* ec15e68ba6a regresion?
@ 2011-03-31 15:42 Stanislaw Gruszka
2011-03-31 15:46 ` Jouni Malinen
0 siblings, 1 reply; 5+ messages in thread
From: Stanislaw Gruszka @ 2011-03-31 15:42 UTC (permalink / raw)
To: Jouni Malinen; +Cc: linux-wireless
Seems commit:
commit ec15e68ba6a505631016f230899bafbb7b8cd0d6
Author: Jouni Malinen <jouni.malinen@atheros.com>
Date: Wed Mar 23 15:29:52 2011 +0200
cfg80211: Add nl80211 event for deletion of a station entry
is causing problems on my system. Sometimes when I disconnect
from wireless network, I can not connect again. Without commit
I can not reproduce the problem.
Stanislaw
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: ec15e68ba6a regresion?
2011-03-31 15:42 ec15e68ba6a regresion? Stanislaw Gruszka
@ 2011-03-31 15:46 ` Jouni Malinen
2011-04-01 9:25 ` Stanislaw Gruszka
0 siblings, 1 reply; 5+ messages in thread
From: Jouni Malinen @ 2011-03-31 15:46 UTC (permalink / raw)
To: Stanislaw Gruszka; +Cc: linux-wireless
On Thu, Mar 31, 2011 at 05:42:41PM +0200, Stanislaw Gruszka wrote:
> Seems commit:
>
> commit ec15e68ba6a505631016f230899bafbb7b8cd0d6
> Author: Jouni Malinen <jouni.malinen@atheros.com>
> Date: Wed Mar 23 15:29:52 2011 +0200
>
> cfg80211: Add nl80211 event for deletion of a station entry
>
> is causing problems on my system. Sometimes when I disconnect
> from wireless network, I can not connect again. Without commit
> I can not reproduce the problem.
That sounds strange.. That commit is supposed to just add a new nl80211
event that existing user space tools would ignore (and new
wpa_supplicant snapshot would only use in the case of IBSS). Would it be
possible to get a wpa_supplicant debug log showing this problem?
--
Jouni Malinen PGP id EFC895FA
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: ec15e68ba6a regresion?
2011-03-31 15:46 ` Jouni Malinen
@ 2011-04-01 9:25 ` Stanislaw Gruszka
2011-04-01 9:54 ` Jouni Malinen
0 siblings, 1 reply; 5+ messages in thread
From: Stanislaw Gruszka @ 2011-04-01 9:25 UTC (permalink / raw)
To: Jouni Malinen; +Cc: linux-wireless
[-- Attachment #1: Type: text/plain, Size: 1095 bytes --]
On Thu, Mar 31, 2011 at 06:46:38PM +0300, Jouni Malinen wrote:
> On Thu, Mar 31, 2011 at 05:42:41PM +0200, Stanislaw Gruszka wrote:
> > Seems commit:
> >
> > commit ec15e68ba6a505631016f230899bafbb7b8cd0d6
> > Author: Jouni Malinen <jouni.malinen@atheros.com>
> > Date: Wed Mar 23 15:29:52 2011 +0200
> >
> > cfg80211: Add nl80211 event for deletion of a station entry
> >
> > is causing problems on my system. Sometimes when I disconnect
> > from wireless network, I can not connect again. Without commit
> > I can not reproduce the problem.
>
> That sounds strange.. That commit is supposed to just add a new nl80211
> event that existing user space tools would ignore (and new
> wpa_supplicant snapshot would only use in the case of IBSS). Would it be
> possible to get a wpa_supplicant debug log showing this problem?
Seems when disconnect event is handled, we remove some key. I'm
attaching non-debug and debug logs. Note this is kinda old
version of wpa_supplicant.
NetworkManager-0.8.1-7.el6.x86_64
wpa_supplicant-0.6.8-10.el6.x86_64
kernel-latest wireless-testing
Stanislaw
[-- Attachment #2: wpa_supplicant.log --]
[-- Type: text/plain, Size: 7396 bytes --]
wpa_driver_wext_disassociate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
No keys have been configured - skip key clearing
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
No keys have been configured - skip key clearing
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Removing interface wlan3
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
No keys have been configured - skip key clearing
State: SCANNING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
No keys have been configured - skip key clearing
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Removing interface wlan1
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6
Failed to initiate AP scan.
Failed to initiate AP scan.
Failed to initiate AP scan.
Failed to initiate AP scan.
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Associated with 00:23:69:35:d1:3e
WPA: Key negotiation completed with 00:23:69:35:d1:3e [PTK=CCMP GTK=TKIP]
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3e completed (auth) [id=0 id_str=]
Associated with 00:23:69:35:d1:3f
WPA: Key negotiation completed with 00:23:69:35:d1:3f [PTK=CCMP GTK=CCMP]
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3f completed (auth) [id=0 id_str=]
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Failed to initiate AP scan.
Failed to initiate AP scan.
Failed to initiate AP scan.
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Associated with 00:23:69:35:d1:3e
WPA: Key negotiation completed with 00:23:69:35:d1:3e [PTK=CCMP GTK=TKIP]
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3e completed (auth) [id=0 id_str=]
Failed to initiate AP scan.
Failed to initiate AP scan.
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Associated with 00:23:69:35:d1:3e
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
WPA: Key negotiation completed with 00:23:69:35:d1:3e [PTK=CCMP GTK=TKIP]
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3e completed (auth) [id=0 id_str=]
Associated with 00:23:69:35:d1:3f
WPA: Key negotiation completed with 00:23:69:35:d1:3f [PTK=CCMP GTK=CCMP]
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3f completed (auth) [id=0 id_str=]
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Associated with 00:23:69:35:d1:3e
WPA: Key negotiation completed with 00:23:69:35:d1:3e [PTK=CCMP GTK=TKIP]
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3e completed (reauth) [id=0 id_str=]
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Associated with 00:23:69:35:d1:3e
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Authentication with 00:00:00:00:00:00 timed out.
Failed to initiate AP scan.
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Associated with 00:23:69:35:d1:3e
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Authentication with 00:00:00:00:00:00 timed out.
Failed to initiate AP scan.
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Associated with 00:23:69:35:d1:3e
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Authentication with 00:00:00:00:00:00 timed out.
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Associated with 00:23:69:35:d1:3f
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Authentication with 00:00:00:00:00:00 timed out.
Failed to initiate AP scan.
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Associated with 00:23:69:35:d1:3f
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Authentication with 00:00:00:00:00:00 timed out.
Failed to initiate AP scan.
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Associated with 00:23:69:35:d1:3f
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Authentication with 00:00:00:00:00:00 timed out.
NetworkManager-glib-0.8.1-7.el6.x86_64
NetworkManager-0.8.1-7.el6.x86_64
NetworkManager-gnome-0.8.1-7.el6.x86_64
wpa_supplicant-0.6.8-10.el6.x86_64
[-- Attachment #3: wpa_supplicant.log.debug --]
[-- Type: text/plain, Size: 184646 bytes --]
wpa_driver_wext_disassociate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
No keys have been configured - skip key clearing
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
No keys have been configured - skip key clearing
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Removing interface wlan3
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
No keys have been configured - skip key clearing
State: SCANNING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
No keys have been configured - skip key clearing
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Removing interface wlan1
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6
Failed to initiate AP scan.
Failed to initiate AP scan.
Failed to initiate AP scan.
Failed to initiate AP scan.
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Associated with 00:23:69:35:d1:3e
WPA: Key negotiation completed with 00:23:69:35:d1:3e [PTK=CCMP GTK=TKIP]
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3e completed (auth) [id=0 id_str=]
Associated with 00:23:69:35:d1:3f
WPA: Key negotiation completed with 00:23:69:35:d1:3f [PTK=CCMP GTK=CCMP]
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3f completed (auth) [id=0 id_str=]
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Failed to initiate AP scan.
Failed to initiate AP scan.
Failed to initiate AP scan.
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Associated with 00:23:69:35:d1:3e
WPA: Key negotiation completed with 00:23:69:35:d1:3e [PTK=CCMP GTK=TKIP]
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3e completed (auth) [id=0 id_str=]
Failed to initiate AP scan.
Failed to initiate AP scan.
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Associated with 00:23:69:35:d1:3e
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
WPA: Key negotiation completed with 00:23:69:35:d1:3e [PTK=CCMP GTK=TKIP]
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3e completed (auth) [id=0 id_str=]
Associated with 00:23:69:35:d1:3f
WPA: Key negotiation completed with 00:23:69:35:d1:3f [PTK=CCMP GTK=CCMP]
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3f completed (auth) [id=0 id_str=]
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Associated with 00:23:69:35:d1:3e
WPA: Key negotiation completed with 00:23:69:35:d1:3e [PTK=CCMP GTK=TKIP]
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3e completed (reauth) [id=0 id_str=]
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Associated with 00:23:69:35:d1:3e
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Authentication with 00:00:00:00:00:00 timed out.
Failed to initiate AP scan.
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Associated with 00:23:69:35:d1:3e
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Authentication with 00:00:00:00:00:00 timed out.
Failed to initiate AP scan.
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Associated with 00:23:69:35:d1:3e
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Authentication with 00:00:00:00:00:00 timed out.
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Associated with 00:23:69:35:d1:3f
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Authentication with 00:00:00:00:00:00 timed out.
Failed to initiate AP scan.
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Associated with 00:23:69:35:d1:3f
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Authentication with 00:00:00:00:00:00 timed out.
Failed to initiate AP scan.
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Associated with 00:23:69:35:d1:3f
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Authentication with 00:00:00:00:00:00 timed out.
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Associated with 00:23:69:35:d1:3f
WPA: Key negotiation completed with 00:23:69:35:d1:3f [PTK=CCMP GTK=CCMP]
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3f completed (reauth) [id=0 id_str=]
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Associated with 00:23:69:35:d1:3f
Failed to initiate AP scan.
Failed to initiate AP scan.
Failed to initiate AP scan.
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Associated with 00:23:69:35:d1:3f
WPA: Key negotiation completed with 00:23:69:35:d1:3f [PTK=CCMP GTK=CCMP]
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3f completed (auth) [id=0 id_str=]
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Associated with 00:23:69:35:d1:3f
WPA: Key negotiation completed with 00:23:69:35:d1:3f [PTK=CCMP GTK=CCMP]
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3f completed (auth) [id=0 id_str=]
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
WPA: Group rekeying completed with 00:23:69:35:d1:3f [GTK=CCMP]
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Failed to initiate AP scan.
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Associated with 00:23:69:35:d1:3f
WPA: Key negotiation completed with 00:23:69:35:d1:3f [PTK=CCMP GTK=CCMP]
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3f completed (auth) [id=0 id_str=]
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Associated with 00:23:69:35:d1:3f
WPA: Key negotiation completed with 00:23:69:35:d1:3f [PTK=CCMP GTK=CCMP]
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3f completed (auth) [id=0 id_str=]
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Associated with 00:23:69:35:d1:3e
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Authentication with 00:00:00:00:00:00 timed out.
Failed to initiate AP scan.
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Associated with 00:23:69:35:d1:3e
Authentication with 00:23:69:35:d1:3f timed out.
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Authentication with 00:00:00:00:00:00 timed out.
Failed to initiate AP scan.
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Associated with 00:23:69:35:d1:3e
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
Authentication with 00:00:00:00:00:00 timed out.
Authentication with 00:00:00:00:00:00 timed out.
Failed to initiate AP scan.
Failed to initiate AP scan.
Failed to initiate AP scan.
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Associated with 00:23:69:35:d1:3e
WPA: Key negotiation completed with 00:23:69:35:d1:3e [PTK=CCMP GTK=TKIP]
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3e completed (auth) [id=0 id_str=]
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Authentication with 00:00:00:00:00:00 timed out.
Failed to initiate AP scan.
Failed to initiate AP scan.
Failed to initiate AP scan.
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Associated with 00:23:69:35:d1:3e
WPA: Key negotiation completed with 00:23:69:35:d1:3e [PTK=CCMP GTK=TKIP]
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3e completed (auth) [id=0 id_str=]
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Authentication with 00:23:69:35:d1:3f timed out.
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Authentication with 00:00:00:00:00:00 timed out.
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Authentication with 00:23:69:35:d1:3f timed out.
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Authentication with 00:00:00:00:00:00 timed out.
CTRL-EVENT-TERMINATING - signal 15 received
CTRL-EVENT-TERMINATING - signal 15 received
Could not request DBus service name: already registered.
Failed to initiate AP scan.
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Associated with 00:23:69:35:d1:3e
WPA: Key negotiation completed with 00:23:69:35:d1:3e [PTK=CCMP GTK=TKIP]
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3e completed (auth) [id=0 id_str=]
Providing DBus service 'fi.epitest.hostap.WPASupplicant'.
Daemonize..
Initializing interface 'wlan3' conf 'N/A' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Initializing interface (2) 'wlan3'
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0xf flags 0x0
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:24:d7:13:21:d4
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
Added interface wlan3
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b1a len=48
Ignore event for foreign ifindex 3
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b19 len=16
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 1 sec 0 usec
Initializing interface 'wlan1' conf 'N/A' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Initializing interface (2) 'wlan1'
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0xf flags 0x0
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:21:6a:6d:18:8e
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
RSN: flushing PMKID list in the driver
Setting scan request: 1 sec 100000 usec
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
Added interface wlan1
Ignore event for foreign ifindex 3
Ignore event for foreign ifindex 3
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
Wireless event: cmd=0x8b1a len=48
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 0 sec 0 usec
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
Scan requested (ret=-1) - scan timeout 30 seconds
Failed to initiate AP scan.
Setting scan request: 10 sec 0 usec
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 0 sec 0 usec
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
Scan requested (ret=-1) - scan timeout 5 seconds
Failed to initiate AP scan.
Setting scan request: 10 sec 0 usec
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b19 len=16
Received 2671 bytes of scan results (5 BSSes)
CTRL-EVENT-SCAN-RESULTS
wpa_supplicant_select_bss_and_associate: qual 0 (0) qv=0 bv=0
No suitable AP found.
Setting scan request: 5 sec 0 usec
Ignore event for foreign ifindex 2
No keys have been configured - skip key clearing
State: SCANNING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Ignore event for foreign ifindex 3
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
Wireless event: cmd=0x8b19 len=16
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 1 sec 0 usec
key_mgmt: 0x2
scan_ssid=1 (0x1)
PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
ssid - hexdump_ascii(len=12):
70 65 61 72 74 72 65 65 5f 6e 32 34 peartree_n24
PSK (from passphrase) - hexdump(len=32): [REMOVED]
wpa_supplicant_select_bss_and_associate: qual 0 (0) qv=0 bv=0
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
selected based on RSN IE
selected WPA AP 00:23:69:35:d1:3e ssid='peartree_n24'
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 0c 00
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: DISCONNECTED -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 20 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b04 len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b1a len=28
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b19 len=16
Received 3447 bytes of scan results (7 BSSes)
CTRL-EVENT-SCAN-RESULTS
wpa_supplicant_select_bss_and_associate: qual 0 (0) qv=0 bv=0
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
selected based on RSN IE
selected WPA AP 00:23:69:35:d1:3e ssid='peartree_n24'
Already associated with the selected AP.
RSN: Ignored PMKID candidate without preauth flag
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8c08 len=181
AssocResp IE wireless event - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 6c 18 1b ff ff ff 00 01 00 00 00 00 00 c2 01 01 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 6c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 01 00 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:23:69:35:d1:3e
Association info event
resp_ies - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 6c 18 1b ff ff ff 00 01 00 00 00 00 00 c2 01 01 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 6c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 01 00 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:23:69:35:d1:3e
No keys have been configured - skip key clearing
Associated with 00:23:69:35:d1:3e
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
RX EAPOL from 00:23:69:35:d1:3e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 28
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 13 34 b2 53 50 e7 bf 53 8a 9a b2 69 d7 fd 1f 69 b4 04 5f 89 a9 10 7f a9 e6 ca 58 e5 d0 ba 98 f7
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 13 34 b2 53 50 e7 bf 53 8a 9a b2 69 d7 fd 1f 69 b4 04 5f 89 a9 10 7f a9 e6 ca 58 e5 d0 ba 98 f7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 cb e7 d0 90 97 66 df 49 12 53 fa 97 69 bc 1a 26 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:23:69:35:d1:3e
RX EAPOL - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 04 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 28 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 29 8a 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 72 c5 22 9e bd 0c 4e ec ac fd 92 9d f1 8a c1 bd 00 50 00 b5 f9 e7 47 42 d3 6f 3b 4f e4 4f d0 42 e9 08 d2 2d ef a2 04 a6 75 06 0d da b7 94 9a da 02 9c 5f 69 81 35 4b 66 ae 05 43 76 88 42 50 d8 16 8b 3c 6c 18 84 e1 59 c7 5b d3 ee 91 f3 23 c2 8a 2d 5d a0 7e db 53 6a 33 0f 0c 86 6f 8e f6 0f 48 13
IEEE 802.1X RX: version=2 type=3 length=175
EAPOL-Key type=2
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
key_length=16 key_data_length=80
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
key_nonce - hexdump(len=32): 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 28
key_iv - hexdump(len=16): 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 29
key_rsc - hexdump(len=8): 8a 02 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 72 c5 22 9e bd 0c 4e ec ac fd 92 9d f1 8a c1 bd
WPA: RX EAPOL-Key - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 04 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 28 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 29 8a 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 72 c5 22 9e bd 0c 4e ec ac fd 92 9d f1 8a c1 bd 00 50 00 b5 f9 e7 47 42 d3 6f 3b 4f e4 4f d0 42 e9 08 d2 2d ef a2 04 a6 75 06 0d da b7 94 9a da 02 9c 5f 69 81 35 4b 66 ae 05 43 76 88 42 50 d8 16 8b 3c 6c 18 84 e1 59 c7 5b d3 ee 91 f3 23 c2 8a 2d 5d a0 7e db 53 6a 33 0f 0c 86 6f 8e f6 0f 48 13
RSN: encrypted key data - hexdump(len=80): 00 b5 f9 e7 47 42 d3 6f 3b 4f e4 4f d0 42 e9 08 d2 2d ef a2 04 a6 75 06 0d da b7 94 9a da 02 9c 5f 69 81 35 4b 66 ae 05 43 76 88 42 50 d8 16 8b 3c 6c 18 84 e1 59 c7 5b d3 ee 91 f3 23 c2 8a 2d 5d a0 7e db 53 6a 33 0f 0c 86 6f 8e f6 0f 48 13
WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:23:69:35:d1:3e (ver=2)
WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00 dd 26 00 0f ac 01 01 00 65 86 03 a6 05 0c b0 37 80 e1 0e 25 78 89 3d dc 76 0b 9d ad 37 d2 59 7b 5d 08 26 3d 72 e3 3e af dd 00 00 00 00 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4f 06 21 40 eb a9 b0 18 d4 e5 f6 ea c0 9f 9e 2d 00 00
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 8a 02 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Key negotiation completed with 00:23:69:35:d1:3e [PTK=CCMP GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3e completed (auth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Ignore event for foreign ifindex 3
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
Wireless event: cmd=0x8b19 len=16
Received 630 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS
wpa_supplicant_select_bss_and_associate: qual 0 (0) qv=0 bv=0
No suitable AP found.
Setting scan request: 5 sec 0 usec
No keys have been configured - skip key clearing
State: SCANNING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
key_mgmt: 0x2
scan_ssid=1 (0x1)
PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
ssid - hexdump_ascii(len=12):
70 65 61 72 74 72 65 65 5f 6e 35 30 peartree_n50
PSK (from passphrase) - hexdump(len=32): [REMOVED]
wpa_supplicant_select_bss_and_associate: qual 0 (0) qv=0 bv=0
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3f ssid='peartree_n50' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
selected based on RSN IE
selected WPA AP 00:23:69:35:d1:3f ssid='peartree_n50'
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: DISCONNECTED -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 20 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Ignore event for foreign ifindex 3
Ignore event for foreign ifindex 3
Ignore event for foreign ifindex 3
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
Wireless event: cmd=0x8b04 len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
Wireless event: cmd=0x8b1a len=28
Ignore event for foreign ifindex 3
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
Wireless event: cmd=0x8b19 len=16
Received 630 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS
wpa_supplicant_select_bss_and_associate: qual 0 (0) qv=0 bv=0
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3f ssid='peartree_n50' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
selected based on RSN IE
selected WPA AP 00:23:69:35:d1:3f ssid='peartree_n50'
Already associated with the selected AP.
RSN: Ignored PMKID candidate without preauth flag
EAPOL: disable timer tick
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Setting scan request: 0 sec 0 usec
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=12):
70 65 61 72 74 72 65 65 5f 6e 32 34 peartree_n24
Scan requested (ret=0) - scan timeout 30 seconds
Authentication with 00:23:69:35:d1:3f timed out.
Added BSSID 00:23:69:35:d1:3f into blacklist
No keys have been configured - skip key clearing
State: ASSOCIATING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=12):
70 65 61 72 74 72 65 65 5f 6e 35 30 peartree_n50
Scan requested (ret=0) - scan timeout 30 seconds
Ignore event for foreign ifindex 3
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
Wireless event: cmd=0x8b19 len=16
Scan results did not fit - trying larger buffer (8192 bytes)
Received 8028 bytes of scan results (16 BSSes)
CTRL-EVENT-SCAN-RESULTS
wpa_supplicant_select_bss_and_associate: qual 0 (0) qv=0 bv=0
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
1: 00:3a:98:a0:30:50 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
2: 00:3a:98:a0:70:43 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
3: 00:3a:98:a0:70:40 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
4: 00:3a:98:a0:70:42 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
5: 00:3a:98:a0:30:52 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
6: 00:3a:98:a0:30:53 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
7: 00:3a:98:7d:27:32 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
8: 00:3a:98:7d:27:33 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
9: 00:1b:11:e7:33:c7 ssid='glink' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
10: 00:3a:98:a0:72:60 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
11: 00:3a:98:a0:72:62 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
12: 00:23:69:35:d1:3f ssid='peartree_n50' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
13: 00:3a:98:a0:70:41 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
14: 00:3a:98:a0:30:51 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
15: 00:3a:98:7d:27:31 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
Try to find non-WPA AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
1: 00:3a:98:a0:30:50 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
2: 00:3a:98:a0:70:43 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
3: 00:3a:98:a0:70:40 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
4: 00:3a:98:a0:70:42 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
5: 00:3a:98:a0:30:52 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
6: 00:3a:98:a0:30:53 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
7: 00:3a:98:7d:27:32 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
8: 00:3a:98:7d:27:33 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
9: 00:1b:11:e7:33:c7 ssid='glink' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
10: 00:3a:98:a0:72:60 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
11: 00:3a:98:a0:72:62 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
12: 00:23:69:35:d1:3f ssid='peartree_n50' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - non-WPA network not allowed
13: 00:3a:98:a0:70:41 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
14: 00:3a:98:a0:30:51 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
15: 00:3a:98:7d:27:31 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
No APs found - clear blacklist and try again
Removed BSSID 00:23:69:35:d1:3f from blacklist (clear)
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
1: 00:3a:98:a0:30:50 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
2: 00:3a:98:a0:70:43 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
3: 00:3a:98:a0:70:40 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
4: 00:3a:98:a0:70:42 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
5: 00:3a:98:a0:30:52 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
6: 00:3a:98:a0:30:53 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
7: 00:3a:98:7d:27:32 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
8: 00:3a:98:7d:27:33 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
9: 00:1b:11:e7:33:c7 ssid='glink' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
10: 00:3a:98:a0:72:60 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
11: 00:3a:98:a0:72:62 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
12: 00:23:69:35:d1:3f ssid='peartree_n50' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
13: 00:3a:98:a0:70:41 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
14: 00:3a:98:a0:30:51 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
15: 00:3a:98:7d:27:31 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
Try to find non-WPA AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
1: 00:3a:98:a0:30:50 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
2: 00:3a:98:a0:70:43 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
3: 00:3a:98:a0:70:40 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
4: 00:3a:98:a0:70:42 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
5: 00:3a:98:a0:30:52 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
6: 00:3a:98:a0:30:53 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
7: 00:3a:98:7d:27:32 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
8: 00:3a:98:7d:27:33 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
9: 00:1b:11:e7:33:c7 ssid='glink' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
10: 00:3a:98:a0:72:60 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
11: 00:3a:98:a0:72:62 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
12: 00:23:69:35:d1:3f ssid='peartree_n50' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - non-WPA network not allowed
13: 00:3a:98:a0:70:41 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
14: 00:3a:98:a0:30:51 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
15: 00:3a:98:7d:27:31 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
No suitable AP found.
Setting scan request: 5 sec 0 usec
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b19 len=16
Scan results did not fit - trying larger buffer (8192 bytes)
Received 7520 bytes of scan results (15 BSSes)
CTRL-EVENT-SCAN-RESULTS
wpa_driver_wext_get_signal_quality: level -33 (146), qual 70 (70)
wpa_supplicant_select_bss_and_associate: qual 70 (70) qv=1 bv=1
Selecting BSS from priority group 0
Try to find current BSSID 00:23:69:35:d1:3e
found
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
selected based on RSN IE
matched associated BSSID
selected WPA AP 00:23:69:35:d1:3e ssid='peartree_n24'
Already associated with the selected AP.
Ignore event for foreign ifindex 2
No keys have been configured - skip key clearing
State: SCANNING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
wpa_driver_wext_disassociate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
No keys have been configured - skip key clearing
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 00:00:00:00:00:00 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_supplicant_event_disassoc: scheduled DISCONNECT spam handler
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b1a len=48
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b19 len=16
Scan results did not fit - trying larger buffer (8192 bytes)
Scan results did not fit - trying larger buffer (16384 bytes)
Received 9000 bytes of scan results (18 BSSes)
CTRL-EVENT-SCAN-RESULTS
Ignore event for foreign ifindex 2
key_mgmt: 0x2
scan_ssid=1 (0x1)
PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
ssid - hexdump_ascii(len=12):
70 65 61 72 74 72 65 65 5f 6e 32 34 peartree_n24
PSK (from passphrase) - hexdump(len=32): [REMOVED]
wpa_supplicant_select_bss_and_associate: qual 0 (0) qv=0 bv=0
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
selected based on RSN IE
selected WPA AP 00:23:69:35:d1:3e ssid='peartree_n24'
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 0c 00
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: DISCONNECTED -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 20 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Ignore event for foreign ifindex 3
Ignore event for foreign ifindex 3
Ignore event for foreign ifindex 3
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
Wireless event: cmd=0x8b04 len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
Wireless event: cmd=0x8b1a len=28
Ignore event for foreign ifindex 3
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
Wireless event: cmd=0x8b19 len=16
Scan results did not fit - trying larger buffer (8192 bytes)
Scan results did not fit - trying larger buffer (16384 bytes)
Received 8899 bytes of scan results (17 BSSes)
CTRL-EVENT-SCAN-RESULTS
wpa_supplicant_select_bss_and_associate: qual 0 (0) qv=0 bv=0
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
selected based on RSN IE
selected WPA AP 00:23:69:35:d1:3e ssid='peartree_n24'
Already associated with the selected AP.
RSN: Ignored PMKID candidate without preauth flag
No keys have been configured - skip key clearing
State: ASSOCIATING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
No keys have been configured - skip key clearing
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
key_mgmt: 0x2
scan_ssid=1 (0x1)
PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
ssid - hexdump_ascii(len=12):
70 65 61 72 74 72 65 65 5f 6e 32 34 peartree_n24
PSK (from passphrase) - hexdump(len=32): [REMOVED]
wpa_supplicant_select_bss_and_associate: qual 0 (0) qv=0 bv=0
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
selected based on RSN IE
selected WPA AP 00:23:69:35:d1:3e ssid='peartree_n24'
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 0c 00
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: DISCONNECTED -> ASSOCIATING
wpa_supplicant_set_state: canceling DISCONNECT spam handler
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 20 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b04 len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b1a len=28
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b19 len=16
Scan results did not fit - trying larger buffer (8192 bytes)
Scan results did not fit - trying larger buffer (16384 bytes)
Received 9012 bytes of scan results (18 BSSes)
CTRL-EVENT-SCAN-RESULTS
wpa_supplicant_select_bss_and_associate: qual 0 (0) qv=0 bv=0
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
selected based on RSN IE
selected WPA AP 00:23:69:35:d1:3e ssid='peartree_n24'
Already associated with the selected AP.
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8c08 len=181
AssocResp IE wireless event - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 6c 18 1b ff ff ff 00 01 00 00 00 00 00 c2 01 01 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 6c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 01 00 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:23:69:35:d1:3e
Association info event
resp_ies - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 6c 18 1b ff ff ff 00 01 00 00 00 00 00 c2 01 01 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 6c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 01 00 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:23:69:35:d1:3e
No keys have been configured - skip key clearing
Associated with 00:23:69:35:d1:3e
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
RX EAPOL from 00:23:69:35:d1:3e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
key_nonce - hexdump(len=32): 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 29
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): e6 6c fb e3 58 7a 0f 25 32 d9 a4 cb e2 8d ba 7b 17 17 84 65 14 a3 c9 3d 98 60 c8 47 05 96 74 c5
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 e6 6c fb e3 58 7a 0f 25 32 d9 a4 cb e2 8d ba 7b 17 17 84 65 14 a3 c9 3d 98 60 c8 47 05 96 74 c5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 81 1f ea 42 76 df ce a9 e4 9c 5f 5c e4 0b e5 b7 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:23:69:35:d1:3e
RX EAPOL - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 05 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 29 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2a ae 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0b b9 71 20 3e a1 90 64 09 ac 72 af a4 64 16 07 00 50 78 0c 0f c4 02 77 b2 c8 de 73 13 52 0c 25 1a 83 6b b6 0d c3 f5 8b 70 ca 82 d2 34 24 51 9e 4f 30 84 91 56 85 af 39 ea 66 6a cd bb c9 95 57 43 b9 68 51 b2 40 5c 02 89 ce 17 fe 5b 3a 01 50 c6 fe 57 b4 e1 54 f8 ed 26 23 22 90 f0 da e4 d0 63 d2
IEEE 802.1X RX: version=2 type=3 length=175
EAPOL-Key type=2
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
key_length=16 key_data_length=80
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
key_nonce - hexdump(len=32): 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 29
key_iv - hexdump(len=16): 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2a
key_rsc - hexdump(len=8): ae 02 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 0b b9 71 20 3e a1 90 64 09 ac 72 af a4 64 16 07
WPA: RX EAPOL-Key - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 05 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 29 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2a ae 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0b b9 71 20 3e a1 90 64 09 ac 72 af a4 64 16 07 00 50 78 0c 0f c4 02 77 b2 c8 de 73 13 52 0c 25 1a 83 6b b6 0d c3 f5 8b 70 ca 82 d2 34 24 51 9e 4f 30 84 91 56 85 af 39 ea 66 6a cd bb c9 95 57 43 b9 68 51 b2 40 5c 02 89 ce 17 fe 5b 3a 01 50 c6 fe 57 b4 e1 54 f8 ed 26 23 22 90 f0 da e4 d0 63 d2
RSN: encrypted key data - hexdump(len=80): 78 0c 0f c4 02 77 b2 c8 de 73 13 52 0c 25 1a 83 6b b6 0d c3 f5 8b 70 ca 82 d2 34 24 51 9e 4f 30 84 91 56 85 af 39 ea 66 6a cd bb c9 95 57 43 b9 68 51 b2 40 5c 02 89 ce 17 fe 5b 3a 01 50 c6 fe 57 b4 e1 54 f8 ed 26 23 22 90 f0 da e4 d0 63 d2
WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:23:69:35:d1:3e (ver=2)
WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00 dd 26 00 0f ac 01 01 00 65 86 03 a6 05 0c b0 37 80 e1 0e 25 78 89 3d dc 76 0b 9d ad 37 d2 59 7b 5d 08 26 3d 72 e3 3e af dd 00 00 00 00 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4d 0f cc 94 01 77 70 3a 0f 54 97 73 c3 a3 39 4e 00 00
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): ae 02 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Key negotiation completed with 00:23:69:35:d1:3e [PTK=CCMP GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3e completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Ignore event for foreign ifindex 2
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 30 seconds
Authentication with 00:00:00:00:00:00 timed out.
Added BSSID 00:00:00:00:00:00 into blacklist
No keys have been configured - skip key clearing
State: SCANNING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Setting scan request: 0 sec 0 usec
Ignore event for foreign ifindex 3
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
Wireless event: cmd=0x8b19 len=16
Scan results did not fit - trying larger buffer (8192 bytes)
Scan results did not fit - trying larger buffer (16384 bytes)
Received 9240 bytes of scan results (18 BSSes)
CTRL-EVENT-SCAN-RESULTS
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 30 seconds
wpa_driver_wext_disassociate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
No keys have been configured - skip key clearing
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:00:00:00:00:00
BSSID 00:00:00:00:00:00 blacklist count incremented to 2
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_supplicant_event_disassoc: scheduled DISCONNECT spam handler
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b19 len=16
Failed to get scan results
Failed to get scan results - try scanning again
Setting scan request: 1 sec 0 usec
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b1a len=48
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b19 len=16
Scan results did not fit - trying larger buffer (8192 bytes)
Scan results did not fit - trying larger buffer (16384 bytes)
Received 9516 bytes of scan results (19 BSSes)
CTRL-EVENT-SCAN-RESULTS
Ignore event for foreign ifindex 2
key_mgmt: 0x2
scan_ssid=1 (0x1)
PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
ssid - hexdump_ascii(len=12):
70 65 61 72 74 72 65 65 5f 6e 32 34 peartree_n24
PSK (from passphrase) - hexdump(len=32): [REMOVED]
wpa_supplicant_select_bss_and_associate: qual 0 (0) qv=0 bv=0
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
selected based on RSN IE
selected WPA AP 00:23:69:35:d1:3e ssid='peartree_n24'
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 0c 00
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: DISCONNECTED -> ASSOCIATING
wpa_supplicant_set_state: canceling DISCONNECT spam handler
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 20 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b04 len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b1a len=28
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b19 len=16
Scan results did not fit - trying larger buffer (8192 bytes)
Scan results did not fit - trying larger buffer (16384 bytes)
Received 9518 bytes of scan results (19 BSSes)
CTRL-EVENT-SCAN-RESULTS
wpa_supplicant_select_bss_and_associate: qual 0 (0) qv=0 bv=0
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
selected based on RSN IE
selected WPA AP 00:23:69:35:d1:3e ssid='peartree_n24'
Already associated with the selected AP.
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8c08 len=181
AssocResp IE wireless event - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 6c 18 1b ff ff ff 00 01 00 00 00 00 00 c2 01 01 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 6c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 01 00 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:23:69:35:d1:3e
Association info event
resp_ies - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 6c 18 1b ff ff ff 00 01 00 00 00 00 00 c2 01 01 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 6c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 01 00 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:23:69:35:d1:3e
No keys have been configured - skip key clearing
Associated with 00:23:69:35:d1:3e
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
RX EAPOL from 00:23:69:35:d1:3e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 05 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
key_nonce - hexdump(len=32): 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2a
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 05 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 82 a6 6b 69 73 3f 60 0e 35 9e e9 f5 c3 a3 aa d0 b8 bb f1 b4 dd a2 ca d8 17 2b 45 9d ab 76 81 a8
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 05 82 a6 6b 69 73 3f 60 0e 35 9e e9 f5 c3 a3 aa d0 b8 bb f1 b4 dd a2 ca d8 17 2b 45 9d ab 76 81 a8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f9 2e 3e 3d 93 f4 3d 63 84 f6 16 6b 69 76 cd a0 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:23:69:35:d1:3e
RX EAPOL - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 06 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2a 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2b c0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d5 47 88 c6 ce 4b 86 90 62 d0 29 6b 83 d5 6f b1 00 50 1c 6f db 78 2d e0 be b6 ef 56 23 44 b8 41 75 34 7e 9d 14 d2 8c fa 0e 95 f0 bc 72 12 d4 0a 6b fe ac eb a0 7d 82 ab 38 70 ab 20 b3 5c 9b 33 ba aa 61 56 05 e9 15 cb ab 4e d3 7d 73 bb 23 97 49 fd 6d ef 68 95 95 04 b0 85 22 fb 2d 12 a2 88 b6 30
IEEE 802.1X RX: version=2 type=3 length=175
EAPOL-Key type=2
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
key_length=16 key_data_length=80
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06
key_nonce - hexdump(len=32): 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2a
key_iv - hexdump(len=16): 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2b
key_rsc - hexdump(len=8): c0 02 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): d5 47 88 c6 ce 4b 86 90 62 d0 29 6b 83 d5 6f b1
WPA: RX EAPOL-Key - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 06 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2a 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2b c0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d5 47 88 c6 ce 4b 86 90 62 d0 29 6b 83 d5 6f b1 00 50 1c 6f db 78 2d e0 be b6 ef 56 23 44 b8 41 75 34 7e 9d 14 d2 8c fa 0e 95 f0 bc 72 12 d4 0a 6b fe ac eb a0 7d 82 ab 38 70 ab 20 b3 5c 9b 33 ba aa 61 56 05 e9 15 cb ab 4e d3 7d 73 bb 23 97 49 fd 6d ef 68 95 95 04 b0 85 22 fb 2d 12 a2 88 b6 30
RSN: encrypted key data - hexdump(len=80): 1c 6f db 78 2d e0 be b6 ef 56 23 44 b8 41 75 34 7e 9d 14 d2 8c fa 0e 95 f0 bc 72 12 d4 0a 6b fe ac eb a0 7d 82 ab 38 70 ab 20 b3 5c 9b 33 ba aa 61 56 05 e9 15 cb ab 4e d3 7d 73 bb 23 97 49 fd 6d ef 68 95 95 04 b0 85 22 fb 2d 12 a2 88 b6 30
WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:23:69:35:d1:3e (ver=2)
WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00 dd 26 00 0f ac 01 01 00 65 86 03 a6 05 0c b0 37 80 e1 0e 25 78 89 3d dc 76 0b 9d ad 37 d2 59 7b 5d 08 26 3d 72 e3 3e af dd 00 00 00 00 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 38 6c b6 db 02 3c 2e 94 46 14 29 ea d4 2a 6f 00 00
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): c0 02 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Key negotiation completed with 00:23:69:35:d1:3e [PTK=CCMP GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3e completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Ignore event for foreign ifindex 2
EAPOL: startWhen --> 0
EAPOL: disable timer tick
wpa_driver_wext_disassociate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
No keys have been configured - skip key clearing
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:00:00:00:00:00
BSSID 00:00:00:00:00:00 blacklist count incremented to 3
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_supplicant_event_disassoc: scheduled DISCONNECT spam handler
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b1a len=48
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
key_mgmt: 0x2
scan_ssid=1 (0x1)
PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
ssid - hexdump_ascii(len=12):
70 65 61 72 74 72 65 65 5f 6e 35 30 peartree_n50
PSK (from passphrase) - hexdump(len=32): [REMOVED]
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b19 len=16
Scan results did not fit - trying larger buffer (8192 bytes)
Scan results did not fit - trying larger buffer (16384 bytes)
Received 9518 bytes of scan results (19 BSSes)
CTRL-EVENT-SCAN-RESULTS
Ignore event for foreign ifindex 2
wpa_supplicant_select_bss_and_associate: qual 0 (0) qv=0 bv=0
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
1: 00:1b:9e:90:d8:cc ssid='Internet' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
2: 00:3a:98:a0:30:50 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
3: 00:3a:98:a0:30:52 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
4: 00:3a:98:a0:30:53 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
5: 00:3a:98:a0:70:42 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
6: 00:3a:98:a0:70:40 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
7: 00:3a:98:a0:70:43 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
8: 00:3a:98:7d:27:32 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
9: 00:3a:98:7d:27:33 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
10: 00:3a:98:7d:27:30 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
11: 00:1b:11:e7:33:c7 ssid='glink' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
12: 00:3a:98:a0:72:62 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
13: 00:1e:79:d6:eb:73 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
14: 00:3a:98:a0:72:63 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
15: 00:1b:9e:90:d8:cd ssid='VOIP' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
16: 00:3a:98:a0:30:51 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
17: 00:3a:98:a0:70:41 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
18: 00:3a:98:7d:27:31 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
Try to find non-WPA AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
1: 00:1b:9e:90:d8:cc ssid='Internet' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
2: 00:3a:98:a0:30:50 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
3: 00:3a:98:a0:30:52 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
4: 00:3a:98:a0:30:53 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
5: 00:3a:98:a0:70:42 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
6: 00:3a:98:a0:70:40 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
7: 00:3a:98:a0:70:43 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
8: 00:3a:98:7d:27:32 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
9: 00:3a:98:7d:27:33 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
10: 00:3a:98:7d:27:30 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
11: 00:1b:11:e7:33:c7 ssid='glink' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
12: 00:3a:98:a0:72:62 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
13: 00:1e:79:d6:eb:73 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
14: 00:3a:98:a0:72:63 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
15: 00:1b:9e:90:d8:cd ssid='VOIP' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
16: 00:3a:98:a0:30:51 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
17: 00:3a:98:a0:70:41 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
18: 00:3a:98:7d:27:31 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
No APs found - clear blacklist and try again
Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
1: 00:1b:9e:90:d8:cc ssid='Internet' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
2: 00:3a:98:a0:30:50 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
3: 00:3a:98:a0:30:52 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
4: 00:3a:98:a0:30:53 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
5: 00:3a:98:a0:70:42 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
6: 00:3a:98:a0:70:40 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
7: 00:3a:98:a0:70:43 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
8: 00:3a:98:7d:27:32 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
9: 00:3a:98:7d:27:33 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
10: 00:3a:98:7d:27:30 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
11: 00:1b:11:e7:33:c7 ssid='glink' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
12: 00:3a:98:a0:72:62 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
13: 00:1e:79:d6:eb:73 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
14: 00:3a:98:a0:72:63 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
15: 00:1b:9e:90:d8:cd ssid='VOIP' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
16: 00:3a:98:a0:30:51 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
17: 00:3a:98:a0:70:41 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
18: 00:3a:98:7d:27:31 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
Try to find non-WPA AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
1: 00:1b:9e:90:d8:cc ssid='Internet' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
2: 00:3a:98:a0:30:50 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
3: 00:3a:98:a0:30:52 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
4: 00:3a:98:a0:30:53 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
5: 00:3a:98:a0:70:42 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
6: 00:3a:98:a0:70:40 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
7: 00:3a:98:a0:70:43 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
8: 00:3a:98:7d:27:32 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
9: 00:3a:98:7d:27:33 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
10: 00:3a:98:7d:27:30 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
11: 00:1b:11:e7:33:c7 ssid='glink' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
12: 00:3a:98:a0:72:62 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
13: 00:1e:79:d6:eb:73 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
14: 00:3a:98:a0:72:63 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
15: 00:1b:9e:90:d8:cd ssid='VOIP' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
16: 00:3a:98:a0:30:51 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
17: 00:3a:98:a0:70:41 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
18: 00:3a:98:7d:27:31 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=12):
70 65 61 72 74 72 65 65 5f 6e 35 30 peartree_n50
Scan requested (ret=0) - scan timeout 30 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b19 len=16
Scan results did not fit - trying larger buffer (8192 bytes)
Scan results did not fit - trying larger buffer (16384 bytes)
Received 10165 bytes of scan results (20 BSSes)
CTRL-EVENT-SCAN-RESULTS
wpa_supplicant_select_bss_and_associate: qual 0 (0) qv=0 bv=0
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
1: 00:23:69:35:d1:3f ssid='peartree_n50' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
selected based on RSN IE
selected WPA AP 00:23:69:35:d1:3f ssid='peartree_n50'
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_supplicant_set_state: canceling DISCONNECT spam handler
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 20 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b04 len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b1a len=28
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b19 len=16
Scan results did not fit - trying larger buffer (8192 bytes)
Scan results did not fit - trying larger buffer (16384 bytes)
Received 10163 bytes of scan results (20 BSSes)
CTRL-EVENT-SCAN-RESULTS
wpa_supplicant_select_bss_and_associate: qual 0 (0) qv=0 bv=0
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
1: 00:23:69:35:d1:3f ssid='peartree_n50' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
selected based on RSN IE
selected WPA AP 00:23:69:35:d1:3f ssid='peartree_n50'
Already associated with the selected AP.
RSN: Ignored PMKID candidate without preauth flag
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8c08 len=175
AssocResp IE wireless event - hexdump(len=159): 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 6e 08 1b ff ff ff 00 01 00 00 00 00 00 c2 01 01 00 00 00 00 00 00 00 00 00 00 3d 16 24 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 6e 08 1b ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 24 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:23:69:35:d1:3f
Association info event
resp_ies - hexdump(len=159): 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 6e 08 1b ff ff ff 00 01 00 00 00 00 00 c2 01 01 00 00 00 00 00 00 00 00 00 00 3d 16 24 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 6e 08 1b ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 24 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:23:69:35:d1:3f
No keys have been configured - skip key clearing
Associated with 00:23:69:35:d1:3f
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
RX EAPOL from 00:23:69:35:d1:3f
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 06 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 27 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06
key_nonce - hexdump(len=32): 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 27
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 06 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 27 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3f (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 14 ff 6e 6d 55 0d 0b 82 7c 44 a8 0d 3a a5 9b 41 b7 57 39 7d ac 2f de 2b 64 71 62 52 e7 7c 7d fe
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 06 14 ff 6e 6d 55 0d 0b 82 7c 44 a8 0d 3a a5 9b 41 b7 57 39 7d ac 2f de 2b 64 71 62 52 e7 7c 7d fe 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 fb 65 ce 68 99 e9 8a e3 91 10 a8 8b ae 72 6a 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:23:69:35:d1:3f
RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 07 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 27 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28 6c 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 15 0c ce 96 8b 40 4f 1a ba 42 3c 4a 65 86 72 f2 00 38 71 1c d7 b5 3c 16 28 4f 99 aa 6c e2 b9 7e 45 e9 46 2a 41 7c ea 33 33 e4 ee d3 8d 73 aa 1f 9e c1 28 f1 1b 32 74 17 99 69 f0 97 97 2c c4 47 bc 55 07 e2 39 69 58 12 b1 c5
IEEE 802.1X RX: version=2 type=3 length=151
EAPOL-Key type=2
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
key_length=16 key_data_length=56
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 07
key_nonce - hexdump(len=32): 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 27
key_iv - hexdump(len=16): cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28
key_rsc - hexdump(len=8): 6c 03 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 15 0c ce 96 8b 40 4f 1a ba 42 3c 4a 65 86 72 f2
WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 07 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 27 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28 6c 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 15 0c ce 96 8b 40 4f 1a ba 42 3c 4a 65 86 72 f2 00 38 71 1c d7 b5 3c 16 28 4f 99 aa 6c e2 b9 7e 45 e9 46 2a 41 7c ea 33 33 e4 ee d3 8d 73 aa 1f 9e c1 28 f1 1b 32 74 17 99 69 f0 97 97 2c c4 47 bc 55 07 e2 39 69 58 12 b1 c5
RSN: encrypted key data - hexdump(len=56): 71 1c d7 b5 3c 16 28 4f 99 aa 6c e2 b9 7e 45 e9 46 2a 41 7c ea 33 33 e4 ee d3 8d 73 aa 1f 9e c1 28 f1 1b 32 74 17 99 69 f0 97 97 2c c4 47 bc 55 07 e2 39 69 58 12 b1 c5
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:23:69:35:d1:3f (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 15 67 50 82 8c 0a f1 f6 03 4e bd 2b 1a 48 c7 74 dd 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 96 17 5d 96 5f 86 ca c2 a6 ce 0d 50 3e 43 0c 85 00 00
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16).
WPA: RSC - hexdump(len=6): 6c 03 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=2 set_tx=0 seq_len=6 key_len=16
WPA: Key negotiation completed with 00:23:69:35:d1:3f [PTK=CCMP GTK=CCMP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3f completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Ignore event for foreign ifindex 2
EAPOL: startWhen --> 0
EAPOL: disable timer tick
wpa_driver_wext_disassociate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
No keys have been configured - skip key clearing
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 00:00:00:00:00:00 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_supplicant_event_disassoc: scheduled DISCONNECT spam handler
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b1a len=48
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
key_mgmt: 0x2
scan_ssid=1 (0x1)
PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
ssid - hexdump_ascii(len=12):
70 65 61 72 74 72 65 65 5f 6e 32 34 peartree_n24
PSK (from passphrase) - hexdump(len=32): [REMOVED]
wpa_supplicant_select_bss_and_associate: qual 0 (0) qv=0 bv=0
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
selected based on RSN IE
selected WPA AP 00:23:69:35:d1:3e ssid='peartree_n24'
Trying to associate with 00:23:69:35:d1:3e (SSID='peartree_n24' freq=2412 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 0c 00
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: DISCONNECTED -> ASSOCIATING
wpa_supplicant_set_state: canceling DISCONNECT spam handler
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 20 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b04 len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b1a len=28
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b19 len=16
Scan results did not fit - trying larger buffer (8192 bytes)
Scan results did not fit - trying larger buffer (16384 bytes)
Received 9664 bytes of scan results (19 BSSes)
CTRL-EVENT-SCAN-RESULTS
wpa_supplicant_select_bss_and_associate: qual 0 (0) qv=0 bv=0
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
selected based on RSN IE
selected WPA AP 00:23:69:35:d1:3e ssid='peartree_n24'
Already associated with the selected AP.
RSN: Ignored PMKID candidate without preauth flag
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8c08 len=181
AssocResp IE wireless event - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 6c 18 1b ff ff ff 00 01 00 00 00 00 00 c2 01 01 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 6c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 01 00 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:23:69:35:d1:3e
Association info event
resp_ies - hexdump(len=165): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 6c 18 1b ff ff ff 00 01 00 00 00 00 00 c2 01 01 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 6c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 01 00 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:23:69:35:d1:3e
No keys have been configured - skip key clearing
Associated with 00:23:69:35:d1:3e
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
RX EAPOL from 00:23:69:35:d1:3e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 06 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06
key_nonce - hexdump(len=32): 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2b
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 06 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 72 1c f2 43 9a 43 ef c7 6d d5 11 84 d3 c2 23 36 55 d5 a4 05 5d d4 1c c4 5a 40 8a e4 fe b7 a5 57
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 06 72 1c f2 43 9a 43 ef c7 6d d5 11 84 d3 c2 23 36 55 d5 a4 05 5d d4 1c c4 5a 40 8a e4 fe b7 a5 57 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 27 d1 79 93 99 1a f8 24 c6 93 0d 65 47 9f 0f 70 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:23:69:35:d1:3e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 06 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06
key_nonce - hexdump(len=32): 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2c
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 06 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 06 72 1c f2 43 9a 43 ef c7 6d d5 11 84 d3 c2 23 36 55 d5 a4 05 5d d4 1c c4 5a 40 8a e4 fe b7 a5 57 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9b c5 70 47 32 99 a0 7f d6 bb ec 67 4b f1 2d eb 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:23:69:35:d1:3e
RX EAPOL - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 07 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2c 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2d d7 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a1 a3 0f 30 03 25 45 71 3a 63 49 1b a9 47 8e a8 00 50 c3 af fc 16 37 6e 02 1f 96 44 c3 84 ea 6c d3 16 62 c8 40 93 c9 f9 a4 2e 11 81 2d 0a da 36 e8 4e a9 ca aa 7e 28 fa 02 0d e4 6c 74 3b d5 27 12 b5 e3 d3 71 ce 50 42 3b 7a 1b 32 1e da 7a fb 1f aa 42 bf b4 50 5e e4 be b2 18 de b8 21 3e bb a2 99
IEEE 802.1X RX: version=2 type=3 length=175
EAPOL-Key type=2
key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
key_length=16 key_data_length=80
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 07
key_nonce - hexdump(len=32): 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2c
key_iv - hexdump(len=16): 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2d
key_rsc - hexdump(len=8): d7 02 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): a1 a3 0f 30 03 25 45 71 3a 63 49 1b a9 47 8e a8
WPA: RX EAPOL-Key - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 07 22 f6 c5 b1 bb 1b 3f 4f ac d2 19 4f 08 b3 6b 97 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2c 90 92 b2 73 07 f6 d0 88 46 eb 0c f6 ff 08 97 2d d7 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a1 a3 0f 30 03 25 45 71 3a 63 49 1b a9 47 8e a8 00 50 c3 af fc 16 37 6e 02 1f 96 44 c3 84 ea 6c d3 16 62 c8 40 93 c9 f9 a4 2e 11 81 2d 0a da 36 e8 4e a9 ca aa 7e 28 fa 02 0d e4 6c 74 3b d5 27 12 b5 e3 d3 71 ce 50 42 3b 7a 1b 32 1e da 7a fb 1f aa 42 bf b4 50 5e e4 be b2 18 de b8 21 3e bb a2 99
RSN: encrypted key data - hexdump(len=80): c3 af fc 16 37 6e 02 1f 96 44 c3 84 ea 6c d3 16 62 c8 40 93 c9 f9 a4 2e 11 81 2d 0a da 36 e8 4e a9 ca aa 7e 28 fa 02 0d e4 6c 74 3b d5 27 12 b5 e3 d3 71 ce 50 42 3b 7a 1b 32 1e da 7a fb 1f aa 42 bf b4 50 5e e4 be b2 18 de b8 21 3e bb a2 99
WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:23:69:35:d1:3e (ver=2)
WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 0c 00 dd 26 00 0f ac 01 01 00 65 86 03 a6 05 0c b0 37 80 e1 0e 25 78 89 3d dc 76 0b 9d ad 37 d2 59 7b 5d 08 26 3d 72 e3 3e af dd 00 00 00 00 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 29 f4 f5 f6 57 fc 4d 1d 3b 36 ec 32 2f e8 de f5 00 00
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): d7 02 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Key negotiation completed with 00:23:69:35:d1:3e [PTK=CCMP GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:23:69:35:d1:3e completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Ignore event for foreign ifindex 2
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 30 seconds
Ignore event for foreign ifindex 3
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
Wireless event: cmd=0x8b19 len=16
Scan results did not fit - trying larger buffer (8192 bytes)
Scan results did not fit - trying larger buffer (16384 bytes)
Received 8684 bytes of scan results (17 BSSes)
CTRL-EVENT-SCAN-RESULTS
wpa_driver_wext_disassociate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
No keys have been configured - skip key clearing
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:00:00:00:00:00
BSSID 00:00:00:00:00:00 blacklist count incremented to 2
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_supplicant_event_disassoc: scheduled DISCONNECT spam handler
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b1a len=48
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b19 len=16
Received 4076 bytes of scan results (8 BSSes)
CTRL-EVENT-SCAN-RESULTS
Ignore event for foreign ifindex 2
key_mgmt: 0x2
scan_ssid=1 (0x1)
PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
ssid - hexdump_ascii(len=12):
70 65 61 72 74 72 65 65 5f 6e 35 30 peartree_n50
PSK (from passphrase) - hexdump(len=32): [REMOVED]
wpa_supplicant_select_bss_and_associate: qual 0 (0) qv=0 bv=0
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
1: 00:23:69:35:d1:3f ssid='peartree_n50' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
selected based on RSN IE
selected WPA AP 00:23:69:35:d1:3f ssid='peartree_n50'
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: DISCONNECTED -> ASSOCIATING
wpa_supplicant_set_state: canceling DISCONNECT spam handler
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 20 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b04 len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b1a len=28
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b19 len=16
Received 4075 bytes of scan results (8 BSSes)
CTRL-EVENT-SCAN-RESULTS
wpa_supplicant_select_bss_and_associate: qual 0 (0) qv=0 bv=0
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
1: 00:23:69:35:d1:3f ssid='peartree_n50' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
selected based on RSN IE
selected WPA AP 00:23:69:35:d1:3f ssid='peartree_n50'
Already associated with the selected AP.
RSN: Ignored PMKID candidate without preauth flag
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8c08 len=175
AssocResp IE wireless event - hexdump(len=159): 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 6e 08 1b ff ff ff 00 01 00 00 00 00 00 c2 01 01 00 00 00 00 00 00 00 00 00 00 3d 16 24 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 6e 08 1b ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 24 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:23:69:35:d1:3f
Association info event
resp_ies - hexdump(len=159): 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 6e 08 1b ff ff ff 00 01 00 00 00 00 00 c2 01 01 00 00 00 00 00 00 00 00 00 00 3d 16 24 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 6e 08 1b ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 24 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:23:69:35:d1:3f
No keys have been configured - skip key clearing
Associated with 00:23:69:35:d1:3f
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
RX EAPOL from 00:23:69:35:d1:3f
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 07 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 07
key_nonce - hexdump(len=32): 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 07 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3f (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 58 e8 27 92 97 dc 16 b6 9e e5 a5 01 e3 d8 8c 49 9c 7d 1f 6b 0c 84 bd 28 cc 6a a3 f6 60 f4 7b 28
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 07 58 e8 27 92 97 dc 16 b6 9e e5 a5 01 e3 d8 8c 49 9c 7d 1f 6b 0c 84 bd 28 cc 6a a3 f6 60 f4 7b 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 bb 7a 99 ab ed 32 92 72 ea 31 cb 00 b7 54 9f 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:23:69:35:d1:3f
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 08 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 08
key_nonce - hexdump(len=32): 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 08 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3f (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 08 58 e8 27 92 97 dc 16 b6 9e e5 a5 01 e3 d8 8c 49 9c 7d 1f 6b 0c 84 bd 28 cc 6a a3 f6 60 f4 7b 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 de e0 66 c3 e5 3c 1a 68 22 e6 b8 cb e6 90 c0 c0 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:23:69:35:d1:3f
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 09 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 09
key_nonce - hexdump(len=32): 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 09 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3f (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 09 58 e8 27 92 97 dc 16 b6 9e e5 a5 01 e3 d8 8c 49 9c 7d 1f 6b 0c 84 bd 28 cc 6a a3 f6 60 f4 7b 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 17 19 7d 2e 56 38 63 a0 8e 99 4b e2 12 25 15 0a 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:23:69:35:d1:3f
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 0a 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0a
key_nonce - hexdump(len=32): 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 0a 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3f (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 0a 58 e8 27 92 97 dc 16 b6 9e e5 a5 01 e3 d8 8c 49 9c 7d 1f 6b 0c 84 bd 28 cc 6a a3 f6 60 f4 7b 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5c 34 46 1f b6 47 31 37 12 89 52 15 ab 11 38 d3 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from 00:23:69:35:d1:3f
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 0b 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0b
key_nonce - hexdump(len=32): 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 0b 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3f (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 0b 58 e8 27 92 97 dc 16 b6 9e e5 a5 01 e3 d8 8c 49 9c 7d 1f 6b 0c 84 bd 28 cc 6a a3 f6 60 f4 7b 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9a a6 e4 86 ce f2 b0 02 1d 11 30 6a 73 fc 58 48 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:23:69:35:d1:3f
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 0c 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0c
key_nonce - hexdump(len=32): 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 0c 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3f (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 0c 58 e8 27 92 97 dc 16 b6 9e e5 a5 01 e3 d8 8c 49 9c 7d 1f 6b 0c 84 bd 28 cc 6a a3 f6 60 f4 7b 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 74 3c 0a c0 8d f8 08 cc ed 24 30 1d 61 ec 3d 51 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:23:69:35:d1:3f
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 0d 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0d
key_nonce - hexdump(len=32): 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 0d 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3f (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 0d 58 e8 27 92 97 dc 16 b6 9e e5 a5 01 e3 d8 8c 49 9c 7d 1f 6b 0c 84 bd 28 cc 6a a3 f6 60 f4 7b 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8e 28 09 09 5d 9e 40 dc df f6 e1 b2 56 a2 d5 08 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:23:69:35:d1:3f
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 0e 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0e
key_nonce - hexdump(len=32): 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 0e 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3f (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 0e 58 e8 27 92 97 dc 16 b6 9e e5 a5 01 e3 d8 8c 49 9c 7d 1f 6b 0c 84 bd 28 cc 6a a3 f6 60 f4 7b 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8e 9b 23 60 2e 19 7c b6 fb d0 3f 27 b3 81 05 5a 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:00:00:00:00:00
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Setting scan request: 0 sec 100000 usec
Added BSSID 00:23:69:35:d1:3f into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Ignore event for foreign ifindex 2
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 30 seconds
Authentication with 00:00:00:00:00:00 timed out.
BSSID 00:00:00:00:00:00 blacklist count incremented to 3
No keys have been configured - skip key clearing
State: SCANNING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=12):
70 65 61 72 74 72 65 65 5f 6e 35 30 peartree_n50
Scan requested (ret=-1) - scan timeout 30 seconds
Failed to initiate AP scan.
Setting scan request: 10 sec 0 usec
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b19 len=16
Scan results did not fit - trying larger buffer (8192 bytes)
Scan results did not fit - trying larger buffer (16384 bytes)
Received 10170 bytes of scan results (20 BSSes)
CTRL-EVENT-SCAN-RESULTS
wpa_supplicant_select_bss_and_associate: qual 0 (0) qv=0 bv=0
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
1: 00:23:69:35:d1:3f ssid='peartree_n50' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
selected based on RSN IE
selected WPA AP 00:23:69:35:d1:3f ssid='peartree_n50'
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 20 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b04 len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b1a len=28
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8c08 len=175
AssocResp IE wireless event - hexdump(len=159): 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 6e 08 1b ff ff ff 00 01 00 00 00 00 00 c2 01 01 00 00 00 00 00 00 00 00 00 00 3d 16 24 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 6e 08 1b ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 24 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:23:69:35:d1:3f
Association info event
resp_ies - hexdump(len=159): 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 6e 08 1b ff ff ff 00 01 00 00 00 00 00 c2 01 01 00 00 00 00 00 00 00 00 00 00 3d 16 24 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 6e 08 1b ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 24 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:23:69:35:d1:3f
No keys have been configured - skip key clearing
Associated with 00:23:69:35:d1:3f
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
RX EAPOL from 00:23:69:35:d1:3f
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 00 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
key_nonce - hexdump(len=32): 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 00 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3f (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): e5 f3 8c 8d b8 f9 bd 95 e3 e9 55 58 ba f2 95 6f e8 06 53 0a b9 20 38 c7 30 c6 63 90 63 fa 81 21
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 e5 f3 8c 8d b8 f9 bd 95 e3 e9 55 58 ba f2 95 6f e8 06 53 0a b9 20 38 c7 30 c6 63 90 63 fa 81 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 7d 2f 96 13 72 e5 15 47 55 93 7e a5 c0 d6 9b 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:23:69:35:d1:3f
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3f (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 e5 f3 8c 8d b8 f9 bd 95 e3 e9 55 58 ba f2 95 6f e8 06 53 0a b9 20 38 c7 30 c6 63 90 63 fa 81 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 23 a5 d8 9a 41 f5 3e 7b f1 0c 02 a0 4d 17 e2 81 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:23:69:35:d1:3f
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3f (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 e5 f3 8c 8d b8 f9 bd 95 e3 e9 55 58 ba f2 95 6f e8 06 53 0a b9 20 38 c7 30 c6 63 90 63 fa 81 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 44 5e f7 15 5b 14 96 d3 a2 d3 d7 7a c3 4a 06 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from 00:23:69:35:d1:3f
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3f (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 e5 f3 8c 8d b8 f9 bd 95 e3 e9 55 58 ba f2 95 6f e8 06 53 0a b9 20 38 c7 30 c6 63 90 63 fa 81 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7e f0 ac 72 5e 1c 1b 38 89 b6 53 68 47 2d 5d 20 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:23:69:35:d1:3f
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
key_nonce - hexdump(len=32): 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3f (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 e5 f3 8c 8d b8 f9 bd 95 e3 e9 55 58 ba f2 95 6f e8 06 53 0a b9 20 38 c7 30 c6 63 90 63 fa 81 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0d af 49 2f bb f7 ca b4 3b 9a 99 05 dc b6 51 87 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:23:69:35:d1:3f
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 05 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
key_nonce - hexdump(len=32): 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 05 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3f (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 05 e5 f3 8c 8d b8 f9 bd 95 e3 e9 55 58 ba f2 95 6f e8 06 53 0a b9 20 38 c7 30 c6 63 90 63 fa 81 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 88 57 3b 6c 7f 57 85 91 f4 d9 2e a6 f3 c1 ba b0 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:23:69:35:d1:3f
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 06 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06
key_nonce - hexdump(len=32): 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 06 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3f (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 06 e5 f3 8c 8d b8 f9 bd 95 e3 e9 55 58 ba f2 95 6f e8 06 53 0a b9 20 38 c7 30 c6 63 90 63 fa 81 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 22 e9 96 2f ed b0 54 bb 47 6c 67 17 63 6d 63 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:23:69:35:d1:3f
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 07 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 07
key_nonce - hexdump(len=32): 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 07 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3f (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 07 e5 f3 8c 8d b8 f9 bd 95 e3 e9 55 58 ba f2 95 6f e8 06 53 0a b9 20 38 c7 30 c6 63 90 63 fa 81 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ba 59 d3 98 89 b3 fc 41 df f2 51 c0 9b 00 4f 3e 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:00:00:00:00:00
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Setting scan request: 0 sec 100000 usec
BSSID 00:23:69:35:d1:3f blacklist count incremented to 2
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Ignore event for foreign ifindex 2
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 30 seconds
Authentication with 00:00:00:00:00:00 timed out.
BSSID 00:00:00:00:00:00 blacklist count incremented to 4
No keys have been configured - skip key clearing
State: SCANNING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=12):
70 65 61 72 74 72 65 65 5f 6e 35 30 peartree_n50
Scan requested (ret=-1) - scan timeout 30 seconds
Failed to initiate AP scan.
Setting scan request: 10 sec 0 usec
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b19 len=16
Scan results did not fit - trying larger buffer (8192 bytes)
Scan results did not fit - trying larger buffer (16384 bytes)
Received 10643 bytes of scan results (21 BSSes)
CTRL-EVENT-SCAN-RESULTS
wpa_supplicant_select_bss_and_associate: qual 0 (0) qv=0 bv=0
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
1: 00:23:69:35:d1:3f ssid='peartree_n50' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - blacklisted
2: 00:1b:9e:90:d8:cc ssid='Internet' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
3: 00:3a:98:a0:30:50 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
4: 00:3a:98:a0:30:53 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
5: 00:3a:98:a0:30:52 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
6: 00:3a:98:a0:70:40 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
7: 00:3a:98:a0:70:43 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
8: 00:3a:98:a0:70:42 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
9: 00:3a:98:7d:27:32 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
10: 00:3a:98:7d:27:30 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
11: 00:3a:98:7d:27:33 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
12: 00:3a:98:a0:72:60 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
13: 00:3a:98:a0:72:63 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
14: 00:1b:11:e7:33:c7 ssid='glink' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
15: 00:3a:98:a0:72:62 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
16: 00:3a:98:a0:30:51 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
17: 00:1b:9e:90:d8:cd ssid='VOIP' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
18: 00:3a:98:a0:70:41 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
19: 00:3a:98:7d:27:31 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
20: 00:3a:98:a0:72:61 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - no WPA/RSN IE
Try to find non-WPA AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
1: 00:23:69:35:d1:3f ssid='peartree_n50' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - blacklisted
2: 00:1b:9e:90:d8:cc ssid='Internet' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
3: 00:3a:98:a0:30:50 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
4: 00:3a:98:a0:30:53 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
5: 00:3a:98:a0:30:52 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
6: 00:3a:98:a0:70:40 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
7: 00:3a:98:a0:70:43 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
8: 00:3a:98:a0:70:42 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
9: 00:3a:98:7d:27:32 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
10: 00:3a:98:7d:27:30 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
11: 00:3a:98:7d:27:33 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
12: 00:3a:98:a0:72:60 ssid='RH_WLAN_TRUST' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
13: 00:3a:98:a0:72:63 ssid='Red Hat Guest' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
skip - SSID mismatch
14: 00:1b:11:e7:33:c7 ssid='glink' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
15: 00:3a:98:a0:72:62 ssid='Red Hat' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
16: 00:3a:98:a0:30:51 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
17: 00:1b:9e:90:d8:cd ssid='VOIP' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
18: 00:3a:98:a0:70:41 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
19: 00:3a:98:7d:27:31 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
20: 00:3a:98:a0:72:61 ssid='rh-wireless' wpa_ie_len=0 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
No APs found - clear blacklist and try again
Removed BSSID 00:23:69:35:d1:3f from blacklist (clear)
Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:23:69:35:d1:3e ssid='peartree_n24' wpa_ie_len=28 rsn_ie_len=24 caps=0x11
skip - SSID mismatch
1: 00:23:69:35:d1:3f ssid='peartree_n50' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
selected based on RSN IE
selected WPA AP 00:23:69:35:d1:3f ssid='peartree_n50'
Trying to associate with 00:23:69:35:d1:3f (SSID='peartree_n50' freq=5180 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Setting authentication timeout: 20 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b04 len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b1a len=28
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8c08 len=175
AssocResp IE wireless event - hexdump(len=159): 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 6e 08 1b ff ff ff 00 01 00 00 00 00 00 c2 01 01 00 00 00 00 00 00 00 00 00 00 3d 16 24 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 6e 08 1b ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 24 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:23:69:35:d1:3f
Association info event
resp_ies - hexdump(len=159): 01 08 8c 12 98 24 b0 48 60 6c 2d 1a 6e 08 1b ff ff ff 00 01 00 00 00 00 00 c2 01 01 00 00 00 00 00 00 00 00 00 00 3d 16 24 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 00 f0 05 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 6e 08 1b ff ff 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 24 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:23:69:35:d1:3f
No keys have been configured - skip key clearing
Associated with 00:23:69:35:d1:3f
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
RX EAPOL from 00:23:69:35:d1:3f
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 00 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
key_nonce - hexdump(len=32): 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 2a
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 00 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3f (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 65 29 ff af 6b 00 aa b7 82 13 49 4d 21 ed e9 07 59 4c 60 cd de ea 16 35 19 49 c5 cb cf 32 97 cd
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 65 29 ff af 6b 00 aa b7 82 13 49 4d 21 ed e9 07 59 4c 60 cd de ea 16 35 19 49 c5 cb cf 32 97 cd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 37 8b 9a 9e ef 75 06 43 25 c0 3a 0d a6 ff b9 6e 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:23:69:35:d1:3f
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 2a
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3f (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 65 29 ff af 6b 00 aa b7 82 13 49 4d 21 ed e9 07 59 4c 60 cd de ea 16 35 19 49 c5 cb cf 32 97 cd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09 10 e0 a5 cc 35 40 a4 4a 94 68 48 90 57 e4 36 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:23:69:35:d1:3f
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
EAPOL-Key type=2
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 2a
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 0b a4 31 b4 1c f2 e3 bb 89 4a 9c b9 32 2a 08 a2 cc 77 65 c2 da 71 3c 49 a4 46 2e 40 7b cd 0a 2a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:23:69:35:d1:3f (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:24:d7:13:21:d4 A2=00:23:69:35:d1:3f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 65 29 ff af 6b 00 aa b7 82 13 49 4d 21 ed e9 07 59 4c 60 cd de ea 16 35 19 49 c5 cb cf 32 97 cd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4e c9 9f 6f 30 46 f0 be 72 9e f9 04 f3 02 f9 db 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
wpa_driver_wext_disassociate
No keys have been configured - skip key clearing
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
No keys have been configured - skip key clearing
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 00:00:00:00:00:00 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_supplicant_event_disassoc: scheduled DISCONNECT spam handler
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Ignore event for foreign ifindex 2
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b1a len=48
Ignore event for foreign ifindex 2
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan3' added
Wireless event: cmd=0x8b19 len=16
Scan results did not fit - trying larger buffer (8192 bytes)
Scan results did not fit - trying larger buffer (16384 bytes)
Received 10142 bytes of scan results (20 BSSes)
CTRL-EVENT-SCAN-RESULTS
Ignore event for foreign ifindex 2
wpa_disconnect_spam_handle: 1 disconnect events in 6 seconds
Authentication with 00:00:00:00:00:00 timed out.
BSSID 00:00:00:00:00:00 blacklist count incremented to 2
No keys have been configured - skip key clearing
State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Setting scan request: 0 sec 0 usec
Setting scan request: 0 sec 0 usec
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 30 seconds
Ignore event for foreign ifindex 3
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
Wireless event: cmd=0x8b19 len=16
Scan results did not fit - trying larger buffer (8192 bytes)
Received 5932 bytes of scan results (11 BSSes)
CTRL-EVENT-SCAN-RESULTS
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: ec15e68ba6a regresion?
2011-04-01 9:25 ` Stanislaw Gruszka
@ 2011-04-01 9:54 ` Jouni Malinen
2011-04-01 11:10 ` Stanislaw Gruszka
0 siblings, 1 reply; 5+ messages in thread
From: Jouni Malinen @ 2011-04-01 9:54 UTC (permalink / raw)
To: Stanislaw Gruszka; +Cc: linux-wireless
On Fri, Apr 01, 2011 at 11:25:08AM +0200, Stanislaw Gruszka wrote:
> Seems when disconnect event is handled, we remove some key. I'm
> attaching non-debug and debug logs. Note this is kinda old
> version of wpa_supplicant.
> wpa_driver_wext_disassociate
Huh.. This is with WEXT and the commit
ec15e68ba6a505631016f230899bafbb7b8cd0d6 is adding an nl80211 event. It
should have no change whatsoever to WEXT. I'm not sure whether I
understood the debug log correctly, so I'm not sure what was the area
that behaved incorrectly among multiple successful connections. Anyway,
I do not see how this particular commit could have anything to do with
this. Are you sure that this issues shows only when this commit is in
place and does not show if you revert just this commit?
--
Jouni Malinen PGP id EFC895FA
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: ec15e68ba6a regresion?
2011-04-01 9:54 ` Jouni Malinen
@ 2011-04-01 11:10 ` Stanislaw Gruszka
0 siblings, 0 replies; 5+ messages in thread
From: Stanislaw Gruszka @ 2011-04-01 11:10 UTC (permalink / raw)
To: Jouni Malinen; +Cc: linux-wireless
On Fri, Apr 01, 2011 at 12:54:28PM +0300, Jouni Malinen wrote:
> On Fri, Apr 01, 2011 at 11:25:08AM +0200, Stanislaw Gruszka wrote:
>
> > Seems when disconnect event is handled, we remove some key. I'm
> > attaching non-debug and debug logs. Note this is kinda old
> > version of wpa_supplicant.
>
> > wpa_driver_wext_disassociate
>
> Huh.. This is with WEXT and the commit
> ec15e68ba6a505631016f230899bafbb7b8cd0d6 is adding an nl80211 event. It
> should have no change whatsoever to WEXT. I'm not sure whether I
> understood the debug log correctly, so I'm not sure what was the area
> that behaved incorrectly among multiple successful connections. Anyway,
> I do not see how this particular commit could have anything to do with
> this. Are you sure that this issues shows only when this commit is in
> place and does not show if you revert just this commit?
I just reproduced the problem with commit reverted. Sorry for noise,
I'm going to investigate issue a bit more.
Stanislaw
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2011-04-01 11:11 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2011-03-31 15:42 ec15e68ba6a regresion? Stanislaw Gruszka
2011-03-31 15:46 ` Jouni Malinen
2011-04-01 9:25 ` Stanislaw Gruszka
2011-04-01 9:54 ` Jouni Malinen
2011-04-01 11:10 ` Stanislaw Gruszka
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).