linux-wireless.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* oops while trying to associate with TKIP-PSK network
@ 2008-05-27  0:24 Barteq
  2008-05-27  6:28 ` Tomas Winkler
  0 siblings, 1 reply; 3+ messages in thread
From: Barteq @ 2008-05-27  0:24 UTC (permalink / raw)
  To: linux-wireless

Hello developers!

I've got ubuntu backported kernel with iwl4965 driver version 1.2.26ks.
Short after computer is being on it tries to associate with my home  
WPA-PSK network. After some tries it OOPS and forces me to reboot computer.
Maybe it is fixed in the newest version, but I'm unable to build it due to  
compile errors (under 2.6.25-1-generic).

Trace below:

May 27 01:51:48 thinkpad kernel: [  208.540680] wlan0: authenticate with  
AP 00:13:10:4a:c6:88
May 27 01:51:48 thinkpad kernel: [  208.542393] wlan0: RX authentication  
 from 00:13:10:4a:c6:88 (alg=0 transaction=2 status=0)
May 27 01:51:48 thinkpad kernel: [  208.542393] wlan0: authenticated
May 27 01:51:48 thinkpad kernel: [  208.542393] wlan0: associate with AP  
00:13:10:4a:c6:88
May 27 01:51:48 thinkpad kernel: [  208.542393] BUG: unable to handle  
kernel NULL pointer dereference at 00000090
May 27 01:51:48 thinkpad kernel: [  208.542393] IP: [<f8c2740c>]  
:mac80211:ieee80211_associate+0x24c/0x640
May 27 01:51:48 thinkpad kernel: [  208.542393] *pde = 00000000
May 27 01:51:48 thinkpad kernel: [  208.542393] Oops: 0000 [#1] SMP
May 27 01:51:48 thinkpad kernel: [  208.542393] Modules linked in:  
af_packet ipv6 binfmt_misc container sbs sbshc acpi_cpufreq  
cpufreq_powersav
e cpufreq_stats cpufreq_userspace cpufreq_ondemand cpufreq_conservative  
freq_table iptable_filter ip_tables x_tables ext3 jbd mbcache hdaps inp
ut_polldev uinput loop joydev arc4 ecb snd_hda_intel snd_pcsp pcmcia  
iwl4965 snd_pcm_oss snd_mixer_oss snd_seq_oss psmouse iwlcore snd_pcm rfki
ll snd_seq_midi serio_raw iTCO_wdt iTCO_vendor_support yenta_socket  
rsrc_nonstatic mac80211 ac video snd_rawmidi pcmcia_core battery cfg80211 b
ay output nvidia(P) snd_seq_midi_event snd_seq agpgart i2c_core snd_timer  
snd_seq_device snd soundcore button snd_page_alloc e1000e shpchp pci_
hotplug thinkpad_acpi led_class nvram evdev reiserfs sha256_generic  
aes_i586 aes_generic cbc sr_mod cdrom piix ide_pci_generic ide_core sg sd_m
od ata_piix ata_generic ohci1394 ieee1394 pata_acpi ahci libata scsi_mod  
dock ehci_hcd uhci_hcd usbcore dm_crypt crypto_blkcipher dm_mirror dm_log  
dm_snapshot dm_mod ther
May 27 01:51:48 thinkpad kernel: al processor fan fbcon tileblit font  
bitblit softcursor fuse
May 27 01:51:48 thinkpad kernel: [  208.542393]
May 27 01:51:48 thinkpad kernel: [  208.542393] Pid: 4534, comm: iwl4965  
Tainted: P          (2.6.25-1-generic #1)
May 27 01:51:48 thinkpad kernel: [  208.542393] EIP: 0060:[<f8c2740c>]  
EFLAGS: 00010246 CPU: 0
May 27 01:51:48 thinkpad kernel: [  208.542393] EIP is at  
ieee80211_associate+0x24c/0x640 [mac80211]
May 27 01:51:48 thinkpad kernel: [  208.542393] EAX: 00000000 EBX:  
f5c3c810 ECX: 00000000 EDX: f5c3c82c
May 27 01:51:48 thinkpad kernel: [  208.542393] ESI: f7e42e84 EDI:  
f5c3c82e EBP: 00000421 ESP: f7923d4c
May 27 01:51:48 thinkpad kernel: [  208.542393]  DS: 007b ES: 007b FS:  
00d8 GS: 0000 SS: 0068
May 27 01:51:48 thinkpad kernel: [  208.542393] Process iwl4965 (pid:  
4534, ti=f7922000 task=f7a51360 task.ti=f7922000)
May 27 01:51:48 thinkpad kernel: [  208.542393] Stack: f7e42e84 00000000  
f7923d88 f7e42e38 f7e42800 f5c01240 33323435 205d3339
May 27 01:51:48 thinkpad kernel: [  208.542393]        00000000 f7923ed7  
f5c3c82c f7c294c4 00000000 00000000 f7e42d00 313a3030
May 27 01:51:48 thinkpad kernel: [  208.542393]        30313a33 3a61343a  
383a3663 f8c20038 f5e3c044 00000002 00000000 f7e42d00
May 27 01:51:48 thinkpad kernel: [  208.542393] Call Trace:
May 27 01:51:48 thinkpad kernel: [  208.542393]  [<f8c20038>]  
ieee80211_ioctl_siwauth+0x18/0x80 [mac80211]
May 27 01:51:48 thinkpad kernel: [  208.542393]  [<f8c286c3>]  
ieee80211_sta_rx_queued_mgmt+0xd13/0x10f0 [mac80211]
May 27 01:51:48 thinkpad kernel: [  208.542393]  [<f8c3042d>]  
__ieee80211_tx+0x7d/0x170 [mac80211]
May 27 01:51:48 thinkpad kernel: [  208.542393]   
[dev_hard_start_xmit+0x21d/0x2b0] dev_hard_start_xmit+0x21d/0x2b0
May 27 01:51:48 thinkpad kernel: [  208.542393]   
[iwl4965:_spin_lock_bh+0x8/0x60] _spin_lock_bh+0x8/0x20
May 27 01:51:48 thinkpad kernel: [  208.542393]  [<f8c236ea>]  
ieee80211_rx_bss_get+0xaa/0xc0 [mac80211]
May 27 01:51:48 thinkpad kernel: [  208.542393]  [<f8c29810>]  
ieee80211_sta_work+0x80/0x740 [mac80211]
May 27 01:51:48 thinkpad kernel: [  208.542393]  [update_curr+0x41/0x70]  
update_curr+0x41/0x70
May 27 01:51:48 thinkpad kernel: [  208.542393]   
[__dequeue_entity+0x50/0xc0] __dequeue_entity+0x50/0xc0
May 27 01:51:48 thinkpad kernel: [  208.542393]  [hrtick_set+0x69/0x130]  
hrtick_set+0x69/0x130
May 27 01:51:48 thinkpad kernel: [  208.542393]   
[jbd:schedule+0x26b/0x6c0] schedule+0x26b/0x670
May 27 01:51:48 thinkpad kernel: [  208.542393]  [<f8c29790>]  
ieee80211_sta_work+0x0/0x740 [mac80211]
May 27 01:51:48 thinkpad kernel: [  208.542393]   
[run_workqueue+0xb8/0x150] run_workqueue+0xb8/0x150
May 27 01:51:48 thinkpad kernel: [  208.542393]  [worker_thread+0x0/0xe0]  
worker_thread+0x0/0xe0
May 27 01:51:48 thinkpad kernel: [  208.542393]  [worker_thread+0x80/0xe0]  
worker_thread+0x80/0xe0
May 27 01:51:48 thinkpad kernel: [  208.542393]  [<c013a760>]  
autoremove_wake_function+0x0/0x40
May 27 01:51:48 thinkpad kernel: [  208.542393]  [worker_thread+0x0/0xe0]  
worker_thread+0x0/0xe0
May 27 01:51:48 thinkpad kernel: [  208.542393]  [kthread+0x42/0x70]  
kthread+0x42/0x70
May 27 01:51:48 thinkpad kernel: [  208.542393]  [kthread+0x0/0x70]  
kthread+0x0/0x70
May 27 01:51:48 thinkpad kernel: [  208.542393]   
[kernel_thread_helper+0x7/0x10] kernel_thread_helper+0x7/0x10
May 27 01:51:48 thinkpad kernel: [  208.542393]  =======================
May 27 01:51:48 thinkpad kernel: [  208.542393] Code: 00 8b 7c 24 0c 8b 54  
24 28 8b 47 70 88 42 01 8b 47 70 89 d7 83 c7 02 89 c1 c1 e9 02 f3 a5 89 c1  
83 e1 03 74 02 f3 a4 8b 4c 24 30 <8b> 89 90 00 00 00 85 c9 89 4c 24 38 0f  
84 92 03 00 00 8b 7c 24
May 27 01:51:48 thinkpad kernel: [  208.542393] EIP: [<f8c2740c>]  
ieee80211_associate+0x24c/0x640 [mac80211] SS:ESP 0068:f7923d4c
May 27 01:51:48 thinkpad kernel: [  208.542403] ---[ end trace  
f77f607b02413c6c ]---



^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: oops while trying to associate with TKIP-PSK network
  2008-05-27  0:24 oops while trying to associate with TKIP-PSK network Barteq
@ 2008-05-27  6:28 ` Tomas Winkler
  2008-05-27 22:29   ` oops while trying to associate with TKIP-PSK network (solved - not oops but can't connect anymore) Barteq
  0 siblings, 1 reply; 3+ messages in thread
From: Tomas Winkler @ 2008-05-27  6:28 UTC (permalink / raw)
  To: Barteq; +Cc: linux-wireless

On Tue, May 27, 2008 at 3:24 AM, Barteq <barteqpl@gmail.com> wrote:
> Hello developers!
>
> I've got ubuntu backported kernel with iwl4965 driver version 1.2.26ks.
> Short after computer is being on it tries to associate with my home WPA-PSK
> network. After some tries it OOPS and forces me to reboot computer.
> Maybe it is fixed in the newest version, but I'm unable to build it due to
> compile errors (under 2.6.25-1-generic).
>
> Trace below:
>
> May 27 01:51:48 thinkpad kernel: [  208.540680] wlan0: authenticate with AP
> 00:13:10:4a:c6:88
> May 27 01:51:48 thinkpad kernel: [  208.542393] wlan0: RX authentication
> from 00:13:10:4a:c6:88 (alg=0 transaction=2 status=0)
> May 27 01:51:48 thinkpad kernel: [  208.542393] wlan0: authenticated
> May 27 01:51:48 thinkpad kernel: [  208.542393] wlan0: associate with AP
> 00:13:10:4a:c6:88
> May 27 01:51:48 thinkpad kernel: [  208.542393] BUG: unable to handle kernel
> NULL pointer dereference at 00000090
> May 27 01:51:48 thinkpad kernel: [  208.542393] IP: [<f8c2740c>]
> :mac80211:ieee80211_associate+0x24c/0x640
> May 27 01:51:48 thinkpad kernel: [  208.542393] *pde = 00000000
> May 27 01:51:48 thinkpad kernel: [  208.542393] Oops: 0000 [#1] SMP
> May 27 01:51:48 thinkpad kernel: [  208.542393] Modules linked in: af_packet
> ipv6 binfmt_misc container sbs sbshc acpi_cpufreq cpufreq_powersav
> e cpufreq_stats cpufreq_userspace cpufreq_ondemand cpufreq_conservative
> freq_table iptable_filter ip_tables x_tables ext3 jbd mbcache hdaps inp
> ut_polldev uinput loop joydev arc4 ecb snd_hda_intel snd_pcsp pcmcia iwl4965
> snd_pcm_oss snd_mixer_oss snd_seq_oss psmouse iwlcore snd_pcm rfki
> ll snd_seq_midi serio_raw iTCO_wdt iTCO_vendor_support yenta_socket
> rsrc_nonstatic mac80211 ac video snd_rawmidi pcmcia_core battery cfg80211 b
> ay output nvidia(P) snd_seq_midi_event snd_seq agpgart i2c_core snd_timer
> snd_seq_device snd soundcore button snd_page_alloc e1000e shpchp pci_
> hotplug thinkpad_acpi led_class nvram evdev reiserfs sha256_generic aes_i586
> aes_generic cbc sr_mod cdrom piix ide_pci_generic ide_core sg sd_m
> od ata_piix ata_generic ohci1394 ieee1394 pata_acpi ahci libata scsi_mod
> dock ehci_hcd uhci_hcd usbcore dm_crypt crypto_blkcipher dm_mirror dm_log
> dm_snapshot dm_mod ther
> May 27 01:51:48 thinkpad kernel: al processor fan fbcon tileblit font
> bitblit softcursor fuse
> May 27 01:51:48 thinkpad kernel: [  208.542393]
> May 27 01:51:48 thinkpad kernel: [  208.542393] Pid: 4534, comm: iwl4965
> Tainted: P          (2.6.25-1-generic #1)
> May 27 01:51:48 thinkpad kernel: [  208.542393] EIP: 0060:[<f8c2740c>]
> EFLAGS: 00010246 CPU: 0
> May 27 01:51:48 thinkpad kernel: [  208.542393] EIP is at
> ieee80211_associate+0x24c/0x640 [mac80211]
> May 27 01:51:48 thinkpad kernel: [  208.542393] EAX: 00000000 EBX: f5c3c810
> ECX: 00000000 EDX: f5c3c82c
> May 27 01:51:48 thinkpad kernel: [  208.542393] ESI: f7e42e84 EDI: f5c3c82e
> EBP: 00000421 ESP: f7923d4c
> May 27 01:51:48 thinkpad kernel: [  208.542393]  DS: 007b ES: 007b FS: 00d8
> GS: 0000 SS: 0068
> May 27 01:51:48 thinkpad kernel: [  208.542393] Process iwl4965 (pid: 4534,
> ti=f7922000 task=f7a51360 task.ti=f7922000)
> May 27 01:51:48 thinkpad kernel: [  208.542393] Stack: f7e42e84 00000000
> f7923d88 f7e42e38 f7e42800 f5c01240 33323435 205d3339
> May 27 01:51:48 thinkpad kernel: [  208.542393]        00000000 f7923ed7
> f5c3c82c f7c294c4 00000000 00000000 f7e42d00 313a3030
> May 27 01:51:48 thinkpad kernel: [  208.542393]        30313a33 3a61343a
> 383a3663 f8c20038 f5e3c044 00000002 00000000 f7e42d00
> May 27 01:51:48 thinkpad kernel: [  208.542393] Call Trace:
> May 27 01:51:48 thinkpad kernel: [  208.542393]  [<f8c20038>]
> ieee80211_ioctl_siwauth+0x18/0x80 [mac80211]
> May 27 01:51:48 thinkpad kernel: [  208.542393]  [<f8c286c3>]
> ieee80211_sta_rx_queued_mgmt+0xd13/0x10f0 [mac80211]
> May 27 01:51:48 thinkpad kernel: [  208.542393]  [<f8c3042d>]
> __ieee80211_tx+0x7d/0x170 [mac80211]
> May 27 01:51:48 thinkpad kernel: [  208.542393]
>  [dev_hard_start_xmit+0x21d/0x2b0] dev_hard_start_xmit+0x21d/0x2b0
> May 27 01:51:48 thinkpad kernel: [  208.542393]
>  [iwl4965:_spin_lock_bh+0x8/0x60] _spin_lock_bh+0x8/0x20
> May 27 01:51:48 thinkpad kernel: [  208.542393]  [<f8c236ea>]
> ieee80211_rx_bss_get+0xaa/0xc0 [mac80211]
> May 27 01:51:48 thinkpad kernel: [  208.542393]  [<f8c29810>]
> ieee80211_sta_work+0x80/0x740 [mac80211]
> May 27 01:51:48 thinkpad kernel: [  208.542393]  [update_curr+0x41/0x70]
> update_curr+0x41/0x70
> May 27 01:51:48 thinkpad kernel: [  208.542393]
>  [__dequeue_entity+0x50/0xc0] __dequeue_entity+0x50/0xc0
> May 27 01:51:48 thinkpad kernel: [  208.542393]  [hrtick_set+0x69/0x130]
> hrtick_set+0x69/0x130
> May 27 01:51:48 thinkpad kernel: [  208.542393]  [jbd:schedule+0x26b/0x6c0]
> schedule+0x26b/0x670
> May 27 01:51:48 thinkpad kernel: [  208.542393]  [<f8c29790>]
> ieee80211_sta_work+0x0/0x740 [mac80211]
> May 27 01:51:48 thinkpad kernel: [  208.542393]  [run_workqueue+0xb8/0x150]
> run_workqueue+0xb8/0x150
> May 27 01:51:48 thinkpad kernel: [  208.542393]  [worker_thread+0x0/0xe0]
> worker_thread+0x0/0xe0
> May 27 01:51:48 thinkpad kernel: [  208.542393]  [worker_thread+0x80/0xe0]
> worker_thread+0x80/0xe0
> May 27 01:51:48 thinkpad kernel: [  208.542393]  [<c013a760>]
> autoremove_wake_function+0x0/0x40
> May 27 01:51:48 thinkpad kernel: [  208.542393]  [worker_thread+0x0/0xe0]
> worker_thread+0x0/0xe0
> May 27 01:51:48 thinkpad kernel: [  208.542393]  [kthread+0x42/0x70]
> kthread+0x42/0x70
> May 27 01:51:48 thinkpad kernel: [  208.542393]  [kthread+0x0/0x70]
> kthread+0x0/0x70
> May 27 01:51:48 thinkpad kernel: [  208.542393]
>  [kernel_thread_helper+0x7/0x10] kernel_thread_helper+0x7/0x10
> May 27 01:51:48 thinkpad kernel: [  208.542393]  =======================
> May 27 01:51:48 thinkpad kernel: [  208.542393] Code: 00 8b 7c 24 0c 8b 54
> 24 28 8b 47 70 88 42 01 8b 47 70 89 d7 83 c7 02 89 c1 c1 e9 02 f3 a5 89 c1
> 83 e1 03 74 02 f3 a4 8b 4c 24 30 <8b> 89 90 00 00 00 85 c9 89 4c 24 38 0f 84
> 92 03 00 00 8b 7c 24
> May 27 01:51:48 thinkpad kernel: [  208.542393] EIP: [<f8c2740c>]
> ieee80211_associate+0x24c/0x640 [mac80211] SS:ESP 0068:f7923d4c
> May 27 01:51:48 thinkpad kernel: [  208.542403] ---[ end trace
> f77f607b02413c6c ]---
>

This one shell fix it up.
http://marc.info/?l=linux-wireless&m=121120929012836&w=2

Tomas

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: oops while trying to associate with TKIP-PSK network (solved - not oops but can't connect anymore)
  2008-05-27  6:28 ` Tomas Winkler
@ 2008-05-27 22:29   ` Barteq
  0 siblings, 0 replies; 3+ messages in thread
From: Barteq @ 2008-05-27 22:29 UTC (permalink / raw)
  To: Tomas Winkler; +Cc: linux-wireless

[-- Attachment #1: Type: text/plain, Size: 3764 bytes --]

Dnia 27-05-2008 o 08:28:50 Tomas Winkler <tomasw@gmail.com> napisał(a):

> This one shell fix it up.
> http://marc.info/?l=linux-wireless&m=121120929012836&w=2
>
> Tomas

Hello!

Thank you for a fast response. I've switched my kernel to zen-sources one  
with this patch applied - yep - it helped. Module does not oop anymore.
But with this update (moslty from 2.6.24 do anything else) i've lost  
ability to connect with my home WPA network..
I've managed to do this only twice with plenty of tries and hours of  
waiting ;/

After second time connection dropped 3 minutes later with

May 27 23:52:26 thinkpad kernel: [  936.601464] iwl4965: Error sending  
REPLY_RXON: time out after 500ms.
May 27 23:52:26 thinkpad kernel: [  936.601477] iwl4965: Error clearing  
ASSOC_MSK on current configuration (-110).

and some seconds after

May 27 23:53:28 thinkpad kernel: [  999.187037] wlan0:  
deauthenticate(reason=3)
May 27 23:53:28 thinkpad kernel: [  999.187320] iwl4965: Microcode SW  
error detected.  Restarting 0x82000000.

In an attachmenet there is log from one of a tries.

My enviroment:

router: Linksys WRT54GP2
  \_ WPA - PSK - TKIP
  \_ network type Mixed (B and G)
  \_ ssid broadcast on
  \_ Preamble type: Long [ but in logs it switches to short one?]
  \_ Beacon every 1000 ms
  \_ other options keep untouched.

client: ubuntu 8.04
   \_ custom kernel Linux thinkpad 2.6.26-rc4-zen0 #2 SMP Tue May 27  
22:22:44 CEST 2008 i686 GNU/Linux
   	\_ made from git -  
http://zen-sources.org/cgi-bin/gitweb.cgi?p=kernel.git;a=summary - it have  
latest iwlwifi brnach merged
    \_ Intel 4965AGN card - driver version 1.2.26ks

Problem is - I can't associate with my AP. Whatever I try, it always  
disconnect just after "Group rekeying completed" using plain  
wpa_supplicant.
With network manager it is authenticated/deauthenticated monologue..

ex:

May 28 00:19:04 thinkpad kernel: [ 2559.748528] wlan0: associated
May 28 00:19:04 thinkpad kernel: [ 2559.748528] wlan0: switched to short  
barker preamble (BSSID=00:13:10:4a:c6:88)
May 28 00:19:07 thinkpad NetworkManager: <info>  Supplicant state changed:  
1
May 28 00:19:14 thinkpad NetworkManager: <info>  Supplicant state changed:  
0
May 28 00:19:14 thinkpad kernel: [ 2569.018496] wlan0: RX deauthentication  
 from 00:13:10:4a:c6:88 (reason=2)
May 28 00:19:14 thinkpad kernel: [ 2569.018496] wlan0: deauthenticated
May 28 00:19:15 thinkpad kernel: [ 2570.029947] wlan0: authenticate with  
AP 00:13:10:4a:c6:88
May 28 00:19:15 thinkpad kernel: [ 2570.031598] wlan0: RX authentication  
 from 00:13:10:4a:c6:88 (alg=0 transaction=2 status=0)
May 28 00:19:15 thinkpad kernel: [ 2570.031598] wlan0: authenticated
May 28 00:19:15 thinkpad kernel: [ 2570.031598] wlan0: associate with AP  
00:13:10:4a:c6:88
May 28 00:19:15 thinkpad kernel: [ 2570.034516] wlan0: RX ReassocResp from  
00:13:10:4a:c6:88 (capab=0x431 status=0 aid=2)
May 28 00:19:15 thinkpad kernel: [ 2570.034520] wlan0: associated

till infinity...
Sometimes it connects, works fine up to key change (3600 s) and then log  
looks like this above.

I have issues like this only on iwl driver. The same computer, the same  
hardware works fine under windows xp. Also broadcom laptop works fine too  
with this AP. Even my windows mobile 6 device works like a charm so it is  
not a linksys issue.
My previus laptop have intel 3956 card. On IPW driver it worked well, but  
on IWL one - it was completely broken.

My determination made me write here, becouse have no chance to solve it  
myself - it looks like driver bug. Aftr using PLENTY of versions - from  
1.2.0 up to latest GIT one you are my last chance. Would REALLY appreciate  
your help. Of course I can provide as much debug info as you want.

Best regards,
Bartek



[-- Attachment #2: debug_wpa_supplicant+zen_2.log --]
[-- Type: application/octet-stream, Size: 101376 bytes --]

Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group='adm' (DEPRECATED)
Priority group 65
   id=3 ssid='gutek_zone'
Priority group 60
   id=2 ssid='INSOMNIA'
Priority group 0
   id=0 ssid='kretyn.com'
   id=1 ssid='ContactMultimedia'
Initializing interface (2) 'wlan0'
Interface wlan0 set UP - waiting a second for the driver to complete initialization
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:1d:e0:a8:65:f5
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
ctrl_interface_group=4 (from group name 'adm')
Added interface wlan0
Ignore event for foreign ifindex 5
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 246 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS 
Selecting BSS from priority group 65
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Selecting BSS from priority group 60
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
   selected WPA AP 00:13:10:4a:c6:88 ssid='kretyn.com'
Try to find non-WPA AP
Trying to associate with 00:13:10:4a:c6:88 (SSID='kretyn.com' freq=2447 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=18
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=171
Association info event
req_ies - hexdump(len=52): 00 0a 6b 72 65 74 79 6e 2e 63 6f 6d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 92 98 a4 b0 c8 e0 ec
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:13:10:4a:c6:88
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:10:4a:c6:88
No keys have been configured - skip key clearing
Associated with 00:13:10:4a:c6:88
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:13:10:4a:c6:88
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 e0
  key_nonce - hexdump(len=32): c4 a1 97 26 b7 42 5f ec 98 9b 56 ee ae 9c 7f 3f 37 65 6f 3b c9 89 7f fa 96 10 0b 36 26 ec 77 e4
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): c3 ec 7c fd cc f8 27 81 b2 58 57 32 bb 01 2a 03 f8 f3 13 dc e6 07 69 81 28 96 3e 82 a7 52 87 0e
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
  key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=32 key_data_length=24
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 e1
  key_nonce - hexdump(len=32): c4 a1 97 26 b7 42 5f ec 98 9b 56 ee ae 9c 7f 3f 37 65 6f 3b c9 89 7f fa 96 10 0b 36 26 ec 77 e4
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 25 fb 67 f9 74 57 8c 88 59 d6 35 7b e6 1b b4 70
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 e2
  key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
  key_iv - hexdump(len=16): 7f c2 e0 91 af 24 72 05 96 9b 8e 83 43 f1 21 d6
  key_rsc - hexdump(len=8): 69 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 9f c0 9d 28 27 7a ee 6f 1c fb 65 db 6c 62 5f dc
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 69 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:13:10:4a:c6:88 [PTK=TKIP GTK=TKIP]
Cancelling scan request
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:13:10:4a:c6:88 completed (auth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 e3
  key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
  key_iv - hexdump(len=16): 73 e7 30 75 71 fc 5c 5e 4c c7 97 44 6b d6 99 44
  key_rsc - hexdump(len=8): 6a 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): e2 19 bf 97 34 b9 f6 1c ba b6 09 7a 4f ff 10 ca
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 6a 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Group rekeying completed with 00:13:10:4a:c6:88 [GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:13:10:4a:c6:88 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=171
Association info event
req_ies - hexdump(len=52): 00 0a 6b 72 65 74 79 6e 2e 63 6f 6d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 92 98 a4 b0 c8 e0 ec
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 e4
  key_nonce - hexdump(len=32): cd 78 09 4d 62 9c 98 7c 10 ea d2 0e 33 1d 32 3f 7a 55 e6 01 b8 68 a9 88 b0 05 04 be b8 02 09 db
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: SCANNING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): dd ac 33 e0 10 15 b2 fe 41 c9 38 d8 a8 09 dd a9 59 ed 8b 67 6c 2a ab 17 2b 0b c3 14 a9 63 24 82
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:13:10:4a:c6:88
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:10:4a:c6:88
No keys have been configured - skip key clearing
Associated with 00:13:10:4a:c6:88
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:13:10:4a:c6:88
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 e5
  key_nonce - hexdump(len=32): 27 81 64 8e cd 4f d8 3b c8 6b fa 8a 5d 9d 9f 7b c4 0c aa 0e e1 d7 1e b9 42 29 a1 ab f7 bb 2b 8c
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 46 c1 f9 d7 d1 19 f1 87 62 c8 ce ed e5 7f e5 c8 0b cc 38 9b 77 83 d7 30 1e 3b bf 53 e5 79 1a 44
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
  key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=32 key_data_length=24
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 e6
  key_nonce - hexdump(len=32): 27 81 64 8e cd 4f d8 3b c8 6b fa 8a 5d 9d 9f 7b c4 0c aa 0e e1 d7 1e b9 42 29 a1 ab f7 bb 2b 8c
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 1d 85 02 79 62 84 cc 82 25 5f 1e 8d 60 74 62 35
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 e7
  key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
  key_iv - hexdump(len=16): d6 3b 19 13 a2 6f 28 54 9b 36 07 83 3d f5 7e 04
  key_rsc - hexdump(len=8): 6b 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): a1 88 5d 15 29 ed eb 88 ed 20 c2 59 32 94 e7 e6
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 6b 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:13:10:4a:c6:88 [PTK=TKIP GTK=TKIP]
Cancelling scan request
Cancelling authentication timeout
Removed BSSID 00:13:10:4a:c6:88 from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:13:10:4a:c6:88 completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Scan timeout - try to get results
Received 246 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS 
Selecting BSS from priority group 65
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Selecting BSS from priority group 60
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
   selected WPA AP 00:13:10:4a:c6:88 ssid='kretyn.com'
Try to find non-WPA AP
Already associated with the selected AP.
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 e8
  key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
  key_iv - hexdump(len=16): 9f 5e 9b 78 59 51 23 49 87 f4 8d 74 7e c5 a3 cd
  key_rsc - hexdump(len=8): 6c 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 60 df 1f a4 74 f4 3b 77 97 5e 00 61 a9 00 db c7
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 6c 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Group rekeying completed with 00:13:10:4a:c6:88 [GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:13:10:4a:c6:88 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=171
Association info event
req_ies - hexdump(len=52): 00 0a 6b 72 65 74 79 6e 2e 63 6f 6d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 92 98 a4 b0 c8 e0 ec
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 e9
  key_nonce - hexdump(len=32): 3b b5 c5 d6 78 bc 38 c0 6c 8f b1 e5 73 e4 d1 89 46 8f 18 b3 4b 26 ae f1 dd 00 c2 d2 95 4f a2 72
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: SCANNING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 4e 79 e2 f4 7d 9f 44 a4 03 97 a9 21 85 b9 43 06 6f c3 08 87 a9 fb e5 73 1e ed 2b c9 8f 15 54 b5
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:13:10:4a:c6:88
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:10:4a:c6:88
No keys have been configured - skip key clearing
Associated with 00:13:10:4a:c6:88
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:13:10:4a:c6:88
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 ea
  key_nonce - hexdump(len=32): fe 04 62 c6 fa 1f 66 a0 ea 4b e9 ed 3f 3a dd 79 f8 06 75 2e 5d cf e9 91 02 c1 46 a0 93 ce 7a e1
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): a0 43 4e d6 21 97 6d 6a 47 5b b6 31 83 2f 3b 56 7a d4 4b 4a 27 f7 fb 4d 84 8a 5e 04 5e 77 20 46
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
  key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=32 key_data_length=24
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 eb
  key_nonce - hexdump(len=32): fe 04 62 c6 fa 1f 66 a0 ea 4b e9 ed 3f 3a dd 79 f8 06 75 2e 5d cf e9 91 02 c1 46 a0 93 ce 7a e1
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 99 0e 31 49 8f 6e 30 84 6d 03 a8 d1 8a 61 c6 d4
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 ec
  key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
  key_iv - hexdump(len=16): 52 15 92 6b 30 f7 10 91 d0 34 ba 8e e6 50 46 90
  key_rsc - hexdump(len=8): 6d 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 39 e2 dd ff 9a 00 44 24 6a 2b 1f ce 4c 4a 1a 1c
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 6d 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:13:10:4a:c6:88 [PTK=TKIP GTK=TKIP]
Cancelling scan request
Cancelling authentication timeout
Removed BSSID 00:13:10:4a:c6:88 from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:13:10:4a:c6:88 completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Scan timeout - try to get results
Received 246 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS 
Selecting BSS from priority group 65
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Selecting BSS from priority group 60
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
   selected WPA AP 00:13:10:4a:c6:88 ssid='kretyn.com'
Try to find non-WPA AP
Already associated with the selected AP.
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 ed
  key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
  key_iv - hexdump(len=16): 9c 94 58 1e 66 5f da 44 fc 92 17 a0 3d 49 9f 5d
  key_rsc - hexdump(len=8): 6e 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 70 1b 3c 86 3e fe f9 c9 35 55 5a a6 07 e8 9f e9
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 6e 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Group rekeying completed with 00:13:10:4a:c6:88 [GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:13:10:4a:c6:88 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=171
Association info event
req_ies - hexdump(len=52): 00 0a 6b 72 65 74 79 6e 2e 63 6f 6d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 92 98 a4 b0 c8 e0 ec
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 ee
  key_nonce - hexdump(len=32): e5 c7 13 3b 91 63 fc a6 42 4f 34 94 4e cf 89 5c de c1 d3 f6 f1 60 e6 1e bd c3 b9 24 a8 9f 39 6b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: SCANNING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): be 87 91 d6 26 f3 74 a3 8e 9f 8c ca 8a be 5d c1 c1 ac eb 25 1d 93 5d 82 05 2d 81 50 61 82 d6 53
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:13:10:4a:c6:88
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:10:4a:c6:88
No keys have been configured - skip key clearing
Associated with 00:13:10:4a:c6:88
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:13:10:4a:c6:88
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 ef
  key_nonce - hexdump(len=32): 27 6c c2 56 6d 50 b4 45 7c 25 79 05 0f e2 99 7e ba 20 09 c4 ed 62 b9 f2 af 5e 8a ce 9d c5 e8 94
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 2a 3d 73 79 34 a1 ff 43 d7 25 94 82 37 a8 5f 2f 2f fd 70 94 67 2d a2 ac b2 92 3c 32 53 e5 e1 e9
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
  key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=32 key_data_length=24
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 f0
  key_nonce - hexdump(len=32): 27 6c c2 56 6d 50 b4 45 7c 25 79 05 0f e2 99 7e ba 20 09 c4 ed 62 b9 f2 af 5e 8a ce 9d c5 e8 94
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 45 cf 99 81 6d 4c 5e 06 5c 6c 6c 52 bc 4f 92 ea
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 f1
  key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
  key_iv - hexdump(len=16): 00 05 62 04 40 26 6c 79 9f ed 23 55 1b 71 e2 a1
  key_rsc - hexdump(len=8): 6f 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 37 ab 29 85 81 51 9a da f3 cc dd 46 5d 48 07 fd
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 6f 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:13:10:4a:c6:88 [PTK=TKIP GTK=TKIP]
Cancelling scan request
Cancelling authentication timeout
Removed BSSID 00:13:10:4a:c6:88 from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:13:10:4a:c6:88 completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Scan timeout - try to get results
Received 246 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS 
Selecting BSS from priority group 65
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Selecting BSS from priority group 60
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
   selected WPA AP 00:13:10:4a:c6:88 ssid='kretyn.com'
Try to find non-WPA AP
Already associated with the selected AP.
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 f2
  key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
  key_iv - hexdump(len=16): 18 e1 2b 3a ce 75 b5 4d c0 ad d6 a5 a7 4e 19 da
  key_rsc - hexdump(len=8): 70 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): c1 f7 83 68 d5 f4 93 84 0a 8f 18 49 f8 a8 04 5d
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 70 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Group rekeying completed with 00:13:10:4a:c6:88 [GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:13:10:4a:c6:88 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=171
Association info event
req_ies - hexdump(len=52): 00 0a 6b 72 65 74 79 6e 2e 63 6f 6d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 92 98 a4 b0 c8 e0 ec
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 f3
  key_nonce - hexdump(len=32): 79 76 28 a1 4a 49 48 7e ac ec 5c dc 4d 8a 31 90 f5 eb 5e 9f ce 60 06 be b4 00 a0 2f a5 2f 04 9f
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: SCANNING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): a9 5a a0 87 20 c1 90 b3 3f a3 91 98 bf fd 56 be 45 f6 7d 00 60 67 a4 fa 02 d6 9e fa 15 a5 26 d0
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:13:10:4a:c6:88
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:10:4a:c6:88
No keys have been configured - skip key clearing
Associated with 00:13:10:4a:c6:88
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:13:10:4a:c6:88
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 f4
  key_nonce - hexdump(len=32): e3 5a c6 4f bf 03 b2 9e 18 d1 6b b1 3b 4f 7e db d6 61 a8 03 e7 79 3d a3 2b 55 9a 17 e3 fb a7 bb
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 3f bb eb 3d e6 44 7f ee 82 92 41 ce e2 b5 45 af 69 61 25 e2 8b b0 af 53 81 31 bf ed 14 49 1e 44
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
  key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=32 key_data_length=24
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 f5
  key_nonce - hexdump(len=32): e3 5a c6 4f bf 03 b2 9e 18 d1 6b b1 3b 4f 7e db d6 61 a8 03 e7 79 3d a3 2b 55 9a 17 e3 fb a7 bb
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 52 29 44 26 19 bc 2c 83 81 2a f0 a7 26 1f 0f c7
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 f6
  key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
  key_iv - hexdump(len=16): c0 72 e0 f1 bc 1e 6f 2d b2 97 b3 78 f6 0f e6 2a
  key_rsc - hexdump(len=8): 71 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): d7 22 a1 e2 57 95 07 a6 1d 5d 58 10 ed 50 c5 63
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 71 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:13:10:4a:c6:88 [PTK=TKIP GTK=TKIP]
Cancelling scan request
Cancelling authentication timeout
Removed BSSID 00:13:10:4a:c6:88 from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:13:10:4a:c6:88 completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Scan timeout - try to get results
Received 246 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS 
Selecting BSS from priority group 65
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Selecting BSS from priority group 60
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
   selected WPA AP 00:13:10:4a:c6:88 ssid='kretyn.com'
Try to find non-WPA AP
Already associated with the selected AP.
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 f7
  key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
  key_iv - hexdump(len=16): 7d 2d 63 4e 06 31 b9 59 a1 d1 5e b5 0c 7c 9e 6e
  key_rsc - hexdump(len=8): 72 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 34 82 49 93 b4 0e ff e7 6b ee 82 e3 83 69 54 0e
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 72 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Group rekeying completed with 00:13:10:4a:c6:88 [GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:13:10:4a:c6:88 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=171
Association info event
req_ies - hexdump(len=52): 00 0a 6b 72 65 74 79 6e 2e 63 6f 6d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 92 98 a4 b0 c8 e0 ec
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 f8
  key_nonce - hexdump(len=32): 86 27 43 ea 68 a7 1a 6a 79 fb 26 87 b7 d0 c5 48 18 b9 ec b4 5f c8 ec e9 8e 41 10 fa 88 dd 38 6c
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: SCANNING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 38 9b 0e da f7 f0 f6 57 d8 fa 8b 7f 03 18 12 8a 03 fa 05 27 62 79 86 9a 2f 1f 52 ee b5 ec c2 6d
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:13:10:4a:c6:88
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:10:4a:c6:88
No keys have been configured - skip key clearing
Associated with 00:13:10:4a:c6:88
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:13:10:4a:c6:88
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 f9
  key_nonce - hexdump(len=32): 0d 0b 06 ed 42 3a 3e 68 74 01 32 77 9e ae 6a fd e8 79 e7 0b 77 26 26 7a a5 4b 03 55 f2 4f 03 db
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): a3 de f0 b7 46 d7 59 64 70 92 f5 d3 e0 e4 d4 74 c0 ef c9 5d 6e a0 49 9a dc 52 ef 27 eb a8 81 67
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
  key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=32 key_data_length=24
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 fa
  key_nonce - hexdump(len=32): 0d 0b 06 ed 42 3a 3e 68 74 01 32 77 9e ae 6a fd e8 79 e7 0b 77 26 26 7a a5 4b 03 55 f2 4f 03 db
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): f0 7a a5 a5 ed fc f6 0a 11 ba dd ff 22 f5 dd aa
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 fb
  key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
  key_iv - hexdump(len=16): 24 42 27 0e 3e 17 22 b1 2d 91 ba e4 91 a2 ad d6
  key_rsc - hexdump(len=8): 73 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): b5 d7 7e ed e0 e9 98 70 38 33 75 5d 8f 14 33 46
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 73 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:13:10:4a:c6:88 [PTK=TKIP GTK=TKIP]
Cancelling scan request
Cancelling authentication timeout
Removed BSSID 00:13:10:4a:c6:88 from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:13:10:4a:c6:88 completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Scan timeout - try to get results
Received 246 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS 
Selecting BSS from priority group 65
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Selecting BSS from priority group 60
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
   selected WPA AP 00:13:10:4a:c6:88 ssid='kretyn.com'
Try to find non-WPA AP
Already associated with the selected AP.
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 fc
  key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
  key_iv - hexdump(len=16): ec 5b a4 34 ca f1 ca 2d fc cb fe 40 68 d3 80 ca
  key_rsc - hexdump(len=8): 74 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 01 70 cb d4 1c c6 18 de e9 a6 f1 7a ca 16 88 40
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 74 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Group rekeying completed with 00:13:10:4a:c6:88 [GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:13:10:4a:c6:88 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=171
Association info event
req_ies - hexdump(len=52): 00 0a 6b 72 65 74 79 6e 2e 63 6f 6d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 92 98 a4 b0 c8 e0 ec
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 fd
  key_nonce - hexdump(len=32): 4f 9e cd ce ac 16 c2 b8 1c a0 0c d3 e3 8a 9e 3a 70 82 71 85 61 46 86 db 92 34 97 94 53 93 2c 46
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: SCANNING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): a1 6f 4f c9 11 14 b0 57 9f 42 02 f6 33 72 cc 93 5f 5e 37 62 16 d9 a4 60 4d 50 8c 5d 82 10 74 18
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:13:10:4a:c6:88
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:10:4a:c6:88
No keys have been configured - skip key clearing
Associated with 00:13:10:4a:c6:88
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:13:10:4a:c6:88
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 fe
  key_nonce - hexdump(len=32): 45 85 64 e8 36 d0 28 b3 47 17 0b 15 e1 69 ce 9c b8 7c 9f 9b 06 b5 e3 e6 99 1a 11 e6 b5 84 09 af
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 72 14 d4 83 81 21 0e 26 f6 e3 a4 86 d8 4b 55 45 de 47 45 f7 61 65 ec 19 ad 61 d8 68 23 51 fa 88
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
  key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=32 key_data_length=24
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 ff
  key_nonce - hexdump(len=32): 45 85 64 e8 36 d0 28 b3 47 17 0b 15 e1 69 ce 9c b8 7c 9f 9b 06 b5 e3 e6 99 1a 11 e6 b5 84 09 af
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): e7 55 30 cf 5e 64 72 0a d5 0a fa 1f 79 22 85 dc
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 00
  key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
  key_iv - hexdump(len=16): d4 e8 98 c3 73 52 31 7b 37 5d 5a 7d 53 40 0b f1
  key_rsc - hexdump(len=8): 75 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 12 c7 8b 45 a9 ef 2a f9 46 c3 dc 1e 08 44 d6 96
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 75 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:13:10:4a:c6:88 [PTK=TKIP GTK=TKIP]
Cancelling scan request
Cancelling authentication timeout
Removed BSSID 00:13:10:4a:c6:88 from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:13:10:4a:c6:88 completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Scan timeout - try to get results
Received 246 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS 
Selecting BSS from priority group 65
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Selecting BSS from priority group 60
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
   selected WPA AP 00:13:10:4a:c6:88 ssid='kretyn.com'
Try to find non-WPA AP
Already associated with the selected AP.
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 01
  key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
  key_iv - hexdump(len=16): 80 11 aa 51 55 1d 35 fb df 8e a5 e6 68 8b ba e1
  key_rsc - hexdump(len=8): 76 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 62 b0 a8 ea 58 e4 2c 84 26 88 98 27 46 86 1a c9
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 76 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Group rekeying completed with 00:13:10:4a:c6:88 [GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:13:10:4a:c6:88 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=171
Association info event
req_ies - hexdump(len=52): 00 0a 6b 72 65 74 79 6e 2e 63 6f 6d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 92 98 a4 b0 c8 e0 ec
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 02
  key_nonce - hexdump(len=32): ec cc 6c 4e b5 6b 0f 88 52 90 06 c4 27 f2 61 47 7d c3 26 eb 4c e2 ff 87 4f 6d f0 8f f3 4e 22 02
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: SCANNING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 6f fd c8 f8 cb f1 54 ca 94 f1 a0 00 49 27 3a 44 2b 2a 43 c9 d5 2b d4 a8 dd b0 5a a6 d6 ee 82 1a
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:13:10:4a:c6:88
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:10:4a:c6:88
No keys have been configured - skip key clearing
Associated with 00:13:10:4a:c6:88
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:13:10:4a:c6:88
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 03
  key_nonce - hexdump(len=32): 15 52 73 7d d9 3b a2 9f b0 47 54 5b c2 a7 92 41 1b 49 bc 99 68 33 79 85 17 ca f2 2b 11 0e e6 38
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): b3 f5 f6 59 d3 bd 11 9b 70 54 26 08 9f 91 09 99 52 b8 2a a5 ee c8 52 4c 05 a8 08 a2 50 a6 b6 c6
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
  key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=32 key_data_length=24
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 04
  key_nonce - hexdump(len=32): 15 52 73 7d d9 3b a2 9f b0 47 54 5b c2 a7 92 41 1b 49 bc 99 68 33 79 85 17 ca f2 2b 11 0e e6 38
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): f5 ab ad 93 3d ad d4 2f 44 36 d8 80 69 9e 6e f3
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 05
  key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
  key_iv - hexdump(len=16): bd d6 78 82 f9 3a 5e 1a cd 19 3f 31 92 94 6d 59
  key_rsc - hexdump(len=8): 77 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 7c 4c 3e eb b0 c8 57 75 dd 07 55 6a 3e f5 02 ad
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 77 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:13:10:4a:c6:88 [PTK=TKIP GTK=TKIP]
Cancelling scan request
Cancelling authentication timeout
Removed BSSID 00:13:10:4a:c6:88 from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:13:10:4a:c6:88 completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Scan timeout - try to get results
Received 246 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS 
Selecting BSS from priority group 65
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Selecting BSS from priority group 60
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
   selected WPA AP 00:13:10:4a:c6:88 ssid='kretyn.com'
Try to find non-WPA AP
Already associated with the selected AP.
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 06
  key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
  key_iv - hexdump(len=16): 25 86 3b 5e ee 67 7c 71 d2 40 f7 54 5e 5b dc b5
  key_rsc - hexdump(len=8): 78 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 7f 51 55 1d 14 b7 16 c7 cb aa 8d 5a d1 77 ad 89
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 78 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Group rekeying completed with 00:13:10:4a:c6:88 [GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:13:10:4a:c6:88 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=171
Association info event
req_ies - hexdump(len=52): 00 0a 6b 72 65 74 79 6e 2e 63 6f 6d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 92 98 a4 b0 c8 e0 ec
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 07
  key_nonce - hexdump(len=32): 65 be e5 56 35 31 0c 46 77 06 34 d7 fa 7e 8b f4 4b 0f 72 a0 cd 92 cf fd 80 db 38 b1 2a 6b a9 1a
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: SCANNING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): e0 ab b3 f7 e5 63 d0 3f 32 d4 f6 1b 5d f6 cc 1c be a6 9e e3 22 01 2f 78 a1 63 f0 49 98 1d a5 1f
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:13:10:4a:c6:88
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:10:4a:c6:88
No keys have been configured - skip key clearing
Associated with 00:13:10:4a:c6:88
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:13:10:4a:c6:88
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 08
  key_nonce - hexdump(len=32): cd f2 a9 13 e8 75 e1 76 ec d2 95 71 eb b0 72 aa e8 8a 77 08 3c 0e cc 87 b2 18 31 80 50 64 a2 e9
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 7b 68 f5 27 82 3b d6 52 74 45 8b 3c f9 28 7d b4 15 56 a7 89 58 04 d1 37 0c 54 0c f2 92 50 91 f7
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
  key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=32 key_data_length=24
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 09
  key_nonce - hexdump(len=32): cd f2 a9 13 e8 75 e1 76 ec d2 95 71 eb b0 72 aa e8 8a 77 08 3c 0e cc 87 b2 18 31 80 50 64 a2 e9
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 09 39 70 d1 38 e5 78 31 ee f4 92 aa 34 f8 cd 64
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 0a
  key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
  key_iv - hexdump(len=16): f3 fb a8 cd 82 13 8a 8b c5 c4 ba 29 4a a4 4e cc
  key_rsc - hexdump(len=8): 79 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): d7 56 23 a3 56 d0 0a 23 4d a8 98 2c af 1a 68 26
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 79 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:13:10:4a:c6:88 [PTK=TKIP GTK=TKIP]
Cancelling scan request
Cancelling authentication timeout
Removed BSSID 00:13:10:4a:c6:88 from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:13:10:4a:c6:88 completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Scan timeout - try to get results
Received 246 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS 
Selecting BSS from priority group 65
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Selecting BSS from priority group 60
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
   selected WPA AP 00:13:10:4a:c6:88 ssid='kretyn.com'
Try to find non-WPA AP
Already associated with the selected AP.
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 0b
  key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
  key_iv - hexdump(len=16): 49 09 51 09 0a d1 c9 a7 03 85 cd 12 17 8a 76 6e
  key_rsc - hexdump(len=8): 7a 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 68 d2 54 13 ab 46 0d 64 fd 38 6d a3 2d 4f 20 a2
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 7a 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Group rekeying completed with 00:13:10:4a:c6:88 [GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:13:10:4a:c6:88 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=171
Association info event
req_ies - hexdump(len=52): 00 0a 6b 72 65 74 79 6e 2e 63 6f 6d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 92 98 a4 b0 c8 e0 ec
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 0c
  key_nonce - hexdump(len=32): 0f 33 d9 e1 27 4f 2c 78 2a 04 bd 17 1c 95 85 07 b4 22 2d c1 7e c7 d6 07 a4 70 30 41 39 6d 83 46
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: SCANNING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 5b 9b 7e 23 a1 27 66 f7 32 73 28 00 03 c0 8f 60 c8 95 4f 44 07 13 f1 9f c4 f7 a7 09 e5 02 91 79
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:13:10:4a:c6:88
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:10:4a:c6:88
No keys have been configured - skip key clearing
Associated with 00:13:10:4a:c6:88
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:13:10:4a:c6:88
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 0d
  key_nonce - hexdump(len=32): 89 7b 48 d3 8d b9 dd 77 72 b3 aa b9 6f fc 0d f3 5b 54 77 99 ff 36 6f fe 74 ca 9a a6 eb d2 6e 5c
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): f3 56 69 d3 db c7 26 37 ce 05 68 9d e9 95 f8 2a 9e bc f3 bc b6 9e 17 2f 78 ec 78 41 0a 35 99 27
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
  key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=32 key_data_length=24
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 0e
  key_nonce - hexdump(len=32): 89 7b 48 d3 8d b9 dd 77 72 b3 aa b9 6f fc 0d f3 5b 54 77 99 ff 36 6f fe 74 ca 9a a6 eb d2 6e 5c
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 4d 9f 59 11 f1 9c af ed cf 10 a9 0a 7c 16 c3 ad
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 0f
  key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
  key_iv - hexdump(len=16): 15 73 a0 dc 61 46 63 fc 0f c8 ce 77 3d dd 1e df
  key_rsc - hexdump(len=8): 7b 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): da cd 16 f2 c6 49 31 d6 fc 3f f3 dc 6e eb 6c 63
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 7b 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:13:10:4a:c6:88 [PTK=TKIP GTK=TKIP]
Cancelling scan request
Cancelling authentication timeout
Removed BSSID 00:13:10:4a:c6:88 from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:13:10:4a:c6:88 completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Scan timeout - try to get results
Received 246 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS 
Selecting BSS from priority group 65
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Selecting BSS from priority group 60
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
   selected WPA AP 00:13:10:4a:c6:88 ssid='kretyn.com'
Try to find non-WPA AP
Already associated with the selected AP.
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 10
  key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
  key_iv - hexdump(len=16): b2 8c 3b ac e6 32 15 2a 94 2c 30 bc 9e d9 2b ff
  key_rsc - hexdump(len=8): 7c 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 19 f5 f4 d9 0a ad 89 07 20 09 95 97 13 bd 7e 57
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: CO

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2008-05-27 22:30 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-05-27  0:24 oops while trying to associate with TKIP-PSK network Barteq
2008-05-27  6:28 ` Tomas Winkler
2008-05-27 22:29   ` oops while trying to associate with TKIP-PSK network (solved - not oops but can't connect anymore) Barteq

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).