04 60 1f 94 e8 20 a7 a8 fd 1e e3 cb e4 16 ed c5 e3 18 b7 54 58 7d 56 53 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=8): 01 00 00 04 03 08 00 04 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Success >EAP: EAP entering state SUCCESS >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state SUCCESS >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 59 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 59 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 59 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >EAPOL: Successfully fetched key (len=32) >WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED] >WPA: Renewed SNonce - hexdump(len=32): bc 52 73 c3 03 ef f9 d0 0d d6 b4 27 40 5d 97 64 2d af b6 13 ae 54 bd 98 1a 44 cd ab ca e9 80 d6 >WPA: PTK derivation - A1=00:1d:e0:98:a5:dd A2=00:c0:49:1c:ec:d4 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 bc 52 73 c3 03 ef f9 d0 0d d6 b4 27 40 5d 97 64 2d af b6 13 ae 54 bd 98 1a 44 cd ab ca e9 80 d6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 57 7e 8f c1 48 b7 9c ba 44 22 98 5a 45 8e f6 02 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 59 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 02 10 a8 75 d7 98 c5 f4 f9 16 da 02 8a 44 3f 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=121 > EAPOL-Key type=254 > key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) > key_length=32 key_data_length=26 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 59 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): f0 02 10 a8 75 d7 98 c5 f4 f9 16 da 02 8a 44 3f >WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 59 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 02 10 a8 75 d7 98 c5 f4 f9 16 da 02 8a 44 3f 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 3 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >WPA: Sending EAPOL-Key 4/4 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 05 ca 82 98 97 06 00 87 4a f1 80 a3 72 4f 09 07 00 00 >WPA: Installing PTK to the driver. >WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 >State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 5b 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 cf a1 a7 cc 3d 9c 31 53 84 2f ff 34 15 97 46 1e 00 20 13 1c d2 a4 35 9f cd 61 94 71 d7 d7 b7 7b 07 7c 9f 77 08 89 a1 d7 f7 6e e4 cb 62 e2 e9 f2 9b ed >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 5b > key_rsc - hexdump(len=8): 4c 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): cf a1 a7 cc 3d 9c 31 53 84 2f ff 34 15 97 46 1e >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 5b 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 cf a1 a7 cc 3d 9c 31 53 84 2f ff 34 15 97 46 1e 00 20 13 1c d2 a4 35 9f cd 61 94 71 d7 d7 b7 7b 07 7c 9f 77 08 89 a1 d7 f7 6e e4 cb 62 e2 e9 f2 9b ed >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 4c 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0b 0b 09 e1 84 2b 1b 84 83 d9 97 a6 60 c5 32 d3 00 00 >WPA: Key negotiation completed with 00:c0:49:1c:ec:d4 [PTK=TKIP GTK=TKIP] >Cancelling scan request >Cancelling authentication timeout >Removed BSSID 00:c0:49:1c:ec:d4 from blacklist >State: GROUP_HANDSHAKE -> COMPLETED >CTRL-EVENT-CONNECTED - Connection to 00:c0:49:1c:ec:d4 completed (reauth) [id=0 id_str=] >wpa_driver_wext_set_operstate: operstate 0->1 (UP) >WEXT: Operstate: linkmode=-1, operstate=6 >EAPOL: External notification - portValid=1 >EAPOL: SUPP_PAE entering state AUTHENTICATED >EAPOL authentication completed successfully >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 5c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f3 33 ac c2 7a c1 1d 1c ab fc 1d f0 91 ab 4f e3 00 20 e9 0c 4f e2 47 02 63 59 63 e5 c1 f7 b8 e9 51 98 81 10 e3 78 2f fa 62 e1 eb 9b 42 85 21 01 3c 86 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 5c > key_rsc - hexdump(len=8): 4c 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): f3 33 ac c2 7a c1 1d 1c ab fc 1d f0 91 ab 4f e3 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 5c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f3 33 ac c2 7a c1 1d 1c ab fc 1d f0 91 ab 4f e3 00 20 e9 0c 4f e2 47 02 63 59 63 e5 c1 f7 b8 e9 51 98 81 10 e3 78 2f fa 62 e1 eb 9b 42 85 21 01 3c 86 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 4c 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 12 23 44 8e 80 51 e5 d1 64 50 fb 7d 92 26 61 da 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 5d 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 eb 5c 57 eb 69 6b fe 06 15 76 9a 72 7c 52 44 97 00 20 83 34 0f 04 33 66 ae 68 f6 98 d0 23 be 44 e5 8d 60 60 89 1b 65 7a 99 46 9a a0 38 03 f4 fd be 17 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 5d > key_rsc - hexdump(len=8): 4d 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): eb 5c 57 eb 69 6b fe 06 15 76 9a 72 7c 52 44 97 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 5d 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 eb 5c 57 eb 69 6b fe 06 15 76 9a 72 7c 52 44 97 00 20 83 34 0f 04 33 66 ae 68 f6 98 d0 23 be 44 e5 8d 60 60 89 1b 65 7a 99 46 9a a0 38 03 f4 fd be 17 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 4d 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 64 6b 58 df f9 c2 36 eb 11 9b c6 d2 89 d5 b3 95 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >Setting scan request: 0 sec 100000 usec >Added BSSID 00:c0:49:1c:ec:d4 into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: COMPLETED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >BSSID 00:00:00:00:00:00 blacklist count incremented to 15 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >Driver did not support SIOCSIWENCODEEXT >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=221 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00055353494431010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f201 RespIEs=010882848b0c1296182432043048606cdd180050f20201010000030f0000270f000052f75d0072732e00)' >Association info event >req_ies - hexdump(len=47): 00 05 53 53 49 44 31 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 00 00 03 0f 00 00 27 0f 00 00 52 f7 5d 00 72 73 2e 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:c0:49:1c:ec:d4 >State: SCANNING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:c0:49:1c:ec:d4 >No keys have been configured - skip key clearing >Associated with 00:c0:49:1c:ec:d4 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:c0:49:fd:9f:80 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - blacklisted >1: 00:c0:49:1c:ec:d4 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > selected based on WPA IE > selected WPA AP 00:c0:49:1c:ec:d4 ssid='NETWORKSID' >Try to find non-WPA AP >Already associated with the selected AP. >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=4): 01 01 00 00 >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=14): 01 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=5): > 68 65 6c 6c 6f hello >EAP: using anonymous identity - hexdump_ascii(len=9): > 61 6e 6f 6e 79 6d 6f 75 73 anonymous >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=18): 01 00 00 0e 02 00 00 0e 01 61 6e 6f 6e 79 6d 6f 75 73 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=10): 01 00 00 06 01 01 00 06 19 20 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=1 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Using previous method data for fast re-authentication >EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >EAP: EAP entering state METHOD >SSL: Received packet(len=6) - Flags 0x20 >EAP-PEAP: Start (server ver=0, own ver=0) >EAP-PEAP: Using PEAP version 0 >SSL: (where=0x10 ret=0x1) >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:before/connect initialization >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client hello A >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read server hello A >SSL: SSL_connect - want more data >SSL: 143 bytes pending from ssl_out >SSL: 143 bytes left to be sent out (of total 143 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=153): 01 00 00 95 02 01 00 95 19 00 16 03 01 00 8a 01 00 00 86 03 01 48 6d ed 79 2f 87 e3 4c c3 fc 17 32 2b b2 d0 b7 41 50 ff a6 a3 81 3d 39 40 fe 1b 36 73 85 7f a4 20 2e f3 b7 69 85 6a 95 d2 5d b6 0d b9 ba a7 a2 bb 0f ed de 19 36 fa b7 a5 23 da 54 7f a3 08 d2 0d 00 38 00 39 00 38 00 35 00 88 00 87 00 84 00 16 00 13 00 0a 00 33 00 32 00 2f 00 9a 00 99 00 96 00 45 00 44 00 41 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 02 01 00 00 04 00 23 00 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1038): 01 00 04 0a 01 02 04 0a 19 c0 00 00 07 f7 16 03 01 00 4a 02 00 00 46 03 01 48 6d ed b3 c8 e9 25 e5 13 a6 de 60 36 02 e4 31 7c e2 e2 bd 9e 1d 1f bf 4a a3 d2 a9 f3 1a 88 74 20 4d 8f 1c e7 b4 27 6c ef dd 68 7a 99 66 1c 27 cb e3 d7 a9 d8 80 dd ec 53 a2 7a dc 6e 82 b9 77 72 00 39 00 16 03 01 06 88 0b 00 06 84 00 06 81 00 02 c2 30 82 02 be 30 82 02 27 a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 35 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 37 31 31 32 31 31 30 34 31 35 36 5a 30 81 8e 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 10 30 0e 06 03 55 04 03 13 07 52 4f 4f 54 20 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 e1 14 fe 0f 20 51 89 c1 68 0d 84 f7 15 45 0d 82 cf ce eb c4 57 3a dc 1e 8d 88 bd 0d 12 00 3a a2 8d 79 47 3e 3d a2 6e ab 68 a9 05 32 f3 e1 85 13 f9 a0 28 01 e0 4d df 2b 5c 99 fd d8 3f 62 75 f6 81 42 63 63 ef bc 67 8e 22 5e a2 f4 da d9 f1 40 71 26 11 3a 0a 73 2b 2f 18 db 20 98 5f c6 a1 fc d0 de 80 e0 c5 73 56 c4 9a 15 0c 0a 3b a7 89 bf 9b eb 63 13 06 01 83 83 be 7b 0a 74 af 7f 4a cf 02 03 01 00 01 a3 17 30 15 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 4c 8d 15 93 47 26 0f 59 2e 4e 7f d0 16 65 e4 8c c0 4c 73 17 07 9a 90 c1 52 27 b9 3e 56 8c 0c fa 9b 1c b8 90 a3 e4 2c 82 61 70 86 2d 8a c3 ca 45 14 b5 bb 55 00 ca 15 7c 0f 33 3f 19 08 37 e0 88 8e 53 e5 5a eb a5 78 eb 92 c8 89 95 7b c7 79 40 59 c7 4c 90 c2 c2 07 b9 68 80 5f 21 ff f4 b0 fd 83 ab 0f 97 e8 b0 f0 f3 80 d8 80 67 6a 9b 16 d3 26 af 4a 88 8e f2 a0 4b a6 72 b2 1c d6 5c c4 d5 00 03 b9 30 82 03 b5 30 82 03 1e a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 33 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 38 31 31 32 30 31 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1034) - Flags 0xc0 >SSL: TLS Message Length: 2039 >SSL: Need 1015 bytes more input data >SSL: Building ACK (type=25 id=2 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1025): 01 00 03 fd 01 03 03 fd 19 00 30 34 31 35 36 5a 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 97 8f 78 af a5 f4 70 a1 00 41 5b fa 62 28 19 69 f6 e5 f7 6a 1a 27 85 ca 8a 15 00 55 54 15 97 68 0b 2e 55 39 e4 b0 6b 76 55 86 84 53 7c 56 fc 74 52 da 73 a3 54 ae 74 47 64 9e 1f ff 1b 1e 3d 1c 8b c1 8d af 89 94 e9 0e d0 c9 56 83 52 c4 50 a9 24 81 10 3d 0a e7 7e 6e 7b 30 ae fd 1b 4d f8 96 87 3f 7d 72 2a cd fa 22 f9 cd 29 17 f4 da 15 eb de 6a de b3 e1 9d 2a c5 3b 3d ea 3c f6 a6 a6 71 02 03 01 00 01 a3 82 01 01 30 81 fe 30 1d 06 03 55 1d 0e 04 16 04 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f 30 81 ce 06 03 55 1d 23 04 81 c6 30 81 c3 80 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f a1 81 9f a4 81 9c 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 82 09 00 d9 c7 09 10 ab 9f 78 33 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 74 1a c9 c3 9b 7a a4 5a e4 16 4c d1 af 8e b6 95 20 80 ca 9e 5f 89 82 ba e7 99 63 da 67 b9 c0 7b 86 aa 51 3d 24 41 58 dd d9 2d e7 cb e6 6f 3a 8f 15 5e ca 21 5a f7 46 21 a3 bb b5 f6 9c d0 82 1b b5 f5 3d c9 ed 94 51 aa f2 ff ca 34 d0 48 05 2c 66 92 6f 50 c7 49 0e c4 2d 1d 19 a3 9c ca b9 f9 c0 b1 d0 17 b9 fe 80 90 d6 dd 2b 38 70 74 4e a7 53 99 3e bf cd 0e d4 79 bb 2f f5 8e ba 6c d1 69 16 03 01 01 0d 0c 00 01 09 00 40 c3 4a f6 2a e3 ab 87 b9 1c 92 96 23 c3 a2 11 50 ae 15 b2 0c de bc fb 0d 00 a3 98 83 d1 d1 c7 63 1d df 5f 35 06 a0 fa 4c 4e 01 3f 17 c1 05 aa 50 d0 3b 48 16 46 75 d5 37 8e 2c 82 9b 06 17 11 bb 00 01 02 00 40 5d b4 91 a8 4c 03 3a 91 c6 ca 40 f9 59 49 2a a4 bf ea f0 64 10 be e9 b6 5f 3f e8 46 79 85 5a d1 86 c9 4e a7 3b 0b 43 d9 54 50 c6 9e fc da da 3f f8 33 80 3b 46 02 f1 09 d9 02 e3 1c 32 48 25 15 00 80 1c f6 36 ad 6c 88 3b ec 76 1b 1f f1 d1 4d ab 51 bb d8 52 aa fd e8 28 91 49 54 78 0f 75 cb 7c 77 4d 81 ba 7f 64 2f f4 70 5c b0 4a 82 2a 45 83 ad 32 89 c9 fd 9f cb 18 b8 5a 01 b3 36 7a 85 ed e0 dd ca e9 ac 3b 36 ce e8 d6 bd 6b da 86 b7 fd 75 86 66 93 06 53 d0 9f 96 12 7a 51 06 37 c2 a6 83 3c 96 af c9 c7 de 10 1c fd 2c d8 6a be 24 01 5e ce 33 04 49 b9 ac 8a ea fd 2a ad d4 1b 72 52 5e 16 03 01 00 04 0e 00 00 00 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1021) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server hello A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server certificate A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server done A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write change cipher spec A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write finished A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 flush data >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read finished A >SSL: SSL_connect - want more data >SSL: 134 bytes pending from ssl_out >SSL: 134 bytes left to be sent out (of total 134 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=144): 01 00 00 8c 02 03 00 8c 19 00 16 03 01 00 46 10 00 00 42 00 40 5d fe ff 14 80 9f e3 73 1e 97 28 05 50 de 78 ce 7a 00 09 7d eb a7 b6 f5 17 c5 6b bf c4 b9 1d 16 14 c5 91 cb c4 fc 6f a8 e6 a0 b6 ef 0c 3d 70 f5 0c 11 ec 29 e6 36 c5 df 45 71 ce df d9 9c 7d b2 14 03 01 00 01 01 16 03 01 00 30 4f 2e 32 d3 48 3a 77 57 80 64 d0 c1 27 79 f4 98 16 38 7a ca be 3e 93 9b 45 ea a4 e4 48 e7 48 e7 5d c7 73 3c 88 29 8b 5b 64 48 66 c2 03 ae 01 b1 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=69): 01 00 00 41 01 04 00 41 19 00 14 03 01 00 01 01 16 03 01 00 30 72 23 7f d7 53 5c 5f fc 2b 64 0d f8 59 5e f4 35 11 4c 98 7d 0a da e8 b2 07 5c 6c f3 50 95 49 7e 7c 26 e5 53 07 4e d0 ff 2d 18 ef 47 d8 4e b2 fb >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=65) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read finished A >SSL: (where=0x20 ret=0x1) >SSL: (where=0x1002 ret=0x1) >SSL: 0 bytes pending from ssl_out >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >SSL: No data to be sent out >EAP-PEAP: TLS done, proceed to Phase 2 >EAP-PEAP: using label 'client EAP encryption' in key derivation >EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] >EAP-PEAP: Workaround - allow outer EAP-Success to terminate PEAP resumption >SSL: Building ACK (type=25 id=4 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=COND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 05 00 2b 19 00 17 03 01 00 20 0f 93 b1 ed f5 02 10 5a e0 86 91 e7 b4 a4 f0 5e ab a1 6b f8 57 7f 56 6e c1 39 6d 10 f9 f6 5d ee >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 05 00 05 01 >EAP-PEAP: received Phase 2: code=1 identifier=5 length=5 >EAP-PEAP: Phase 2 Request: type=1 >EAP: using real identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=10): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 05 00 50 19 00 17 03 01 00 20 ce 9c 59 45 e9 b4 13 74 dd 87 ae c3 8e 27 b0 6e fe e0 df 87 92 9d 47 4e c9 ff 07 94 6c ee a6 a1 17 03 01 00 20 3a ca aa 23 d1 13 bd b2 f6 9b f7 ad 17 18 f7 67 a0 4b 30 34 ad da 45 fb 13 33 f2 1d 9f a3 03 0a >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=63): 01 00 00 3b 01 06 00 3b 19 00 17 03 01 00 30 8d 35 cc b3 3f d4 3c d9 02 29 2b 50 5f ba 17 7d dc 0e f7 a7 5c 97 ad 63 70 9a 9b 6d d8 c8 5d 26 b2 13 ba f7 57 51 9f 6a 51 2c fd c7 cd 3c 55 8b >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=59) - Flags 0x00 >EAP-PEAP: received 53 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=27): 1a 01 06 00 1a 10 9b d9 79 0f 08 f1 47 c3 65 2c 1b 84 b3 ba 15 4d 78 62 6f 74 6c >EAP-PEAP: received Phase 2: code=1 identifier=6 length=31 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 6 mschapv2_id 6 >EAP-MSCHAPV2: Received challenge >EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-MSCHAPV2: Generating Challenge Response >MSCHAPV2: Identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: Username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: auth_challenge - hexdump(len=16): 9b d9 79 0f 08 f1 47 c3 65 2c 1b 84 b3 ba 15 4d >MSCHAPV2: peer_challenge - hexdump(len=16): ba 40 95 de 4e e8 3e d4 f3 35 86 33 43 f4 dd c9 >MSCHAPV2: username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: password - hexdump_ascii(len=8): [REMOVED] >MSCHAPV2: NT Response - hexdump(len=24): ff 03 74 f1 cf b2 1b 73 22 a6 29 21 81 66 7b fb 30 53 d2 07 7b 45 04 d3 >MSCHAPV2: Auth Response - hexdump(len=20): 3e 4b 1f 9d 62 47 e8 15 94 9b d0 44 bb c5 64 fa e3 56 68 99 >MSCHAPV2: Master Key - hexdump(len=16): [REMOVED] >EAP-MSCHAPV2: TX identifier 6 mschapv2_id 6 (response) >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=64): [REMOVED] >SSL: 138 bytes left to be sent out (of total 138 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=148): 01 00 00 90 02 06 00 90 19 00 17 03 01 00 20 65 68 42 ec cb 1a 18 13 13 7a 95 d0 12 55 f7 e8 8b 8a 3e c2 be 83 43 c5 19 72 cf b3 92 90 54 62 17 03 01 00 60 aa f7 4f fa 78 8c 6b 0e 82 e4 28 41 b0 f8 0f bc af 28 bd 01 eb 98 c5 c9 6c a6 ff d8 af cf c3 98 d4 e8 ce 7e 8f 60 8d 14 40 d3 8c 93 2a 66 9b fe de 76 1e 64 10 eb e5 93 19 39 b9 d7 85 d4 90 04 32 0b 33 cf 3c 21 96 b0 d8 9f 74 a0 5c d5 84 c5 c5 70 7d d9 15 65 82 ed 18 7f bf 2e 7a 5a 0e bb >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=95): 01 00 00 5b 01 07 00 5b 19 00 17 03 01 00 50 73 c0 d1 ea 2b 0b a5 f8 7e 56 cc 01 ac 61 07 75 64 85 f8 0f da 41 2a 40 41 24 40 6a 1d a8 26 ae 46 84 7f 94 95 bf 7f 24 17 75 9f 38 f5 e7 ea 7d 6d 3e 50 47 36 b2 c0 9e 97 80 0a 36 85 e7 c1 5f 49 11 59 75 90 09 35 8b a9 14 65 74 7a e7 c5 39 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=91) - Flags 0x00 >EAP-PEAP: received 85 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 06 00 2e 53 3d 33 45 34 42 31 46 39 44 36 32 34 37 45 38 31 35 39 34 39 42 44 30 34 34 42 42 43 35 36 34 46 41 45 33 35 36 36 38 39 39 >EAP-PEAP: received Phase 2: code=1 identifier=7 length=51 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 7 mschapv2_id 6 >EAP-MSCHAPV2: Received success >EAP-MSCHAPV2: Success message - hexdump_ascii(len=0): >EAP-MSCHAPV2: Authentication succeeded >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 07 00 50 19 00 17 03 01 00 20 00 11 6d db 3a 5d 08 d7 df c5 5e e3 d3 bb 6e b3 b3 43 32 f5 a7 26 b8 7b bd e3 7b 6f 7a 6d 5f 3b 17 03 01 00 20 88 4e e2 8d fd 7c ea f8 23 a9 f6 46 7a 45 c8 f0 2a 46 ca 0f 6d 4a 37 7a 67 03 9d aa b7 2b fa 8e >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 08 00 2b 19 00 17 03 01 00 20 1e e2 ca f2 55 64 24 58 52 31 f4 8a ff bf 5e 18 f8 8e ff 06 98 d1 f7 55 59 ee 9f 52 44 87 83 7e >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 08 00 0b 21 80 03 00 02 00 01 >EAP-PEAP: received Phase 2: code=1 identifier=8 length=11 >EAP-PEAP: Phase 2 Request: type=33 >EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01 >EAP-TLV: Result TLV - hexdump(len=2): 00 01 >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 08 00 50 19 00 17 03 01 00 20 53 f8 df 6c 46 ab 9a e1 11 b9 d2 f4 e3 c3 b2 77 f9 e2 4a 5e ca 69 a1 72 4c 01 28 5d 3d 73 ce 29 17 03 01 00 20 f0 37 0a 96 09 fb 23 08 5f ea 57 0f e3 a8 bb f5 95 7b 66 be 07 58 9c 3f 5e 36 d0 a7 8b b7 63 05 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=8): 01 00 00 04 03 08 00 04 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Success >EAP: EAP entering state SUCCESS >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state SUCCESS >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 60 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >EAPOL: Successfully fetched key (len=32) >WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED] >WPA: Renewed SNonce - hexdump(len=32): 19 3c ee 8b 81 29 7d dd 72 ab 22 3e 5d db 75 4b bb c8 c2 6b 97 8c 90 cc 88 00 0e 08 63 3f 04 ca >WPA: PTK derivation - A1=00:1d:e0:98:a5:dd A2=00:c0:49:1c:ec:d4 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 19 3c ee 8b 81 29 7d dd 72 ab 22 3e 5d db 75 4b bb c8 c2 6b 97 8c 90 cc 88 00 0e 08 63 3f 04 ca 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4a 18 df b8 28 ae 2a 60 6e 09 df 2c 8f 68 f9 82 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d5 52 cd 28 74 15 32 55 73 6f 6d 23 cc 33 e4 be 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=121 > EAPOL-Key type=254 > key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) > key_length=32 key_data_length=26 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 60 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): d5 52 cd 28 74 15 32 55 73 6f 6d 23 cc 33 e4 be >WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d5 52 cd 28 74 15 32 55 73 6f 6d 23 cc 33 e4 be 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 3 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >WPA: Sending EAPOL-Key 4/4 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bb 44 e3 01 ef 6e c3 43 92 17 95 6c 80 0b 03 1f 00 00 >WPA: Installing PTK to the driver. >WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 >State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 62 4f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 79 a9 5b 72 84 8e 05 e7 b5 33 28 34 e9 6d d4 24 00 20 d4 a0 46 28 d1 a5 16 4a c7 37 c4 51 4f 39 a0 ff 17 35 4a 3f 48 7f 29 92 82 fd 65 9a 31 b0 c6 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 62 > key_rsc - hexdump(len=8): 4f 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 79 a9 5b 72 84 8e 05 e7 b5 33 28 34 e9 6d d4 24 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 62 4f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 79 a9 5b 72 84 8e 05 e7 b5 33 28 34 e9 6d d4 24 00 20 d4 a0 46 28 d1 a5 16 4a c7 37 c4 51 4f 39 a0 ff 17 35 4a 3f 48 7f 29 92 82 fd 65 9a 31 b0 c6 00 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 4f 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 34 55 fb 94 2a ed 5e f7 93 1a da 50 54 27 7e 2d 00 00 >WPA: Key negotiation completed with 00:c0:49:1c:ec:d4 [PTK=TKIP GTK=TKIP] >Cancelling scan request >Cancelling authentication timeout >Removed BSSID 00:c0:49:1c:ec:d4 from blacklist >State: GROUP_HANDSHAKE -> COMPLETED >CTRL-EVENT-CONNECTED - Connection to 00:c0:49:1c:ec:d4 completed (reauth) [id=0 id_str=] >wpa_driver_wext_set_operstate: operstate 0->1 (UP) >WEXT: Operstate: linkmode=-1, operstate=6 >EAPOL: External notification - portValid=1 >EAPOL: SUPP_PAE entering state AUTHENTICATED >EAPOL authentication completed successfully >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 63 51 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c9 df e9 6a 4e b8 6e d9 8c 9c 78 15 ba f8 d8 28 00 20 07 96 9c d5 49 fe b6 74 ae d0 ff 14 5c 68 57 35 67 ff 08 be 0b f3 4b da 5e d2 77 47 10 6e 70 a2 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 63 > key_rsc - hexdump(len=8): 51 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): c9 df e9 6a 4e b8 6e d9 8c 9c 78 15 ba f8 d8 28 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 63 51 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c9 df e9 6a 4e b8 6e d9 8c 9c 78 15 ba f8 d8 28 00 20 07 96 9c d5 49 fe b6 74 ae d0 ff 14 5c 68 57 35 67 ff 08 be 0b f3 4b da 5e d2 77 47 10 6e 70 a2 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 51 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8e 93 8c 75 4a f0 f6 12 0f 12 c9 99 a4 d1 41 fd 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 64 51 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 96 01 aa 53 35 65 3b 87 41 b3 15 10 ab 68 ef 00 20 8c cd 23 c4 cf d8 e3 f7 d2 d6 eb a7 c0 3b 36 ec b2 dc d6 17 28 a0 92 38 4e ce 1d c1 8e 26 a9 5a >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 64 > key_rsc - hexdump(len=8): 51 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 02 96 01 aa 53 35 65 3b 87 41 b3 15 10 ab 68 ef >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 64 51 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 96 01 aa 53 35 65 3b 87 41 b3 15 10 ab 68 ef 00 20 8c cd 23 c4 cf d8 e3 f7 d2 d6 eb a7 c0 3b 36 ec b2 dc d6 17 28 a0 92 38 4e ce 1d c1 8e 26 a9 5a >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 51 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 39 5f f1 8f 5b d0 09 7e cf a8 8c a8 e6 f0 66 44 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >Setting scan request: 0 sec 100000 usec >Added BSSID 00:c0:49:1c:ec:d4 into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: COMPLETED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >BSSID 00:00:00:00:00:00 blacklist count incremented to 16 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >Driver did not support SIOCSIWENCODEEXT >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b1a len=16 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b2a len=16 >State: DISCONNECTED -> SCANNING >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=5): > 53 53 49 44 31 NETWORKSID >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:c0:49:fd:9f:80 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - blacklisted >1: 00:c0:49:1c:ec:d4 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > selected based on WPA IE > selected WPA AP 00:c0:49:1c:ec:d4 ssid='NETWORKSID' >Try to find non-WPA AP >Trying to associate with 00:c0:49:1c:ec:d4 (SSID='NETWORKSID' freq=2412 MHz) >Cancelling scan request >WPA: clearing own WPA/RSN IE >Automatic auth_alg selection: 0x1 >WPA: using IEEE 802.11i/D3.0 >WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 1 proto 1 >WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >WPA: clearing AP RSN IE >WPA: using GTK TKIP >WPA: using PTK TKIP >WPA: using KEY_MGMT 802.1X >WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >No keys have been configured - skip key clearing >wpa_driver_wext_set_drop_unencrypted >State: SCANNING -> ASSOCIATING >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_associate >Setting authentication timeout: 20 sec 0 usec >EAPOL: External notification - portControl=Auto >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b06 len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b04 len=16 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b1a len=21 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:c0:49:fd:9f:80 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - blacklisted >1: 00:c0:49:1c:ec:d4 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > selected based on WPA IE > selected WPA AP 00:c0:49:1c:ec:d4 ssid='NETWORKSID' >Try to find non-WPA AP >Already associated with the selected AP. >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=221 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00055353494431010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f201 RespIEs=010882848b0c1296182432043048606cdd180050f20201010000030f0000270f000052f75d0072732e00)' >Association info event >req_ies - hexdump(len=47): 00 05 53 53 49 44 31 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 00 00 03 0f 00 00 27 0f 00 00 52 f7 5d 00 72 73 2e 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:c0:49:1c:ec:d4 >State: ASSOCIATING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:c0:49:1c:ec:d4 >No keys have been configured - skip key clearing >Associated with 00:c0:49:1c:ec:d4 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=14): 01 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=5): > 68 65 6c 6c 6f hello >EAP: using anonymous identity - hexdump_ascii(len=9): > 61 6e 6f 6e 79 6d 6f 75 73 anonymous >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=18): 01 00 00 0e 02 00 00 0e 01 61 6e 6f 6e 79 6d 6f 75 73 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=10): 01 00 00 06 01 01 00 06 19 20 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=1 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Using previous method data for fast re-authentication >EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >EAP: EAP entering state METHOD >SSL: Received packet(len=6) - Flags 0x20 >EAP-PEAP: Start (server ver=0, own ver=0) >EAP-PEAP: Using PEAP version 0 >SSL: (where=0x10 ret=0x1) >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:before/connect initialization >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client hello A >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read server hello A >SSL: SSL_connect - want more data >SSL: 143 bytes pending from ssl_out >SSL: 143 bytes left to be sent out (of total 143 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=153): 01 00 00 95 02 01 00 95 19 00 16 03 01 00 8a 01 00 00 86 03 01 48 6d ed 82 41 7a 19 8a 33 9f 10 31 4a f6 0e 1d 71 fb f3 e2 51 37 90 a3 1f 5b fe be 09 c8 5e 0c 20 4d 8f 1c e7 b4 27 6c ef dd 68 7a 99 66 1c 27 cb e3 d7 a9 d8 80 dd ec 53 a2 7a dc 6e 82 b9 77 72 00 38 00 39 00 38 00 35 00 88 00 87 00 84 00 16 00 13 00 0a 00 33 00 32 00 2f 00 9a 00 99 00 96 00 45 00 44 00 41 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 02 01 00 00 04 00 23 00 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1038): 01 00 04 0a 01 02 04 0a 19 c0 00 00 07 f7 16 03 01 00 4a 02 00 00 46 03 01 48 6d ed bd 8a d3 c7 ce 17 e1 2c ba 9b a9 2a 36 a3 90 20 88 8e 3e 07 01 80 00 68 07 42 90 77 34 20 82 29 eb 42 67 db ad 92 a5 1e c9 45 d9 09 7b f6 93 b8 d5 4b ad dd 29 23 56 33 e6 f7 56 2e db 5b 00 39 00 16 03 01 06 88 0b 00 06 84 00 06 81 00 02 c2 30 82 02 be 30 82 02 27 a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 35 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 37 31 31 32 31 31 30 34 31 35 36 5a 30 81 8e 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 10 30 0e 06 03 55 04 03 13 07 52 4f 4f 54 20 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 e1 14 fe 0f 20 51 89 c1 68 0d 84 f7 15 45 0d 82 cf ce eb c4 57 3a dc 1e 8d 88 bd 0d 12 00 3a a2 8d 79 47 3e 3d a2 6e ab 68 a9 05 32 f3 e1 85 13 f9 a0 28 01 e0 4d df 2b 5c 99 fd d8 3f 62 75 f6 81 42 63 63 ef bc 67 8e 22 5e a2 f4 da d9 f1 40 71 26 11 3a 0a 73 2b 2f 18 db 20 98 5f c6 a1 fc d0 de 80 e0 c5 73 56 c4 9a 15 0c 0a 3b a7 89 bf 9b eb 63 13 06 01 83 83 be 7b 0a 74 af 7f 4a cf 02 03 01 00 01 a3 17 30 15 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 4c 8d 15 93 47 26 0f 59 2e 4e 7f d0 16 65 e4 8c c0 4c 73 17 07 9a 90 c1 52 27 b9 3e 56 8c 0c fa 9b 1c b8 90 a3 e4 2c 82 61 70 86 2d 8a c3 ca 45 14 b5 bb 55 00 ca 15 7c 0f 33 3f 19 08 37 e0 88 8e 53 e5 5a eb a5 78 eb 92 c8 89 95 7b c7 79 40 59 c7 4c 90 c2 c2 07 b9 68 80 5f 21 ff f4 b0 fd 83 ab 0f 97 e8 b0 f0 f3 80 d8 80 67 6a 9b 16 d3 26 af 4a 88 8e f2 a0 4b a6 72 b2 1c d6 5c c4 d5 00 03 b9 30 82 03 b5 30 82 03 1e a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 33 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 38 31 31 32 30 31 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1034) - Flags 0xc0 >SSL: TLS Message Length: 2039 >SSL: Need 1015 bytes more input data >SSL: Building ACK (type=25 id=2 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1025): 01 00 03 fd 01 03 03 fd 19 00 30 34 31 35 36 5a 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 97 8f 78 af a5 f4 70 a1 00 41 5b fa 62 28 19 69 f6 e5 f7 6a 1a 27 85 ca 8a 15 00 55 54 15 97 68 0b 2e 55 39 e4 b0 6b 76 55 86 84 53 7c 56 fc 74 52 da 73 a3 54 ae 74 47 64 9e 1f ff 1b 1e 3d 1c 8b c1 8d af 89 94 e9 0e d0 c9 56 83 52 c4 50 a9 24 81 10 3d 0a e7 7e 6e 7b 30 ae fd 1b 4d f8 96 87 3f 7d 72 2a cd fa 22 f9 cd 29 17 f4 da 15 eb de 6a de b3 e1 9d 2a c5 3b 3d ea 3c f6 a6 a6 71 02 03 01 00 01 a3 82 01 01 30 81 fe 30 1d 06 03 55 1d 0e 04 16 04 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f 30 81 ce 06 03 55 1d 23 04 81 c6 30 81 c3 80 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f a1 81 9f a4 81 9c 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 82 09 00 d9 c7 09 10 ab 9f 78 33 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 74 1a c9 c3 9b 7a a4 5a e4 16 4c d1 af 8e b6 95 20 80 ca 9e 5f 89 82 ba e7 99 63 da 67 b9 c0 7b 86 aa 51 3d 24 41 58 dd d9 2d e7 cb e6 6f 3a 8f 15 5e ca 21 5a f7 46 21 a3 bb b5 f6 9c d0 82 1b b5 f5 3d c9 ed 94 51 aa f2 ff ca 34 d0 48 05 2c 66 92 6f 50 c7 49 0e c4 2d 1d 19 a3 9c ca b9 f9 c0 b1 d0 17 b9 fe 80 90 d6 dd 2b 38 70 74 4e a7 53 99 3e bf cd 0e d4 79 bb 2f f5 8e ba 6c d1 69 16 03 01 01 0d 0c 00 01 09 00 40 c3 4a f6 2a e3 ab 87 b9 1c 92 96 23 c3 a2 11 50 ae 15 b2 0c de bc fb 0d 00 a3 98 83 d1 d1 c7 63 1d df 5f 35 06 a0 fa 4c 4e 01 3f 17 c1 05 aa 50 d0 3b 48 16 46 75 d5 37 8e 2c 82 9b 06 17 11 bb 00 01 02 00 40 60 9a 84 b2 c2 53 c0 74 36 7d 33 91 7a c8 d4 12 08 28 40 7b c2 68 e0 ca 55 6f e5 fd 88 88 8a f5 1f 41 8b 6b 2b e2 31 0d fa e1 eb a5 5c 1d ab ab 59 b0 73 ec 4c 54 e0 f7 6b 33 54 64 08 82 de f0 00 80 e0 85 2c 74 49 d0 c1 2e d1 b4 87 5c aa b9 b1 f0 a2 1f 88 a9 34 96 e2 49 7f 04 5d 74 13 3f f0 dc 09 30 97 9a 35 6e 7b bf 2d 8e bf e5 a9 a1 07 42 19 c1 32 c3 a4 07 4d 1e 9d 75 39 9d 59 fb 0c 99 ff 66 0e 3b 10 53 5c a3 bd c8 60 77 c4 8d 55 a3 e3 92 b1 a7 db d7 2c ce 4c e7 8e 85 e5 33 e3 8f 11 e7 22 c6 4d 42 dd 9f 06 1b 36 b1 ba 81 58 60 c6 59 91 85 73 f5 e0 2f 2e 98 3f ba 8f 2c f1 02 16 03 01 00 04 0e 00 00 00 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1021) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server hello A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server certificate A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server done A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write change cipher spec A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write finished A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 flush data >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read finished A >SSL: SSL_connect - want more data >SSL: 134 bytes pending from ssl_out >SSL: 134 bytes left to be sent out (of total 134 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=144): 01 00 00 8c 02 03 00 8c 19 00 16 03 01 00 46 10 00 00 42 00 40 2f af e5 e4 0b 64 e5 77 a4 81 19 c5 9f 15 2b 0c 07 e8 8a 3a f9 39 50 25 97 9b ae 46 9c 2b 12 23 5a c9 9b 97 7e f1 49 95 c0 2c 2f 22 cb e1 7c bd f7 22 c9 d9 fd cf 25 b8 86 df 2d 95 ca f1 e2 b4 14 03 01 00 01 01 16 03 01 00 30 80 8d b1 dc fb ea 09 09 a7 a0 bd 01 d5 e6 47 63 db d6 32 80 69 b8 05 dc 69 d5 81 af 71 ef 11 41 de b3 76 7b 80 b0 c2 14 bd 40 19 d6 7d 87 b2 2b >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=69): 01 00 00 41 01 04 00 41 19 00 14 03 01 00 01 01 16 03 01 00 30 7d af 30 4b c1 3a e4 aa 82 d5 7e cc 02 e7 14 bc d7 c6 53 b5 f5 2b 67 fd 4e 8f 5f 22 e0 cd 90 bf 21 a9 55 9d 93 e3 a9 ad 66 cd cb c3 65 e8 02 72 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=65) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read finished A >SSL: (where=0x20 ret=0x1) >SSL: (where=0x1002 ret=0x1) >SSL: 0 bytes pending from ssl_out >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >SSL: No data to be sent out >EAP-PEAP: TLS done, proceed to Phase 2 >EAP-PEAP: using label 'client EAP encryption' in key derivation >EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] >EAP-PEAP: Workaround - allow outer EAP-Success to terminate PEAP resumption >SSL: Building ACK (type=25 id=4 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=COND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 05 00 2b 19 00 17 03 01 00 20 94 2c f5 24 d8 9f 8b 18 c8 8e 39 22 bf c4 a4 59 04 60 02 a3 d6 89 f0 ef b9 ec d9 bf 03 d5 a6 ee >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 05 00 05 01 >EAP-PEAP: received Phase 2: code=1 identifier=5 length=5 >EAP-PEAP: Phase 2 Request: type=1 >EAP: using real identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=10): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 05 00 50 19 00 17 03 01 00 20 63 15 4c 59 9d 8a 96 57 31 b7 bc 6d 26 9e ef 70 e7 ad 9e 80 11 a9 d4 e0 35 9a 5a e8 dc e9 a6 78 17 03 01 00 20 17 43 88 38 c8 fe 42 82 65 ed 16 d7 c6 e3 ce 47 09 a5 c6 83 54 4c c9 c7 a0 b8 01 1f da 85 c6 dd >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=63): 01 00 00 3b 01 06 00 3b 19 00 17 03 01 00 30 70 48 f2 1e c0 48 2b f6 d9 b8 cb 97 5d 8e 34 8b a4 7e 3b 6d b1 9e d9 2e d8 7e de 0c b0 7f 57 d7 39 a2 f5 88 09 60 9f 1a 6a 63 70 27 e0 15 52 15 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=59) - Flags 0x00 >EAP-PEAP: received 53 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=27): 1a 01 06 00 1a 10 cb aa c0 33 22 67 4b 56 1b e2 04 47 cb d9 0f 89 78 62 6f 74 6c >EAP-PEAP: received Phase 2: code=1 identifier=6 length=31 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 6 mschapv2_id 6 >EAP-MSCHAPV2: Received challenge >EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-MSCHAPV2: Generating Challenge Response >MSCHAPV2: Identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: Username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: auth_challenge - hexdump(len=16): cb aa c0 33 22 67 4b 56 1b e2 04 47 cb d9 0f 89 >MSCHAPV2: peer_challenge - hexdump(len=16): cd f9 1b 80 5f 5d 97 1e db 47 37 a7 71 cd 71 7c >MSCHAPV2: username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: password - hexdump_ascii(len=8): [REMOVED] >MSCHAPV2: NT Response - hexdump(len=24): 7f 50 4b 58 e8 32 17 42 2d b0 23 bb 8c b7 5d a4 c3 7f 78 5d 88 c0 f2 1f >MSCHAPV2: Auth Response - hexdump(len=20): e1 94 69 43 ad 87 27 8e 43 f1 c6 09 ec e6 08 66 9c 57 a9 07 >MSCHAPV2: Master Key - hexdump(len=16): [REMOVED] >EAP-MSCHAPV2: TX identifier 6 mschapv2_id 6 (response) >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=64): [REMOVED] >SSL: 138 bytes left to be sent out (of total 138 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=148): 01 00 00 90 02 06 00 90 19 00 17 03 01 00 20 cf d7 d2 b8 d1 f0 37 bc b6 67 df ef 60 e8 21 82 98 a3 08 8f 52 56 3d 11 d5 b7 ee cb d6 9a 19 b7 17 03 01 00 60 76 30 14 9d 96 82 46 dc 31 16 b8 ec b4 6f 4d d2 30 94 ab a0 e9 29 ce a0 d3 94 e4 cc d4 e7 57 80 b9 e7 1c aa f0 ed 19 33 3c 50 5a 78 b5 49 39 4d 23 59 f4 b5 a2 cc a2 fb 32 6e ac 07 81 bc 48 69 10 42 d1 82 09 91 71 d5 b6 0c c4 2b 9a d2 87 92 48 3e 5c 37 ba 5b d1 9f 49 e1 48 e6 32 6b 29 c6 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=95): 01 00 00 5b 01 07 00 5b 19 00 17 03 01 00 50 c1 18 e3 e5 ef a3 fa 55 f7 ef f4 f4 2b 87 93 cf 1b c9 70 44 61 0a 11 70 d5 e1 ba fc ab a1 26 d4 4d 3c 9c 0d dd 4e 4b 60 4d 6a 2a 46 8f 57 66 9c 97 2a 89 32 9e 63 bf 0b 50 e8 28 98 af 62 9b e2 25 a5 1c 18 d0 38 a3 d2 f8 6b 50 7d dc 3a 2e f5 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=91) - Flags 0x00 >EAP-PEAP: received 85 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 06 00 2e 53 3d 45 31 39 34 36 39 34 33 41 44 38 37 32 37 38 45 34 33 46 31 43 36 30 39 45 43 45 36 30 38 36 36 39 43 35 37 41 39 30 37 >EAP-PEAP: received Phase 2: code=1 identifier=7 length=51 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 7 mschapv2_id 6 >EAP-MSCHAPV2: Received success >EAP-MSCHAPV2: Success message - hexdump_ascii(len=0): >EAP-MSCHAPV2: Authentication succeeded >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 07 00 50 19 00 17 03 01 00 20 0c 54 75 ef b0 04 4f 28 34 c4 a9 dd 4a bd 2a 4c f9 7f 3e c0 cf 62 8e b4 f3 e7 23 9a 85 4b d0 46 17 03 01 00 20 15 d2 e7 cb 87 be 68 f5 36 3a dc 49 d3 9b fd 1a d0 30 9e 8b 61 b0 21 0c 9e 37 f5 54 3b b7 25 72 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 08 00 2b 19 00 17 03 01 00 20 3b d1 11 f3 31 bd 29 4f cd b9 79 fe 8d 5d fb 69 9b f7 3f f2 5c 65 3e 5f 13 88 09 84 57 52 19 bd >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 08 00 0b 21 80 03 00 02 00 01 >EAP-PEAP: received Phase 2: code=1 identifier=8 length=11 >EAP-PEAP: Phase 2 Request: type=33 >EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01 >EAP-TLV: Result TLV - hexdump(len=2): 00 01 >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 08 00 50 19 00 17 03 01 00 20 6d f6 4a a6 54 bd 15 bc 53 0f cd 87 73 c9 68 88 4c 69 ce 3f 06 a5 5b 56 7d a1 4a 92 21 b6 5b 5b 17 03 01 00 20 07 ff 3a 9b 13 03 f6 87 84 5f d7 35 b0 53 13 73 00 e2 3d 93 e0 18 84 1f c0 32 c9 2d d8 8d a0 0d >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=8): 01 00 00 04 03 08 00 04 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Success >EAP: EAP entering state SUCCESS >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state SUCCESS >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 65 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 65 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 65 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >EAPOL: Successfully fetched key (len=32) >WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED] >WPA: Renewed SNonce - hexdump(len=32): ee 98 99 e9 d9 d5 99 46 56 96 14 b7 d0 c0 2a 24 22 eb 86 35 c2 e2 be a9 fa 36 0f 9a f9 76 66 10 >WPA: PTK derivation - A1=00:1d:e0:98:a5:dd A2=00:c0:49:1c:ec:d4 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 ee 98 99 e9 d9 d5 99 46 56 96 14 b7 d0 c0 2a 24 22 eb 86 35 c2 e2 be a9 fa 36 0f 9a f9 76 66 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 57 6d 71 ec 9a 2f eb af c3 d7 bb 5a 30 61 42 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 65 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3f 10 47 df 8e 2a 74 ca cf a4 eb 56 e3 86 94 a2 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=121 > EAPOL-Key type=254 > key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) > key_length=32 key_data_length=26 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 65 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 3f 10 47 df 8e 2a 74 ca cf a4 eb 56 e3 86 94 a2 >WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 65 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3f 10 47 df 8e 2a 74 ca cf a4 eb 56 e3 86 94 a2 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 3 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >WPA: Sending EAPOL-Key 4/4 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 35 d7 5c 86 d0 70 4f be e0 c3 26 70 c1 b8 15 b1 00 00 >WPA: Installing PTK to the driver. >WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 >State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 67 53 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 5e 08 19 b2 eb ea 25 e3 c7 85 de d7 67 f0 3f 00 20 69 bf b9 20 81 c0 59 9b c8 f8 8f 31 98 4e d1 21 12 d0 d5 85 da 96 ec 31 76 91 8c 68 cd 8c 56 66 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 67 > key_rsc - hexdump(len=8): 53 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): d8 5e 08 19 b2 eb ea 25 e3 c7 85 de d7 67 f0 3f >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 67 53 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 5e 08 19 b2 eb ea 25 e3 c7 85 de d7 67 f0 3f 00 20 69 bf b9 20 81 c0 59 9b c8 f8 8f 31 98 4e d1 21 12 d0 d5 85 da 96 ec 31 76 91 8c 68 cd 8c 56 66 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 53 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9e 80 87 21 fa 39 bf 72 be e0 e0 b7 81 20 64 36 00 00 >WPA: Key negotiation completed with 00:c0:49:1c:ec:d4 [PTK=TKIP GTK=TKIP] >Cancelling scan request >Cancelling authentication timeout >Removed BSSID 00:c0:49:1c:ec:d4 from blacklist >State: GROUP_HANDSHAKE -> COMPLETED >CTRL-EVENT-CONNECTED - Connection to 00:c0:49:1c:ec:d4 completed (reauth) [id=0 id_str=] >wpa_driver_wext_set_operstate: operstate 0->1 (UP) >WEXT: Operstate: linkmode=-1, operstate=6 >EAPOL: External notification - portValid=1 >EAPOL: SUPP_PAE entering state AUTHENTICATED >EAPOL authentication completed successfully >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 68 53 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 22 e2 e4 82 7a 63 db d9 13 eb 40 6e 0c 23 bd 3e 00 20 ea cb 83 a2 de d1 a6 01 3d 5a 0f bb 25 b4 d2 86 f5 63 8f f7 6f 99 f2 44 bd fc b6 25 85 d4 48 10 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 68 > key_rsc - hexdump(len=8): 53 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 22 e2 e4 82 7a 63 db d9 13 eb 40 6e 0c 23 bd 3e >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 68 53 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 22 e2 e4 82 7a 63 db d9 13 eb 40 6e 0c 23 bd 3e 00 20 ea cb 83 a2 de d1 a6 01 3d 5a 0f bb 25 b4 d2 86 f5 63 8f f7 6f 99 f2 44 bd fc b6 25 85 d4 48 10 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 53 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 42 c2 d5 ab f4 3e e2 f1 b0 73 34 90 86 d6 d7 c9 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 69 54 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 a1 48 f6 97 4c 55 44 c6 fd 22 87 93 dc 6f e3 00 20 ee 3c 2f 44 58 47 29 89 41 68 2c 2b 4c 2e 5d b9 38 72 53 bd 95 93 3b f0 14 58 2b ad cc 1c 1d 5b >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 69 > key_rsc - hexdump(len=8): 54 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 21 a1 48 f6 97 4c 55 44 c6 fd 22 87 93 dc 6f e3 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 69 54 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 a1 48 f6 97 4c 55 44 c6 fd 22 87 93 dc 6f e3 00 20 ee 3c 2f 44 58 47 29 89 41 68 2c 2b 4c 2e 5d b9 38 72 53 bd 95 93 3b f0 14 58 2b ad cc 1c 1d 5b >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 54 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 67 16 f3 6d ca d6 b3 69 af 53 f8 e2 b0 74 8d 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >EAPOL: startWhen --> 0 >RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >Setting scan request: 0 sec 100000 usec >Added BSSID 00:c0:49:1c:ec:d4 into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: COMPLETED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >BSSID 00:00:00:00:00:00 blacklist count incremented to 17 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >Driver did not support SIOCSIWENCODEEXT >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=221 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00055353494431010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f201 RespIEs=010882848b0c1296182432043048606cdd180050f20201010000030f0000270f000052f75d0072732e00)' >Association info event >req_ies - hexdump(len=47): 00 05 53 53 49 44 31 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 00 00 03 0f 00 00 27 0f 00 00 52 f7 5d 00 72 73 2e 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:c0:49:1c:ec:d4 >State: SCANNING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:c0:49:1c:ec:d4 >No keys have been configured - skip key clearing >Associated with 00:c0:49:1c:ec:d4 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=4): 01 01 00 00 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:c0:49:fd:9f:80 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - blacklisted >1: 00:c0:49:1c:ec:d4 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > selected based on WPA IE > selected WPA AP 00:c0:49:1c:ec:d4 ssid='NETWORKSID' >Try to find non-WPA AP >Already associated with the selected AP. >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=14): 01 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=5): > 68 65 6c 6c 6f hello >EAP: using anonymous identity - hexdump_ascii(len=9): > 61 6e 6f 6e 79 6d 6f 75 73 anonymous >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=18): 01 00 00 0e 02 00 00 0e 01 61 6e 6f 6e 79 6d 6f 75 73 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=10): 01 00 00 06 01 01 00 06 19 20 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=1 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Using previous method data for fast re-authentication >EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >EAP: EAP entering state METHOD >SSL: Received packet(len=6) - Flags 0x20 >EAP-PEAP: Start (server ver=0, own ver=0) >EAP-PEAP: Using PEAP version 0 >SSL: (where=0x10 ret=0x1) >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:before/connect initialization >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client hello A >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read server hello A >SSL: SSL_connect - want more data >SSL: 143 bytes pending from ssl_out >SSL: 143 bytes left to be sent out (of total 143 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=153): 01 00 00 95 02 01 00 95 19 00 16 03 01 00 8a 01 00 00 86 03 01 48 6d ed 89 42 56 0d 41 76 85 89 5c 41 6d e1 5f e0 e4 61 16 1d 2d b7 a0 f2 2b d5 71 35 f9 6f 8c 20 82 29 eb 42 67 db ad 92 a5 1e c9 45 d9 09 7b f6 93 b8 d5 4b ad dd 29 23 56 33 e6 f7 56 2e db 5b 00 38 00 39 00 38 00 35 00 88 00 87 00 84 00 16 00 13 00 0a 00 33 00 32 00 2f 00 9a 00 99 00 96 00 45 00 44 00 41 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 02 01 00 00 04 00 23 00 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1038): 01 00 04 0a 01 02 04 0a 19 c0 00 00 07 f7 16 03 01 00 4a 02 00 00 46 03 01 48 6d ed c4 65 ed 7b 76 d6 47 82 51 e4 36 74 72 79 45 9f 73 80 96 c0 0e ec cf ee 85 37 c1 9a ea 20 ee b3 f6 8a 10 6b d8 06 e2 dd 21 02 e0 36 5c 71 0b 9b e5 d6 75 3d d4 b4 c3 0c 46 d0 57 6f d4 c2 00 39 00 16 03 01 06 88 0b 00 06 84 00 06 81 00 02 c2 30 82 02 be 30 82 02 27 a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 35 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 37 31 31 32 31 31 30 34 31 35 36 5a 30 81 8e 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 10 30 0e 06 03 55 04 03 13 07 52 4f 4f 54 20 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 e1 14 fe 0f 20 51 89 c1 68 0d 84 f7 15 45 0d 82 cf ce eb c4 57 3a dc 1e 8d 88 bd 0d 12 00 3a a2 8d 79 47 3e 3d a2 6e ab 68 a9 05 32 f3 e1 85 13 f9 a0 28 01 e0 4d df 2b 5c 99 fd d8 3f 62 75 f6 81 42 63 63 ef bc 67 8e 22 5e a2 f4 da d9 f1 40 71 26 11 3a 0a 73 2b 2f 18 db 20 98 5f c6 a1 fc d0 de 80 e0 c5 73 56 c4 9a 15 0c 0a 3b a7 89 bf 9b eb 63 13 06 01 83 83 be 7b 0a 74 af 7f 4a cf 02 03 01 00 01 a3 17 30 15 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 4c 8d 15 93 47 26 0f 59 2e 4e 7f d0 16 65 e4 8c c0 4c 73 17 07 9a 90 c1 52 27 b9 3e 56 8c 0c fa 9b 1c b8 90 a3 e4 2c 82 61 70 86 2d 8a c3 ca 45 14 b5 bb 55 00 ca 15 7c 0f 33 3f 19 08 37 e0 88 8e 53 e5 5a eb a5 78 eb 92 c8 89 95 7b c7 79 40 59 c7 4c 90 c2 c2 07 b9 68 80 5f 21 ff f4 b0 fd 83 ab 0f 97 e8 b0 f0 f3 80 d8 80 67 6a 9b 16 d3 26 af 4a 88 8e f2 a0 4b a6 72 b2 1c d6 5c c4 d5 00 03 b9 30 82 03 b5 30 82 03 1e a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 33 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 38 31 31 32 30 31 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1034) - Flags 0xc0 >SSL: TLS Message Length: 2039 >SSL: Need 1015 bytes more input data >SSL: Building ACK (type=25 id=2 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1025): 01 00 03 fd 01 03 03 fd 19 00 30 34 31 35 36 5a 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 97 8f 78 af a5 f4 70 a1 00 41 5b fa 62 28 19 69 f6 e5 f7 6a 1a 27 85 ca 8a 15 00 55 54 15 97 68 0b 2e 55 39 e4 b0 6b 76 55 86 84 53 7c 56 fc 74 52 da 73 a3 54 ae 74 47 64 9e 1f ff 1b 1e 3d 1c 8b c1 8d af 89 94 e9 0e d0 c9 56 83 52 c4 50 a9 24 81 10 3d 0a e7 7e 6e 7b 30 ae fd 1b 4d f8 96 87 3f 7d 72 2a cd fa 22 f9 cd 29 17 f4 da 15 eb de 6a de b3 e1 9d 2a c5 3b 3d ea 3c f6 a6 a6 71 02 03 01 00 01 a3 82 01 01 30 81 fe 30 1d 06 03 55 1d 0e 04 16 04 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f 30 81 ce 06 03 55 1d 23 04 81 c6 30 81 c3 80 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f a1 81 9f a4 81 9c 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 82 09 00 d9 c7 09 10 ab 9f 78 33 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 74 1a c9 c3 9b 7a a4 5a e4 16 4c d1 af 8e b6 95 20 80 ca 9e 5f 89 82 ba e7 99 63 da 67 b9 c0 7b 86 aa 51 3d 24 41 58 dd d9 2d e7 cb e6 6f 3a 8f 15 5e ca 21 5a f7 46 21 a3 bb b5 f6 9c d0 82 1b b5 f5 3d c9 ed 94 51 aa f2 ff ca 34 d0 48 05 2c 66 92 6f 50 c7 49 0e c4 2d 1d 19 a3 9c ca b9 f9 c0 b1 d0 17 b9 fe 80 90 d6 dd 2b 38 70 74 4e a7 53 99 3e bf cd 0e d4 79 bb 2f f5 8e ba 6c d1 69 16 03 01 01 0d 0c 00 01 09 00 40 c3 4a f6 2a e3 ab 87 b9 1c 92 96 23 c3 a2 11 50 ae 15 b2 0c de bc fb 0d 00 a3 98 83 d1 d1 c7 63 1d df 5f 35 06 a0 fa 4c 4e 01 3f 17 c1 05 aa 50 d0 3b 48 16 46 75 d5 37 8e 2c 82 9b 06 17 11 bb 00 01 02 00 40 88 ee a0 82 db 52 b3 ec c0 cd f9 f7 6e 56 36 7c a4 c6 08 8e 1c b9 2c 65 ba ce e2 4d 93 db b8 04 94 b4 d3 f9 21 55 5d 09 29 9f ec 33 33 5a 87 95 3d f7 d6 e8 05 80 0b 05 b8 b9 7a b1 2e b4 65 a8 00 80 18 b1 b2 5a 71 ca 49 23 6f 42 54 75 5b 9f 3b 8f 8c 46 70 9f 70 4e dd 23 8d e7 21 d1 14 ce 60 e5 ed 32 1c ae 53 11 75 5d c6 e4 ac 24 79 50 05 48 7f a2 82 76 0a e9 77 8d d8 ed d8 ef 72 0e 4c 6c 7c c1 bd 5f 91 bd 36 62 cf 6b f2 24 e1 95 09 8f ae 11 a2 55 0a 62 9f 1d 1b 53 4c ee 3c a9 e5 98 c4 5f 2e 73 69 a2 fd d5 ae da 1b 02 e0 2e 2e 34 67 9c 8b fb 16 e4 ee 65 ba fa 57 eb f9 ae bf 00 16 03 01 00 04 0e 00 00 00 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1021) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server hello A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server certificate A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server done A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write change cipher spec A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write finished A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 flush data >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read finished A >SSL: SSL_connect - want more data >SSL: 134 bytes pending from ssl_out >SSL: 134 bytes left to be sent out (of total 134 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=144): 01 00 00 8c 02 03 00 8c 19 00 16 03 01 00 46 10 00 00 42 00 40 bf 7d b0 90 0f b2 72 90 2b bc 3c 6e 4b ad 6b 4e d8 81 5e c3 85 cb d6 1d 4f 20 09 08 a8 ff 36 00 89 5b ac 66 58 56 58 6e 6c c7 0e cf d0 d1 2c f5 0b 43 9f 3a 23 d7 5e 2e 3b 8f 02 70 47 d7 9c 52 14 03 01 00 01 01 16 03 01 00 30 ba c3 b2 1f 10 2c 94 04 22 77 9d 10 c2 b9 2c c7 c1 21 cf 75 c2 85 e5 12 7f e7 98 0e 05 4e 49 ab 57 01 0a 02 28 15 1e 93 63 b2 47 72 56 fa 98 f8 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=69): 01 00 00 41 01 04 00 41 19 00 14 03 01 00 01 01 16 03 01 00 30 9c d9 0d 5f b7 4f 03 ab 3b e6 73 f6 3c 40 f3 e2 20 35 b3 f5 f2 f3 79 9c 8e cc 4b 7b e7 45 fa a7 98 7b e6 3e a9 7b 31 11 ea 67 a3 10 8e f4 68 12 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=65) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read finished A >SSL: (where=0x20 ret=0x1) >SSL: (where=0x1002 ret=0x1) >SSL: 0 bytes pending from ssl_out >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >SSL: No data to be sent out >EAP-PEAP: TLS done, proceed to Phase 2 >EAP-PEAP: using label 'client EAP encryption' in key derivation >EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] >EAP-PEAP: Workaround - allow outer EAP-Success to terminate PEAP resumption >SSL: Building ACK (type=25 id=4 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=COND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 05 00 2b 19 00 17 03 01 00 20 61 6c 29 66 23 60 7a 56 85 43 a4 28 50 1a 39 8f 16 6f 37 f2 68 8b 33 ac 15 35 b4 7a c3 55 a8 84 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 05 00 05 01 >EAP-PEAP: received Phase 2: code=1 identifier=5 length=5 >EAP-PEAP: Phase 2 Request: type=1 >EAP: using real identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=10): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 05 00 50 19 00 17 03 01 00 20 7a 1f 02 5d b5 93 7d d9 ec be ba 73 58 2b fd 27 ee 4e 16 da 69 78 64 73 d1 89 75 92 47 14 f0 ad 17 03 01 00 20 9c 8d 3f ee c6 14 e6 2e a4 90 63 8b cf b5 75 42 57 de 77 f0 5b 64 aa f4 cf 72 f6 dd fa 19 5e f7 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=63): 01 00 00 3b 01 06 00 3b 19 00 17 03 01 00 30 17 97 ee 33 f3 95 24 9c d7 b7 72 b2 5e 69 a7 ef 61 81 73 74 26 16 38 9c 2d 16 f3 75 5b 7d f2 2c 5f b3 33 6d cb b9 81 57 c7 fe eb 68 17 f2 7c 0c >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=59) - Flags 0x00 >EAP-PEAP: received 53 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=27): 1a 01 06 00 1a 10 a9 db 60 7e 1e 60 51 e5 1a 1c 5d 96 88 09 04 f0 78 62 6f 74 6c >EAP-PEAP: received Phase 2: code=1 identifier=6 length=31 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 6 mschapv2_id 6 >EAP-MSCHAPV2: Received challenge >EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-MSCHAPV2: Generating Challenge Response >MSCHAPV2: Identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: Username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: auth_challenge - hexdump(len=16): a9 db 60 7e 1e 60 51 e5 1a 1c 5d 96 88 09 04 f0 >MSCHAPV2: peer_challenge - hexdump(len=16): 86 25 bf 77 34 9e 11 5d 15 47 36 2c aa e0 4e 65 >MSCHAPV2: username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: password - hexdump_ascii(len=8): [REMOVED] >MSCHAPV2: NT Response - hexdump(len=24): b2 05 d7 d7 5f fb 36 d4 06 30 e0 78 48 6b 1e 67 cf 9b 24 2a 96 0a dd eb >MSCHAPV2: Auth Response - hexdump(len=20): 82 61 cb 3e 7e 7e ef eb 63 7a 18 91 f8 12 fd 6a 22 7d 0f 35 >MSCHAPV2: Master Key - hexdump(len=16): [REMOVED] >EAP-MSCHAPV2: TX identifier 6 mschapv2_id 6 (response) >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=64): [REMOVED] >SSL: 138 bytes left to be sent out (of total 138 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=148): 01 00 00 90 02 06 00 90 19 00 17 03 01 00 20 6e 52 41 7b 21 df 7b f6 01 fc 54 74 b3 ca f5 3b 3f 84 f0 eb 43 c0 18 64 b5 98 9a c6 3f d9 29 21 17 03 01 00 60 e0 35 42 d3 bb fa 2e 20 72 1a ca 1a e3 7d b9 e8 20 2d 60 53 df 28 79 c0 79 76 8d 6b f9 ee bf 90 af 52 3b 2d ed 41 c4 2c 82 ec 41 f8 bd 89 25 3b e5 9f 0e 5e 38 5a ef a4 12 9c b8 e2 36 60 f3 68 d4 99 b8 7d f0 7c 7d be 3d 51 2a 72 e2 21 f3 d0 ef 20 52 67 0f ed f9 4c 69 27 25 34 97 7a 6a 22 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=95): 01 00 00 5b 01 07 00 5b 19 00 17 03 01 00 50 be 24 fb 19 d5 af b2 67 59 31 1c 58 8c ce f4 d7 ce 97 11 94 ec 35 55 63 7f c2 9e da 3b d9 57 7b ab 20 ae b6 86 9c e8 21 28 22 8c c0 80 ff 15 f3 b5 9d bf c2 52 7f 76 13 7e 37 40 53 8f 48 80 a4 c8 df ba 75 18 7c 33 04 c7 91 20 78 b2 ab ed 19 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=91) - Flags 0x00 >EAP-PEAP: received 85 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 06 00 2e 53 3d 38 32 36 31 43 42 33 45 37 45 37 45 45 46 45 42 36 33 37 41 31 38 39 31 46 38 31 32 46 44 36 41 32 32 37 44 30 46 33 35 >EAP-PEAP: received Phase 2: code=1 identifier=7 length=51 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 7 mschapv2_id 6 >EAP-MSCHAPV2: Received success >EAP-MSCHAPV2: Success message - hexdump_ascii(len=0): >EAP-MSCHAPV2: Authentication succeeded >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 07 00 50 19 00 17 03 01 00 20 8c 06 ac e0 05 7c 8d ef 11 af d6 5a 6a a3 fb c1 cc 98 bf 9f 3e 66 a1 7e b8 d5 9a 7b e0 51 72 61 17 03 01 00 20 8b 41 35 1c df 9c 1f 1d cf 73 5b af 37 f1 f4 a2 7d e4 8a 65 fb aa f4 63 a8 19 24 44 ba 8c 32 a8 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 08 00 2b 19 00 17 03 01 00 20 05 c7 eb 22 6d 19 41 c9 af 10 e9 01 7d fa 5a a8 47 85 66 0c f8 1f 0b bb 0e 26 47 80 31 2b d9 8f >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 08 00 0b 21 80 03 00 02 00 01 >EAP-PEAP: received Phase 2: code=1 identifier=8 length=11 >EAP-PEAP: Phase 2 Request: type=33 >EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01 >EAP-TLV: Result TLV - hexdump(len=2): 00 01 >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 08 00 50 19 00 17 03 01 00 20 ce 78 8f 2b 73 ed 8d 2b 03 4b 0c 81 f1 a8 78 b8 0b e5 da e1 6e 1f 57 cc fc c1 68 7c 66 6e b7 0f 17 03 01 00 20 2e 10 23 1a 66 e8 59 28 ee 50 c8 55 63 db 75 9c 11 c6 23 36 4e a4 58 d0 60 a2 99 7a c2 2c 96 de >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=8): 01 00 00 04 03 08 00 04 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Success >EAP: EAP entering state SUCCESS >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state SUCCESS >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 6d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 6d > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 6d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >EAPOL: Successfully fetched key (len=32) >WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED] >WPA: Renewed SNonce - hexdump(len=32): 7a 78 e9 57 bd ea ad e1 7b b7 76 48 ec 1e 77 54 6a ee fa f9 f9 77 a6 00 4d 12 aa 07 1e 50 c4 52 >WPA: PTK derivation - A1=00:1d:e0:98:a5:dd A2=00:c0:49:1c:ec:d4 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 7a 78 e9 57 bd ea ad e1 7b b7 76 48 ec 1e 77 54 6a ee fa f9 f9 77 a6 00 4d 12 aa 07 1e 50 c4 52 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 64 e5 0b af dd 28 f5 fa b3 a0 f8 2b df c3 ea 02 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 6d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6d 29 c3 fa 3e 7f c2 21 c7 7f 23 9a 03 5f 3b 6b 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=121 > EAPOL-Key type=254 > key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) > key_length=32 key_data_length=26 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 6d > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 6d 29 c3 fa 3e 7f c2 21 c7 7f 23 9a 03 5f 3b 6b >WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 01 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 6d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6d 29 c3 fa 3e 7f c2 21 c7 7f 23 9a 03 5f 3b 6b 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 3 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 00 00 >WPA: Sending EAPOL-Key 4/4 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 f3 c7 8c b4 70 12 85 45 13 70 61 2b fc 71 cb 00 00 >WPA: Installing PTK to the driver. >WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 >State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 6f 58 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc 9f 09 7d b6 cb 8e cf 3e 9e 55 e6 10 e4 ff de 00 20 90 a3 03 5b 44 dc 30 ec fa d4 62 d0 c8 ad 53 15 ca f2 b2 08 bf 42 9b 4f 47 eb 27 c5 13 60 04 91 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 6f > key_rsc - hexdump(len=8): 58 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): fc 9f 09 7d b6 cb 8e cf 3e 9e 55 e6 10 e4 ff de >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 6f 58 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc 9f 09 7d b6 cb 8e cf 3e 9e 55 e6 10 e4 ff de 00 20 90 a3 03 5b 44 dc 30 ec fa d4 62 d0 c8 ad 53 15 ca f2 b2 08 bf 42 9b 4f 47 eb 27 c5 13 60 04 91 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 58 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 66 5f 32 6a 73 13 15 64 a3 4e 0d e2 15 c5 72 fc 00 00 >WPA: Key negotiation completed with 00:c0:49:1c:ec:d4 [PTK=TKIP GTK=TKIP] >Cancelling scan request >Cancelling authentication timeout >Removed BSSID 00:c0:49:1c:ec:d4 from blacklist >State: GROUP_HANDSHAKE -> COMPLETED >CTRL-EVENT-CONNECTED - Connection to 00:c0:49:1c:ec:d4 completed (reauth) [id=0 id_str=] >wpa_driver_wext_set_operstate: operstate 0->1 (UP) >WEXT: Operstate: linkmode=-1, operstate=6 >EAPOL: External notification - portValid=1 >EAPOL: SUPP_PAE entering state AUTHENTICATED >EAPOL authentication completed successfully >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 70 59 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9c 60 38 91 69 3b da bc 95 fe 36 c4 d3 d1 34 fc 00 20 6d c4 72 c6 60 70 1d ca 2e f4 be 73 59 27 58 e5 1c 72 b0 72 ba 16 08 54 4a ba 34 89 22 82 92 6c >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 70 > key_rsc - hexdump(len=8): 59 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 9c 60 38 91 69 3b da bc 95 fe 36 c4 d3 d1 34 fc >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 70 59 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9c 60 38 91 69 3b da bc 95 fe 36 c4 d3 d1 34 fc 00 20 6d c4 72 c6 60 70 1d ca 2e f4 be 73 59 27 58 e5 1c 72 b0 72 ba 16 08 54 4a ba 34 89 22 82 92 6c >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 59 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 61 4a 96 e0 72 1e 1c 19 4e 1e 1e 3b b7 de 7d e4 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 71 5a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 d2 4d 50 5d e2 92 c7 df 6f 0b 74 11 d9 2b d7 00 20 b8 a1 27 eb d9 14 78 a0 5b 20 9e a6 0a 1e ac a3 a1 d5 73 22 23 e9 92 2f fb 81 36 8a 39 6e 37 e3 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 > key_iv - hexdump(len=16): 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 71 > key_rsc - hexdump(len=8): 5a 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 80 d2 4d 50 5d e2 92 c7 df 6f 0b 74 11 d9 2b d7 >WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 05 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 20 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 71 5a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 d2 4d 50 5d e2 92 c7 df 6f 0b 74 11 d9 2b d7 00 20 b8 a1 27 eb d9 14 78 a0 5b 20 9e a6 0a 1e ac a3 a1 d5 73 22 23 e9 92 2f fb 81 36 8a 39 6e 37 e3 >WPA: RX message 1 of Group Key Handshake from 00:c0:49:1c:ec:d4 (ver=1) >State: COMPLETED -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32). >WPA: RSC - hexdump(len=6): 5a 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 ba 9b b9 c6 21 45 d2 40 be a7 86 56 85 ee 55 00 00 >WPA: Group rekeying completed with 00:c0:49:1c:ec:d4 [GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >Setting scan request: 0 sec 100000 usec >Added BSSID 00:c0:49:1c:ec:d4 into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: COMPLETED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >BSSID 00:00:00:00:00:00 blacklist count incremented to 18 >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >Driver did not support SIOCSIWENCODEEXT >State: DISCONNECTED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >State: DISCONNECTED -> SCANNING >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=5): > 53 53 49 44 31 NETWORKSID >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=221 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=00055353494431010802040b160c12182432043048606cdd160050f20101000050f20201000050f20201000050f201 RespIEs=010882848b0c1296182432043048606cdd180050f20201010000030f0000270f000052f75d0072732e00)' >Association info event >req_ies - hexdump(len=47): 00 05 53 53 49 44 31 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >resp_ies - hexdump(len=42): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 00 00 03 0f 00 00 27 0f 00 00 52 f7 5d 00 72 73 2e 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:c0:49:1c:ec:d4 >State: SCANNING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:c0:49:1c:ec:d4 >No keys have been configured - skip key clearing >Associated with 00:c0:49:1c:ec:d4 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >Setting scan request: 0 sec 0 usec >Starting AP scan (broadcast SSID) >Scan requested (ret=0) - scan timeout 30 seconds >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=16 >Received 598 bytes of scan results (2 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:c0:49:fd:9f:80 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > skip - blacklisted >1: 00:c0:49:1c:ec:d4 ssid='NETWORKSID' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 > selected based on WPA IE > selected WPA AP 00:c0:49:1c:ec:d4 ssid='NETWORKSID' >Try to find non-WPA AP >Already associated with the selected AP. >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=4): 01 01 00 00 >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=14): 01 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: maintaining EAP method data for fast reauthentication >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=5): > 68 65 6c 6c 6f hello >EAP: using anonymous identity - hexdump_ascii(len=9): > 61 6e 6f 6e 79 6d 6f 75 73 anonymous >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=18): 01 00 00 0e 02 00 00 0e 01 61 6e 6f 6e 79 6d 6f 75 73 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=10): 01 00 00 06 01 01 00 06 19 20 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=1 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Using previous method data for fast re-authentication >EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected >EAP: EAP entering state METHOD >SSL: Received packet(len=6) - Flags 0x20 >EAP-PEAP: Start (server ver=0, own ver=0) >EAP-PEAP: Using PEAP version 0 >SSL: (where=0x10 ret=0x1) >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:before/connect initialization >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client hello A >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read server hello A >SSL: SSL_connect - want more data >SSL: 143 bytes pending from ssl_out >SSL: 143 bytes left to be sent out (of total 143 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=153): 01 00 00 95 02 01 00 95 19 00 16 03 01 00 8a 01 00 00 86 03 01 48 6d ed 90 5a a2 69 b8 99 63 b8 92 a9 5c 48 d1 4d a3 a5 a6 8b 74 e5 e8 b2 0c ab fc 91 a4 51 f6 20 ee b3 f6 8a 10 6b d8 06 e2 dd 21 02 e0 36 5c 71 0b 9b e5 d6 75 3d d4 b4 c3 0c 46 d0 57 6f d4 c2 00 38 00 39 00 38 00 35 00 88 00 87 00 84 00 16 00 13 00 0a 00 33 00 32 00 2f 00 9a 00 99 00 96 00 45 00 44 00 41 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 02 01 00 00 04 00 23 00 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1038): 01 00 04 0a 01 02 04 0a 19 c0 00 00 07 f7 16 03 01 00 4a 02 00 00 46 03 01 48 6d ed ca a3 db fd 13 82 d8 87 52 ad ce bb 6c 1c e1 64 94 60 11 bd 52 52 19 31 c3 e0 a0 ee 63 20 ab ec 72 45 6e 34 5a 70 b5 0b f3 ff 4f 6a 60 75 a9 9d eb 62 fa d2 b1 9b 14 d3 5c fa 96 3b e2 86 00 39 00 16 03 01 06 88 0b 00 06 84 00 06 81 00 02 c2 30 82 02 be 30 82 02 27 a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 35 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 37 31 31 32 31 31 30 34 31 35 36 5a 30 81 8e 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 10 30 0e 06 03 55 04 03 13 07 52 4f 4f 54 20 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 e1 14 fe 0f 20 51 89 c1 68 0d 84 f7 15 45 0d 82 cf ce eb c4 57 3a dc 1e 8d 88 bd 0d 12 00 3a a2 8d 79 47 3e 3d a2 6e ab 68 a9 05 32 f3 e1 85 13 f9 a0 28 01 e0 4d df 2b 5c 99 fd d8 3f 62 75 f6 81 42 63 63 ef bc 67 8e 22 5e a2 f4 da d9 f1 40 71 26 11 3a 0a 73 2b 2f 18 db 20 98 5f c6 a1 fc d0 de 80 e0 c5 73 56 c4 9a 15 0c 0a 3b a7 89 bf 9b eb 63 13 06 01 83 83 be 7b 0a 74 af 7f 4a cf 02 03 01 00 01 a3 17 30 15 30 13 06 03 55 1d 25 04 0c 30 0a 06 08 2b 06 01 05 05 07 03 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 4c 8d 15 93 47 26 0f 59 2e 4e 7f d0 16 65 e4 8c c0 4c 73 17 07 9a 90 c1 52 27 b9 3e 56 8c 0c fa 9b 1c b8 90 a3 e4 2c 82 61 70 86 2d 8a c3 ca 45 14 b5 bb 55 00 ca 15 7c 0f 33 3f 19 08 37 e0 88 8e 53 e5 5a eb a5 78 eb 92 c8 89 95 7b c7 79 40 59 c7 4c 90 c2 c2 07 b9 68 80 5f 21 ff f4 b0 fd 83 ab 0f 97 e8 b0 f0 f3 80 d8 80 67 6a 9b 16 d3 26 af 4a 88 8e f2 a0 4b a6 72 b2 1c d6 5c c4 d5 00 03 b9 30 82 03 b5 30 82 03 1e a0 03 02 01 02 02 09 00 d9 c7 09 10 ab 9f 78 33 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 1e 17 0d 30 36 31 31 32 31 31 30 34 31 35 36 5a 17 0d 30 38 31 31 32 30 31 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=2 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1034) - Flags 0xc0 >SSL: TLS Message Length: 2039 >SSL: Need 1015 bytes more input data >SSL: Building ACK (type=25 id=2 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=1025): 01 00 03 fd 01 03 03 fd 19 00 30 34 31 35 36 5a 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 97 8f 78 af a5 f4 70 a1 00 41 5b fa 62 28 19 69 f6 e5 f7 6a 1a 27 85 ca 8a 15 00 55 54 15 97 68 0b 2e 55 39 e4 b0 6b 76 55 86 84 53 7c 56 fc 74 52 da 73 a3 54 ae 74 47 64 9e 1f ff 1b 1e 3d 1c 8b c1 8d af 89 94 e9 0e d0 c9 56 83 52 c4 50 a9 24 81 10 3d 0a e7 7e 6e 7b 30 ae fd 1b 4d f8 96 87 3f 7d 72 2a cd fa 22 f9 cd 29 17 f4 da 15 eb de 6a de b3 e1 9d 2a c5 3b 3d ea 3c f6 a6 a6 71 02 03 01 00 01 a3 82 01 01 30 81 fe 30 1d 06 03 55 1d 0e 04 16 04 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f 30 81 ce 06 03 55 1d 23 04 81 c6 30 81 c3 80 14 2c f5 8d 66 32 f4 eb a2 2b 4c db 2a 86 9e f1 c1 4a 43 5e 7f a1 81 9f a4 81 9c 30 81 99 31 0b 30 09 06 03 55 04 06 13 02 43 48 31 10 30 0e 06 03 55 04 08 13 07 54 68 65 73 73 69 6e 31 0f 30 0d 06 03 55 04 07 13 06 4c 75 67 61 6e 6f 31 0f 30 0d 06 03 55 04 0a 13 06 42 53 49 20 53 41 31 14 30 12 06 03 55 04 0b 13 0b 49 54 20 53 65 63 75 72 69 74 79 31 1b 30 19 06 03 55 04 03 13 12 43 6c 69 65 6e 74 20 63 65 72 74 69 66 69 63 61 74 65 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 67 63 61 76 65 7a 7a 61 6c 69 40 67 6d 61 69 6c 2e 63 6f 6d 82 09 00 d9 c7 09 10 ab 9f 78 33 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a 86 48 86 f7 0d 01 01 04 05 00 03 81 81 00 74 1a c9 c3 9b 7a a4 5a e4 16 4c d1 af 8e b6 95 20 80 ca 9e 5f 89 82 ba e7 99 63 da 67 b9 c0 7b 86 aa 51 3d 24 41 58 dd d9 2d e7 cb e6 6f 3a 8f 15 5e ca 21 5a f7 46 21 a3 bb b5 f6 9c d0 82 1b b5 f5 3d c9 ed 94 51 aa f2 ff ca 34 d0 48 05 2c 66 92 6f 50 c7 49 0e c4 2d 1d 19 a3 9c ca b9 f9 c0 b1 d0 17 b9 fe 80 90 d6 dd 2b 38 70 74 4e a7 53 99 3e bf cd 0e d4 79 bb 2f f5 8e ba 6c d1 69 16 03 01 01 0d 0c 00 01 09 00 40 c3 4a f6 2a e3 ab 87 b9 1c 92 96 23 c3 a2 11 50 ae 15 b2 0c de bc fb 0d 00 a3 98 83 d1 d1 c7 63 1d df 5f 35 06 a0 fa 4c 4e 01 3f 17 c1 05 aa 50 d0 3b 48 16 46 75 d5 37 8e 2c 82 9b 06 17 11 bb 00 01 02 00 40 72 d4 91 71 41 1a ac 5a 2b 70 00 78 36 6a dd ad 78 75 1d 57 fe 84 03 a8 9a dd 4f c3 6a f0 87 40 62 74 9e 3b 30 d5 4b d8 0f 91 5c ba 0f e1 c1 1c 87 75 70 71 ed 49 cf 16 c2 a4 9f c4 65 19 fa 42 00 80 45 27 8c 94 67 03 3a 7f 0b 7d 17 11 13 90 a9 e8 0e 81 9d e2 13 aa cc b3 fa 5b 16 4e 81 8a c2 28 5d cd 5b e8 86 f2 a1 8b fc 86 f0 05 66 b9 01 0e 83 91 92 3f 69 0d 34 04 4a 45 1d 41 26 19 57 65 4a ea 37 13 41 d7 c6 d1 7d 11 21 e3 f1 ee 75 d3 3c ec bb 1f c3 2c 82 9a 9a 4e 62 99 6a a8 1e 89 94 56 59 9a 12 a8 44 57 0a 61 a2 2d dd db f3 63 7e 26 31 44 91 c0 56 16 e5 03 a2 db 89 79 91 4d 16 03 01 00 04 0e 00 00 00 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1021) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server hello A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server certificate A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server done A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write change cipher spec A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write finished A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 flush data >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read finished A >SSL: SSL_connect - want more data >SSL: 134 bytes pending from ssl_out >SSL: 134 bytes left to be sent out (of total 134 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=144): 01 00 00 8c 02 03 00 8c 19 00 16 03 01 00 46 10 00 00 42 00 40 98 4f a9 8a 1d 11 62 94 f5 b7 bf 32 65 bd cc 12 0f 50 06 3c 5e 01 8b 68 77 25 ab 00 87 8a c4 1e bc 35 30 81 c1 35 cb 0b da 11 e9 7c 56 c7 f3 10 d4 90 df 6d 03 c0 ee 44 23 3d 5e 84 a6 70 2a 29 14 03 01 00 01 01 16 03 01 00 30 bd 7a 7f 47 21 d3 d4 6e a7 2b 10 3c db 85 b9 a8 c2 ff ab 76 e2 61 4c 9b 82 fe 86 23 1d 60 dc 57 f9 b7 73 3b b8 2a 21 a2 b7 fd 38 65 51 3e ae 3b >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=69): 01 00 00 41 01 04 00 41 19 00 14 03 01 00 01 01 16 03 01 00 30 eb 9b cd f9 cb 35 79 82 1d ff 16 3f 8f 9d 9d d6 01 a1 ce f7 54 84 46 e3 a4 f4 3a 69 f4 ab b4 ac 3e 92 08 7f 24 ec b1 16 14 fb e1 ec 76 b9 2f bd >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=65) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read finished A >SSL: (where=0x20 ret=0x1) >SSL: (where=0x1002 ret=0x1) >SSL: 0 bytes pending from ssl_out >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >SSL: No data to be sent out >EAP-PEAP: TLS done, proceed to Phase 2 >EAP-PEAP: using label 'client EAP encryption' in key derivation >EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] >EAP-PEAP: Workaround - allow outer EAP-Success to terminate PEAP resumption >SSL: Building ACK (type=25 id=4 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=COND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 05 00 2b 19 00 17 03 01 00 20 e5 89 d0 bc 94 50 b5 6e a1 43 4b df ab 9c 98 01 f4 12 1f 5b 08 7c 31 17 a6 57 d7 4f c4 69 73 11 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 05 00 05 01 >EAP-PEAP: received Phase 2: code=1 identifier=5 length=5 >EAP-PEAP: Phase 2 Request: type=1 >EAP: using real identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=10): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 05 00 50 19 00 17 03 01 00 20 64 c1 ee 51 85 8f 89 f2 d4 6a 16 1c 00 a6 10 3a 2d 1f d0 7f f6 f0 90 04 2a ed 1e be 19 0d 46 0f 17 03 01 00 20 58 b4 f9 cd c1 0f da 3e b7 67 70 7d 7e 9e 80 a7 c2 4a 9e dc 39 4a 5f a8 06 d5 91 5c d7 71 26 01 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=63): 01 00 00 3b 01 06 00 3b 19 00 17 03 01 00 30 e4 74 18 6b 89 e5 d9 5f 40 37 79 db cd 01 c9 ef 4f 81 42 f9 e9 ea ed f5 5c 4d 46 b9 dc dd 53 c1 b8 9a ca 9b e8 9a 88 7d c4 d6 da 35 39 8f ba 60 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=59) - Flags 0x00 >EAP-PEAP: received 53 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=27): 1a 01 06 00 1a 10 33 4c c2 5a eb ec 33 1c 9e 32 5d 7c 52 03 b3 d4 78 62 6f 74 6c >EAP-PEAP: received Phase 2: code=1 identifier=6 length=31 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 6 mschapv2_id 6 >EAP-MSCHAPV2: Received challenge >EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=5): > 78 62 6f 74 6c username >EAP-MSCHAPV2: Generating Challenge Response >MSCHAPV2: Identity - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: Username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: auth_challenge - hexdump(len=16): 33 4c c2 5a eb ec 33 1c 9e 32 5d 7c 52 03 b3 d4 >MSCHAPV2: peer_challenge - hexdump(len=16): 0d c1 57 2a df 9c 9b 5a 0c ae 1e 2e 39 de d1 f9 >MSCHAPV2: username - hexdump_ascii(len=5): > 78 62 6f 74 6c username >MSCHAPV2: password - hexdump_ascii(len=8): [REMOVED] >MSCHAPV2: NT Response - hexdump(len=24): 71 c8 96 fe c5 eb 85 8c 5c 9e c0 cc f2 b4 0b b8 2c 5e dc 5e 17 a9 50 a9 >MSCHAPV2: Auth Response - hexdump(len=20): ae 2e e7 99 7a bc 57 1e 30 45 ec 16 52 98 88 aa 0b 17 ed 51 >MSCHAPV2: Master Key - hexdump(len=16): [REMOVED] >EAP-MSCHAPV2: TX identifier 6 mschapv2_id 6 (response) >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=64): [REMOVED] >SSL: 138 bytes left to be sent out (of total 138 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=148): 01 00 00 90 02 06 00 90 19 00 17 03 01 00 20 da f7 18 06 ef 96 86 b4 52 ea 5b 19 6c ef 4f 7b a0 28 47 78 10 e3 24 4d c4 f4 18 20 6f e2 c1 82 17 03 01 00 60 29 f1 34 bf 03 88 db 82 24 7a e4 fe 0c ca 6b b9 c1 e7 01 46 35 c3 2c 7f 48 cf 6c 11 52 e7 76 4b 93 7a 20 35 1d b1 e0 61 78 fa 1e d0 a2 be aa f3 29 6d 02 cb f7 c4 74 9a e2 4f cd f4 c7 bb ab 69 6f ee 6b bc 64 57 2e a0 ef 53 18 ff d3 09 4c 89 7d ca da 4b 6a 27 1f dc 33 63 8b ba 5d ec aa a2 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=95): 01 00 00 5b 01 07 00 5b 19 00 17 03 01 00 50 12 c0 09 f7 a3 ca 0d 18 4a 9c 56 f4 d0 a8 ec 08 aa 49 c3 75 16 5b 84 a3 a1 fd 18 a4 ff 68 72 0e ef b4 a3 5b 24 02 1a 34 c5 1f 5f de f8 b2 54 f5 84 6e 3b 33 b2 14 97 f5 5e a9 1f 32 92 4f e5 20 cc 4f de cf b4 e2 d6 79 c9 91 02 0b 64 b2 ba ef >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=91) - Flags 0x00 >EAP-PEAP: received 85 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 06 00 2e 53 3d 41 45 32 45 45 37 39 39 37 41 42 43 35 37 31 45 33 30 34 35 45 43 31 36 35 32 39 38 38 38 41 41 30 42 31 37 45 44 35 31 >EAP-PEAP: received Phase 2: code=1 identifier=7 length=51 >EAP-PEAP: Phase 2 Request: type=26 >EAP-MSCHAPV2: RX identifier 7 mschapv2_id 6 >EAP-MSCHAPV2: Received success >EAP-MSCHAPV2: Success message - hexdump_ascii(len=0): >EAP-MSCHAPV2: Authentication succeeded >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 07 00 50 19 00 17 03 01 00 20 44 68 e2 42 b3 38 70 d9 73 9b 53 a0 a0 33 ad df 8d ae 21 69 39 d8 85 da f9 4b 5b ee 45 8f df 0b 17 03 01 00 20 5a c0 85 1a 61 77 66 19 90 f4 47 c9 7e ab dc c3 d3 fb b6 c6 bc 76 1a 24 ea 76 15 53 b6 07 8d 77 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 08 00 2b 19 00 17 03 01 00 20 bd b7 b0 79 f3 fc 81 b7 3b dc 75 ad 40 e2 7b dd af 12 c7 de 96 d1 d4 6a 6e 5a 58 aa 86 12 7c f6 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=43) - Flags 0x00 >EAP-PEAP: received 37 bytes encrypted data for Phase 2 >EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 08 00 0b 21 80 03 00 02 00 01 >EAP-PEAP: received Phase 2: code=1 identifier=8 length=11 >EAP-PEAP: Phase 2 Request: type=33 >EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01 >EAP-TLV: Result TLV - hexdump(len=2): 00 01 >EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed >EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED] >SSL: 74 bytes left to be sent out (of total 74 bytes) >EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:c0:49:1c:ec:d4 >TX EAPOL - hexdump(len=84): 01 00 00 50 02 08 00 50 19 00 17 03 01 00 20 3e 20 3c 3f ed 63 b1 1e 47 6c 92 0e 56 b5 e1 c7 d4 e5 ee 78 91 79 8b e2 26 7e 81 88 12 cf 51 3f 17 03 01 00 20 c2 6e b9 ce 99 5b f3 1b f4 9d 6f e0 08 64 02 34 42 ab 3a 0f 14 7f e8 29 69 a8 25 f8 24 bc cf a9 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=8): 01 00 00 04 03 08 00 04 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Success >EAP: EAP entering state SUCCESS >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state SUCCESS >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:c0:49:1c:ec:d4 >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 74 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_nonce - hexdump(len=32): 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 74 > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 00 76 a7 d7 1b a0 02 d6 92 d5 49 b7 19 47 ca 2b 48 64 c0 a6 56 ac c2 5e e0 54 32 d8 be 2e 7e 60 74 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:c0:49:1c:ec:d4 (ver=1) >EAPOL: Successfully fetched key (len=32) >WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED] >WPA: Renewed SNonce - hexdump(len=32): 50 44 15 1f c5 51 3b 05 e2 a0 12 e9 d3 74 7a f9 1c eb e8 10 bd 63 f8 a8 ff 5b 11 cf 79 e8 03 31 >WPA: PTK derivation - A1=00:1d:e0:98:a5:dd A2=00:c0:49:1c:ec:d4 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 50 44 15 1f c5 51 3b 05 e2 a0 12 e9 d3 74 7a f9 1c eb e8 10 bd 63 f8 a8 ff 5b 11 cf 79 e8 03 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e6 c5 d3 35 77 04 0c 87 dd 2e 48 1b a1 11 13 d0 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 453390
:
310568
|
310569
|
310888
|
310926
| 311029 |
311030
|
312090