* Re: oops while trying to associate with TKIP-PSK network (solved - not oops but can't connect anymore)
2008-05-27 6:28 ` Tomas Winkler
@ 2008-05-27 22:29 ` Barteq
0 siblings, 0 replies; 3+ messages in thread
From: Barteq @ 2008-05-27 22:29 UTC (permalink / raw)
To: Tomas Winkler; +Cc: linux-wireless
[-- Attachment #1: Type: text/plain, Size: 3764 bytes --]
Dnia 27-05-2008 o 08:28:50 Tomas Winkler <tomasw@gmail.com> napisał(a):
> This one shell fix it up.
> http://marc.info/?l=linux-wireless&m=121120929012836&w=2
>
> Tomas
Hello!
Thank you for a fast response. I've switched my kernel to zen-sources one
with this patch applied - yep - it helped. Module does not oop anymore.
But with this update (moslty from 2.6.24 do anything else) i've lost
ability to connect with my home WPA network..
I've managed to do this only twice with plenty of tries and hours of
waiting ;/
After second time connection dropped 3 minutes later with
May 27 23:52:26 thinkpad kernel: [ 936.601464] iwl4965: Error sending
REPLY_RXON: time out after 500ms.
May 27 23:52:26 thinkpad kernel: [ 936.601477] iwl4965: Error clearing
ASSOC_MSK on current configuration (-110).
and some seconds after
May 27 23:53:28 thinkpad kernel: [ 999.187037] wlan0:
deauthenticate(reason=3)
May 27 23:53:28 thinkpad kernel: [ 999.187320] iwl4965: Microcode SW
error detected. Restarting 0x82000000.
In an attachmenet there is log from one of a tries.
My enviroment:
router: Linksys WRT54GP2
\_ WPA - PSK - TKIP
\_ network type Mixed (B and G)
\_ ssid broadcast on
\_ Preamble type: Long [ but in logs it switches to short one?]
\_ Beacon every 1000 ms
\_ other options keep untouched.
client: ubuntu 8.04
\_ custom kernel Linux thinkpad 2.6.26-rc4-zen0 #2 SMP Tue May 27
22:22:44 CEST 2008 i686 GNU/Linux
\_ made from git -
http://zen-sources.org/cgi-bin/gitweb.cgi?p=kernel.git;a=summary - it have
latest iwlwifi brnach merged
\_ Intel 4965AGN card - driver version 1.2.26ks
Problem is - I can't associate with my AP. Whatever I try, it always
disconnect just after "Group rekeying completed" using plain
wpa_supplicant.
With network manager it is authenticated/deauthenticated monologue..
ex:
May 28 00:19:04 thinkpad kernel: [ 2559.748528] wlan0: associated
May 28 00:19:04 thinkpad kernel: [ 2559.748528] wlan0: switched to short
barker preamble (BSSID=00:13:10:4a:c6:88)
May 28 00:19:07 thinkpad NetworkManager: <info> Supplicant state changed:
1
May 28 00:19:14 thinkpad NetworkManager: <info> Supplicant state changed:
0
May 28 00:19:14 thinkpad kernel: [ 2569.018496] wlan0: RX deauthentication
from 00:13:10:4a:c6:88 (reason=2)
May 28 00:19:14 thinkpad kernel: [ 2569.018496] wlan0: deauthenticated
May 28 00:19:15 thinkpad kernel: [ 2570.029947] wlan0: authenticate with
AP 00:13:10:4a:c6:88
May 28 00:19:15 thinkpad kernel: [ 2570.031598] wlan0: RX authentication
from 00:13:10:4a:c6:88 (alg=0 transaction=2 status=0)
May 28 00:19:15 thinkpad kernel: [ 2570.031598] wlan0: authenticated
May 28 00:19:15 thinkpad kernel: [ 2570.031598] wlan0: associate with AP
00:13:10:4a:c6:88
May 28 00:19:15 thinkpad kernel: [ 2570.034516] wlan0: RX ReassocResp from
00:13:10:4a:c6:88 (capab=0x431 status=0 aid=2)
May 28 00:19:15 thinkpad kernel: [ 2570.034520] wlan0: associated
till infinity...
Sometimes it connects, works fine up to key change (3600 s) and then log
looks like this above.
I have issues like this only on iwl driver. The same computer, the same
hardware works fine under windows xp. Also broadcom laptop works fine too
with this AP. Even my windows mobile 6 device works like a charm so it is
not a linksys issue.
My previus laptop have intel 3956 card. On IPW driver it worked well, but
on IWL one - it was completely broken.
My determination made me write here, becouse have no chance to solve it
myself - it looks like driver bug. Aftr using PLENTY of versions - from
1.2.0 up to latest GIT one you are my last chance. Would REALLY appreciate
your help. Of course I can provide as much debug info as you want.
Best regards,
Bartek
[-- Attachment #2: debug_wpa_supplicant+zen_2.log --]
[-- Type: application/octet-stream, Size: 101376 bytes --]
Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group='adm' (DEPRECATED)
Priority group 65
id=3 ssid='gutek_zone'
Priority group 60
id=2 ssid='INSOMNIA'
Priority group 0
id=0 ssid='kretyn.com'
id=1 ssid='ContactMultimedia'
Initializing interface (2) 'wlan0'
Interface wlan0 set UP - waiting a second for the driver to complete initialization
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:1d:e0:a8:65:f5
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
ctrl_interface_group=4 (from group name 'adm')
Added interface wlan0
Ignore event for foreign ifindex 5
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 246 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS
Selecting BSS from priority group 65
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Selecting BSS from priority group 60
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
selected based on WPA IE
selected WPA AP 00:13:10:4a:c6:88 ssid='kretyn.com'
Try to find non-WPA AP
Trying to associate with 00:13:10:4a:c6:88 (SSID='kretyn.com' freq=2447 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=18
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=171
Association info event
req_ies - hexdump(len=52): 00 0a 6b 72 65 74 79 6e 2e 63 6f 6d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 92 98 a4 b0 c8 e0 ec
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:13:10:4a:c6:88
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:10:4a:c6:88
No keys have been configured - skip key clearing
Associated with 00:13:10:4a:c6:88
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:13:10:4a:c6:88
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 e0
key_nonce - hexdump(len=32): c4 a1 97 26 b7 42 5f ec 98 9b 56 ee ae 9c 7f 3f 37 65 6f 3b c9 89 7f fa 96 10 0b 36 26 ec 77 e4
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): c3 ec 7c fd cc f8 27 81 b2 58 57 32 bb 01 2a 03 f8 f3 13 dc e6 07 69 81 28 96 3e 82 a7 52 87 0e
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=119
EAPOL-Key type=254
key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
key_length=32 key_data_length=24
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 e1
key_nonce - hexdump(len=32): c4 a1 97 26 b7 42 5f ec 98 9b 56 ee ae 9c 7f 3f 37 65 6f 3b c9 89 7f fa 96 10 0b 36 26 ec 77 e4
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 25 fb 67 f9 74 57 8c 88 59 d6 35 7b e6 1b b4 70
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 e2
key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
key_iv - hexdump(len=16): 7f c2 e0 91 af 24 72 05 96 9b 8e 83 43 f1 21 d6
key_rsc - hexdump(len=8): 69 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 9f c0 9d 28 27 7a ee 6f 1c fb 65 db 6c 62 5f dc
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 69 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:13:10:4a:c6:88 [PTK=TKIP GTK=TKIP]
Cancelling scan request
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:13:10:4a:c6:88 completed (auth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 e3
key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
key_iv - hexdump(len=16): 73 e7 30 75 71 fc 5c 5e 4c c7 97 44 6b d6 99 44
key_rsc - hexdump(len=8): 6a 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): e2 19 bf 97 34 b9 f6 1c ba b6 09 7a 4f ff 10 ca
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 6a 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Group rekeying completed with 00:13:10:4a:c6:88 [GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:13:10:4a:c6:88 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=171
Association info event
req_ies - hexdump(len=52): 00 0a 6b 72 65 74 79 6e 2e 63 6f 6d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 92 98 a4 b0 c8 e0 ec
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 e4
key_nonce - hexdump(len=32): cd 78 09 4d 62 9c 98 7c 10 ea d2 0e 33 1d 32 3f 7a 55 e6 01 b8 68 a9 88 b0 05 04 be b8 02 09 db
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: SCANNING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): dd ac 33 e0 10 15 b2 fe 41 c9 38 d8 a8 09 dd a9 59 ed 8b 67 6c 2a ab 17 2b 0b c3 14 a9 63 24 82
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:13:10:4a:c6:88
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:10:4a:c6:88
No keys have been configured - skip key clearing
Associated with 00:13:10:4a:c6:88
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:13:10:4a:c6:88
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 e5
key_nonce - hexdump(len=32): 27 81 64 8e cd 4f d8 3b c8 6b fa 8a 5d 9d 9f 7b c4 0c aa 0e e1 d7 1e b9 42 29 a1 ab f7 bb 2b 8c
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 46 c1 f9 d7 d1 19 f1 87 62 c8 ce ed e5 7f e5 c8 0b cc 38 9b 77 83 d7 30 1e 3b bf 53 e5 79 1a 44
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=119
EAPOL-Key type=254
key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
key_length=32 key_data_length=24
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 e6
key_nonce - hexdump(len=32): 27 81 64 8e cd 4f d8 3b c8 6b fa 8a 5d 9d 9f 7b c4 0c aa 0e e1 d7 1e b9 42 29 a1 ab f7 bb 2b 8c
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 1d 85 02 79 62 84 cc 82 25 5f 1e 8d 60 74 62 35
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 e7
key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
key_iv - hexdump(len=16): d6 3b 19 13 a2 6f 28 54 9b 36 07 83 3d f5 7e 04
key_rsc - hexdump(len=8): 6b 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): a1 88 5d 15 29 ed eb 88 ed 20 c2 59 32 94 e7 e6
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 6b 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:13:10:4a:c6:88 [PTK=TKIP GTK=TKIP]
Cancelling scan request
Cancelling authentication timeout
Removed BSSID 00:13:10:4a:c6:88 from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:13:10:4a:c6:88 completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Scan timeout - try to get results
Received 246 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS
Selecting BSS from priority group 65
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Selecting BSS from priority group 60
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
selected based on WPA IE
selected WPA AP 00:13:10:4a:c6:88 ssid='kretyn.com'
Try to find non-WPA AP
Already associated with the selected AP.
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 e8
key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
key_iv - hexdump(len=16): 9f 5e 9b 78 59 51 23 49 87 f4 8d 74 7e c5 a3 cd
key_rsc - hexdump(len=8): 6c 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 60 df 1f a4 74 f4 3b 77 97 5e 00 61 a9 00 db c7
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 6c 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Group rekeying completed with 00:13:10:4a:c6:88 [GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:13:10:4a:c6:88 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=171
Association info event
req_ies - hexdump(len=52): 00 0a 6b 72 65 74 79 6e 2e 63 6f 6d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 92 98 a4 b0 c8 e0 ec
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 e9
key_nonce - hexdump(len=32): 3b b5 c5 d6 78 bc 38 c0 6c 8f b1 e5 73 e4 d1 89 46 8f 18 b3 4b 26 ae f1 dd 00 c2 d2 95 4f a2 72
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: SCANNING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 4e 79 e2 f4 7d 9f 44 a4 03 97 a9 21 85 b9 43 06 6f c3 08 87 a9 fb e5 73 1e ed 2b c9 8f 15 54 b5
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:13:10:4a:c6:88
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:10:4a:c6:88
No keys have been configured - skip key clearing
Associated with 00:13:10:4a:c6:88
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:13:10:4a:c6:88
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 ea
key_nonce - hexdump(len=32): fe 04 62 c6 fa 1f 66 a0 ea 4b e9 ed 3f 3a dd 79 f8 06 75 2e 5d cf e9 91 02 c1 46 a0 93 ce 7a e1
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): a0 43 4e d6 21 97 6d 6a 47 5b b6 31 83 2f 3b 56 7a d4 4b 4a 27 f7 fb 4d 84 8a 5e 04 5e 77 20 46
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=119
EAPOL-Key type=254
key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
key_length=32 key_data_length=24
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 eb
key_nonce - hexdump(len=32): fe 04 62 c6 fa 1f 66 a0 ea 4b e9 ed 3f 3a dd 79 f8 06 75 2e 5d cf e9 91 02 c1 46 a0 93 ce 7a e1
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 99 0e 31 49 8f 6e 30 84 6d 03 a8 d1 8a 61 c6 d4
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 ec
key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
key_iv - hexdump(len=16): 52 15 92 6b 30 f7 10 91 d0 34 ba 8e e6 50 46 90
key_rsc - hexdump(len=8): 6d 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 39 e2 dd ff 9a 00 44 24 6a 2b 1f ce 4c 4a 1a 1c
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 6d 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:13:10:4a:c6:88 [PTK=TKIP GTK=TKIP]
Cancelling scan request
Cancelling authentication timeout
Removed BSSID 00:13:10:4a:c6:88 from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:13:10:4a:c6:88 completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Scan timeout - try to get results
Received 246 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS
Selecting BSS from priority group 65
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Selecting BSS from priority group 60
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
selected based on WPA IE
selected WPA AP 00:13:10:4a:c6:88 ssid='kretyn.com'
Try to find non-WPA AP
Already associated with the selected AP.
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 ed
key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
key_iv - hexdump(len=16): 9c 94 58 1e 66 5f da 44 fc 92 17 a0 3d 49 9f 5d
key_rsc - hexdump(len=8): 6e 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 70 1b 3c 86 3e fe f9 c9 35 55 5a a6 07 e8 9f e9
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 6e 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Group rekeying completed with 00:13:10:4a:c6:88 [GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:13:10:4a:c6:88 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=171
Association info event
req_ies - hexdump(len=52): 00 0a 6b 72 65 74 79 6e 2e 63 6f 6d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 92 98 a4 b0 c8 e0 ec
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 ee
key_nonce - hexdump(len=32): e5 c7 13 3b 91 63 fc a6 42 4f 34 94 4e cf 89 5c de c1 d3 f6 f1 60 e6 1e bd c3 b9 24 a8 9f 39 6b
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: SCANNING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): be 87 91 d6 26 f3 74 a3 8e 9f 8c ca 8a be 5d c1 c1 ac eb 25 1d 93 5d 82 05 2d 81 50 61 82 d6 53
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:13:10:4a:c6:88
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:10:4a:c6:88
No keys have been configured - skip key clearing
Associated with 00:13:10:4a:c6:88
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:13:10:4a:c6:88
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 ef
key_nonce - hexdump(len=32): 27 6c c2 56 6d 50 b4 45 7c 25 79 05 0f e2 99 7e ba 20 09 c4 ed 62 b9 f2 af 5e 8a ce 9d c5 e8 94
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 2a 3d 73 79 34 a1 ff 43 d7 25 94 82 37 a8 5f 2f 2f fd 70 94 67 2d a2 ac b2 92 3c 32 53 e5 e1 e9
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=119
EAPOL-Key type=254
key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
key_length=32 key_data_length=24
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 f0
key_nonce - hexdump(len=32): 27 6c c2 56 6d 50 b4 45 7c 25 79 05 0f e2 99 7e ba 20 09 c4 ed 62 b9 f2 af 5e 8a ce 9d c5 e8 94
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 45 cf 99 81 6d 4c 5e 06 5c 6c 6c 52 bc 4f 92 ea
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 f1
key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
key_iv - hexdump(len=16): 00 05 62 04 40 26 6c 79 9f ed 23 55 1b 71 e2 a1
key_rsc - hexdump(len=8): 6f 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 37 ab 29 85 81 51 9a da f3 cc dd 46 5d 48 07 fd
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 6f 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:13:10:4a:c6:88 [PTK=TKIP GTK=TKIP]
Cancelling scan request
Cancelling authentication timeout
Removed BSSID 00:13:10:4a:c6:88 from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:13:10:4a:c6:88 completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Scan timeout - try to get results
Received 246 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS
Selecting BSS from priority group 65
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Selecting BSS from priority group 60
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
selected based on WPA IE
selected WPA AP 00:13:10:4a:c6:88 ssid='kretyn.com'
Try to find non-WPA AP
Already associated with the selected AP.
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 f2
key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
key_iv - hexdump(len=16): 18 e1 2b 3a ce 75 b5 4d c0 ad d6 a5 a7 4e 19 da
key_rsc - hexdump(len=8): 70 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): c1 f7 83 68 d5 f4 93 84 0a 8f 18 49 f8 a8 04 5d
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 70 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Group rekeying completed with 00:13:10:4a:c6:88 [GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:13:10:4a:c6:88 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=171
Association info event
req_ies - hexdump(len=52): 00 0a 6b 72 65 74 79 6e 2e 63 6f 6d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 92 98 a4 b0 c8 e0 ec
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 f3
key_nonce - hexdump(len=32): 79 76 28 a1 4a 49 48 7e ac ec 5c dc 4d 8a 31 90 f5 eb 5e 9f ce 60 06 be b4 00 a0 2f a5 2f 04 9f
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: SCANNING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): a9 5a a0 87 20 c1 90 b3 3f a3 91 98 bf fd 56 be 45 f6 7d 00 60 67 a4 fa 02 d6 9e fa 15 a5 26 d0
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:13:10:4a:c6:88
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:10:4a:c6:88
No keys have been configured - skip key clearing
Associated with 00:13:10:4a:c6:88
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:13:10:4a:c6:88
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 f4
key_nonce - hexdump(len=32): e3 5a c6 4f bf 03 b2 9e 18 d1 6b b1 3b 4f 7e db d6 61 a8 03 e7 79 3d a3 2b 55 9a 17 e3 fb a7 bb
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 3f bb eb 3d e6 44 7f ee 82 92 41 ce e2 b5 45 af 69 61 25 e2 8b b0 af 53 81 31 bf ed 14 49 1e 44
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=119
EAPOL-Key type=254
key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
key_length=32 key_data_length=24
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 f5
key_nonce - hexdump(len=32): e3 5a c6 4f bf 03 b2 9e 18 d1 6b b1 3b 4f 7e db d6 61 a8 03 e7 79 3d a3 2b 55 9a 17 e3 fb a7 bb
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 52 29 44 26 19 bc 2c 83 81 2a f0 a7 26 1f 0f c7
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 f6
key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
key_iv - hexdump(len=16): c0 72 e0 f1 bc 1e 6f 2d b2 97 b3 78 f6 0f e6 2a
key_rsc - hexdump(len=8): 71 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): d7 22 a1 e2 57 95 07 a6 1d 5d 58 10 ed 50 c5 63
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 71 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:13:10:4a:c6:88 [PTK=TKIP GTK=TKIP]
Cancelling scan request
Cancelling authentication timeout
Removed BSSID 00:13:10:4a:c6:88 from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:13:10:4a:c6:88 completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Scan timeout - try to get results
Received 246 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS
Selecting BSS from priority group 65
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Selecting BSS from priority group 60
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
selected based on WPA IE
selected WPA AP 00:13:10:4a:c6:88 ssid='kretyn.com'
Try to find non-WPA AP
Already associated with the selected AP.
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 f7
key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
key_iv - hexdump(len=16): 7d 2d 63 4e 06 31 b9 59 a1 d1 5e b5 0c 7c 9e 6e
key_rsc - hexdump(len=8): 72 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 34 82 49 93 b4 0e ff e7 6b ee 82 e3 83 69 54 0e
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 72 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Group rekeying completed with 00:13:10:4a:c6:88 [GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:13:10:4a:c6:88 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=171
Association info event
req_ies - hexdump(len=52): 00 0a 6b 72 65 74 79 6e 2e 63 6f 6d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 92 98 a4 b0 c8 e0 ec
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 f8
key_nonce - hexdump(len=32): 86 27 43 ea 68 a7 1a 6a 79 fb 26 87 b7 d0 c5 48 18 b9 ec b4 5f c8 ec e9 8e 41 10 fa 88 dd 38 6c
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: SCANNING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 38 9b 0e da f7 f0 f6 57 d8 fa 8b 7f 03 18 12 8a 03 fa 05 27 62 79 86 9a 2f 1f 52 ee b5 ec c2 6d
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:13:10:4a:c6:88
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:10:4a:c6:88
No keys have been configured - skip key clearing
Associated with 00:13:10:4a:c6:88
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:13:10:4a:c6:88
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 f9
key_nonce - hexdump(len=32): 0d 0b 06 ed 42 3a 3e 68 74 01 32 77 9e ae 6a fd e8 79 e7 0b 77 26 26 7a a5 4b 03 55 f2 4f 03 db
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): a3 de f0 b7 46 d7 59 64 70 92 f5 d3 e0 e4 d4 74 c0 ef c9 5d 6e a0 49 9a dc 52 ef 27 eb a8 81 67
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=119
EAPOL-Key type=254
key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
key_length=32 key_data_length=24
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 fa
key_nonce - hexdump(len=32): 0d 0b 06 ed 42 3a 3e 68 74 01 32 77 9e ae 6a fd e8 79 e7 0b 77 26 26 7a a5 4b 03 55 f2 4f 03 db
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): f0 7a a5 a5 ed fc f6 0a 11 ba dd ff 22 f5 dd aa
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 fb
key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
key_iv - hexdump(len=16): 24 42 27 0e 3e 17 22 b1 2d 91 ba e4 91 a2 ad d6
key_rsc - hexdump(len=8): 73 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): b5 d7 7e ed e0 e9 98 70 38 33 75 5d 8f 14 33 46
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 73 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:13:10:4a:c6:88 [PTK=TKIP GTK=TKIP]
Cancelling scan request
Cancelling authentication timeout
Removed BSSID 00:13:10:4a:c6:88 from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:13:10:4a:c6:88 completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Scan timeout - try to get results
Received 246 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS
Selecting BSS from priority group 65
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Selecting BSS from priority group 60
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
selected based on WPA IE
selected WPA AP 00:13:10:4a:c6:88 ssid='kretyn.com'
Try to find non-WPA AP
Already associated with the selected AP.
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 fc
key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
key_iv - hexdump(len=16): ec 5b a4 34 ca f1 ca 2d fc cb fe 40 68 d3 80 ca
key_rsc - hexdump(len=8): 74 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 01 70 cb d4 1c c6 18 de e9 a6 f1 7a ca 16 88 40
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 74 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Group rekeying completed with 00:13:10:4a:c6:88 [GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:13:10:4a:c6:88 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=171
Association info event
req_ies - hexdump(len=52): 00 0a 6b 72 65 74 79 6e 2e 63 6f 6d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 92 98 a4 b0 c8 e0 ec
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 fd
key_nonce - hexdump(len=32): 4f 9e cd ce ac 16 c2 b8 1c a0 0c d3 e3 8a 9e 3a 70 82 71 85 61 46 86 db 92 34 97 94 53 93 2c 46
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: SCANNING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): a1 6f 4f c9 11 14 b0 57 9f 42 02 f6 33 72 cc 93 5f 5e 37 62 16 d9 a4 60 4d 50 8c 5d 82 10 74 18
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:13:10:4a:c6:88
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:10:4a:c6:88
No keys have been configured - skip key clearing
Associated with 00:13:10:4a:c6:88
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:13:10:4a:c6:88
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 fe
key_nonce - hexdump(len=32): 45 85 64 e8 36 d0 28 b3 47 17 0b 15 e1 69 ce 9c b8 7c 9f 9b 06 b5 e3 e6 99 1a 11 e6 b5 84 09 af
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 72 14 d4 83 81 21 0e 26 f6 e3 a4 86 d8 4b 55 45 de 47 45 f7 61 65 ec 19 ad 61 d8 68 23 51 fa 88
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=119
EAPOL-Key type=254
key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
key_length=32 key_data_length=24
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e7 ff
key_nonce - hexdump(len=32): 45 85 64 e8 36 d0 28 b3 47 17 0b 15 e1 69 ce 9c b8 7c 9f 9b 06 b5 e3 e6 99 1a 11 e6 b5 84 09 af
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): e7 55 30 cf 5e 64 72 0a d5 0a fa 1f 79 22 85 dc
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 00
key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
key_iv - hexdump(len=16): d4 e8 98 c3 73 52 31 7b 37 5d 5a 7d 53 40 0b f1
key_rsc - hexdump(len=8): 75 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 12 c7 8b 45 a9 ef 2a f9 46 c3 dc 1e 08 44 d6 96
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 75 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:13:10:4a:c6:88 [PTK=TKIP GTK=TKIP]
Cancelling scan request
Cancelling authentication timeout
Removed BSSID 00:13:10:4a:c6:88 from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:13:10:4a:c6:88 completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Scan timeout - try to get results
Received 246 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS
Selecting BSS from priority group 65
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Selecting BSS from priority group 60
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
selected based on WPA IE
selected WPA AP 00:13:10:4a:c6:88 ssid='kretyn.com'
Try to find non-WPA AP
Already associated with the selected AP.
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 01
key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
key_iv - hexdump(len=16): 80 11 aa 51 55 1d 35 fb df 8e a5 e6 68 8b ba e1
key_rsc - hexdump(len=8): 76 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 62 b0 a8 ea 58 e4 2c 84 26 88 98 27 46 86 1a c9
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 76 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Group rekeying completed with 00:13:10:4a:c6:88 [GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:13:10:4a:c6:88 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=171
Association info event
req_ies - hexdump(len=52): 00 0a 6b 72 65 74 79 6e 2e 63 6f 6d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 92 98 a4 b0 c8 e0 ec
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 02
key_nonce - hexdump(len=32): ec cc 6c 4e b5 6b 0f 88 52 90 06 c4 27 f2 61 47 7d c3 26 eb 4c e2 ff 87 4f 6d f0 8f f3 4e 22 02
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: SCANNING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 6f fd c8 f8 cb f1 54 ca 94 f1 a0 00 49 27 3a 44 2b 2a 43 c9 d5 2b d4 a8 dd b0 5a a6 d6 ee 82 1a
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:13:10:4a:c6:88
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:10:4a:c6:88
No keys have been configured - skip key clearing
Associated with 00:13:10:4a:c6:88
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:13:10:4a:c6:88
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 03
key_nonce - hexdump(len=32): 15 52 73 7d d9 3b a2 9f b0 47 54 5b c2 a7 92 41 1b 49 bc 99 68 33 79 85 17 ca f2 2b 11 0e e6 38
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): b3 f5 f6 59 d3 bd 11 9b 70 54 26 08 9f 91 09 99 52 b8 2a a5 ee c8 52 4c 05 a8 08 a2 50 a6 b6 c6
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=119
EAPOL-Key type=254
key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
key_length=32 key_data_length=24
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 04
key_nonce - hexdump(len=32): 15 52 73 7d d9 3b a2 9f b0 47 54 5b c2 a7 92 41 1b 49 bc 99 68 33 79 85 17 ca f2 2b 11 0e e6 38
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): f5 ab ad 93 3d ad d4 2f 44 36 d8 80 69 9e 6e f3
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 05
key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
key_iv - hexdump(len=16): bd d6 78 82 f9 3a 5e 1a cd 19 3f 31 92 94 6d 59
key_rsc - hexdump(len=8): 77 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 7c 4c 3e eb b0 c8 57 75 dd 07 55 6a 3e f5 02 ad
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 77 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:13:10:4a:c6:88 [PTK=TKIP GTK=TKIP]
Cancelling scan request
Cancelling authentication timeout
Removed BSSID 00:13:10:4a:c6:88 from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:13:10:4a:c6:88 completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Scan timeout - try to get results
Received 246 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS
Selecting BSS from priority group 65
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Selecting BSS from priority group 60
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
selected based on WPA IE
selected WPA AP 00:13:10:4a:c6:88 ssid='kretyn.com'
Try to find non-WPA AP
Already associated with the selected AP.
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 06
key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
key_iv - hexdump(len=16): 25 86 3b 5e ee 67 7c 71 d2 40 f7 54 5e 5b dc b5
key_rsc - hexdump(len=8): 78 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 7f 51 55 1d 14 b7 16 c7 cb aa 8d 5a d1 77 ad 89
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 78 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Group rekeying completed with 00:13:10:4a:c6:88 [GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:13:10:4a:c6:88 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=171
Association info event
req_ies - hexdump(len=52): 00 0a 6b 72 65 74 79 6e 2e 63 6f 6d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 92 98 a4 b0 c8 e0 ec
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 07
key_nonce - hexdump(len=32): 65 be e5 56 35 31 0c 46 77 06 34 d7 fa 7e 8b f4 4b 0f 72 a0 cd 92 cf fd 80 db 38 b1 2a 6b a9 1a
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: SCANNING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): e0 ab b3 f7 e5 63 d0 3f 32 d4 f6 1b 5d f6 cc 1c be a6 9e e3 22 01 2f 78 a1 63 f0 49 98 1d a5 1f
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:13:10:4a:c6:88
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:10:4a:c6:88
No keys have been configured - skip key clearing
Associated with 00:13:10:4a:c6:88
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:13:10:4a:c6:88
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 08
key_nonce - hexdump(len=32): cd f2 a9 13 e8 75 e1 76 ec d2 95 71 eb b0 72 aa e8 8a 77 08 3c 0e cc 87 b2 18 31 80 50 64 a2 e9
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 7b 68 f5 27 82 3b d6 52 74 45 8b 3c f9 28 7d b4 15 56 a7 89 58 04 d1 37 0c 54 0c f2 92 50 91 f7
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=119
EAPOL-Key type=254
key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
key_length=32 key_data_length=24
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 09
key_nonce - hexdump(len=32): cd f2 a9 13 e8 75 e1 76 ec d2 95 71 eb b0 72 aa e8 8a 77 08 3c 0e cc 87 b2 18 31 80 50 64 a2 e9
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 09 39 70 d1 38 e5 78 31 ee f4 92 aa 34 f8 cd 64
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 0a
key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
key_iv - hexdump(len=16): f3 fb a8 cd 82 13 8a 8b c5 c4 ba 29 4a a4 4e cc
key_rsc - hexdump(len=8): 79 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): d7 56 23 a3 56 d0 0a 23 4d a8 98 2c af 1a 68 26
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 79 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:13:10:4a:c6:88 [PTK=TKIP GTK=TKIP]
Cancelling scan request
Cancelling authentication timeout
Removed BSSID 00:13:10:4a:c6:88 from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:13:10:4a:c6:88 completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Scan timeout - try to get results
Received 246 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS
Selecting BSS from priority group 65
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Selecting BSS from priority group 60
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
selected based on WPA IE
selected WPA AP 00:13:10:4a:c6:88 ssid='kretyn.com'
Try to find non-WPA AP
Already associated with the selected AP.
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 0b
key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
key_iv - hexdump(len=16): 49 09 51 09 0a d1 c9 a7 03 85 cd 12 17 8a 76 6e
key_rsc - hexdump(len=8): 7a 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 68 d2 54 13 ab 46 0d 64 fd 38 6d a3 2d 4f 20 a2
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: COMPLETED -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 7a 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Group rekeying completed with 00:13:10:4a:c6:88 [GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:13:10:4a:c6:88 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Scan requested (ret=0) - scan timeout 5 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c02 len=171
Association info event
req_ies - hexdump(len=52): 00 0a 6b 72 65 74 79 6e 2e 63 6f 6d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 8c 92 98 a4 b0 c8 e0 ec
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 0c
key_nonce - hexdump(len=32): 0f 33 d9 e1 27 4f 2c 78 2a 04 bd 17 1c 95 85 07 b4 22 2d c1 7e c7 d6 07 a4 70 30 41 39 6d 83 46
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: SCANNING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 5b 9b 7e 23 a1 27 66 f7 32 73 28 00 03 c0 8f 60 c8 95 4f 44 07 13 f1 9f c4 f7 a7 09 e5 02 91 79
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:13:10:4a:c6:88
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:13:10:4a:c6:88
No keys have been configured - skip key clearing
Associated with 00:13:10:4a:c6:88
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:13:10:4a:c6:88
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 0d
key_nonce - hexdump(len=32): 89 7b 48 d3 8d b9 dd 77 72 b3 aa b9 6f fc 0d f3 5b 54 77 99 ff 36 6f fe 74 ca 9a a6 eb d2 6e 5c
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): f3 56 69 d3 db c7 26 37 ce 05 68 9d e9 95 f8 2a 9e bc f3 bc b6 9e 17 2f 78 ec 78 41 0a 35 99 27
WPA: PTK derivation - A1=00:1d:e0:a8:65:f5 A2=00:13:10:4a:c6:88
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=119
EAPOL-Key type=254
key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
key_length=32 key_data_length=24
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 0e
key_nonce - hexdump(len=32): 89 7b 48 d3 8d b9 dd 77 72 b3 aa b9 6f fc 0d f3 5b 54 77 99 ff 36 6f fe 74 ca 9a a6 eb d2 6e 5c
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 4d 9f 59 11 f1 9c af ed cf 10 a9 0a 7c 16 c3 ad
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:13:10:4a:c6:88 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 0f
key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
key_iv - hexdump(len=16): 15 73 a0 dc 61 46 63 fc 0f c8 ce 77 3d dd 1e df
key_rsc - hexdump(len=8): 7b 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): da cd 16 f2 c6 49 31 d6 fc 3f f3 dc 6e eb 6c 63
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
WPA: RSC - hexdump(len=6): 7b 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: Key negotiation completed with 00:13:10:4a:c6:88 [PTK=TKIP GTK=TKIP]
Cancelling scan request
Cancelling authentication timeout
Removed BSSID 00:13:10:4a:c6:88 from blacklist
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:13:10:4a:c6:88 completed (reauth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
Scan timeout - try to get results
Received 246 bytes of scan results (1 BSSes)
CTRL-EVENT-SCAN-RESULTS
Selecting BSS from priority group 65
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Selecting BSS from priority group 60
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Try to find non-WPA AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
skip - SSID mismatch
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:13:10:4a:c6:88 ssid='kretyn.com' wpa_ie_len=22 rsn_ie_len=0 caps=0x11
selected based on WPA IE
selected WPA AP 00:13:10:4a:c6:88 ssid='kretyn.com'
Try to find non-WPA AP
Already associated with the selected AP.
RX EAPOL from 00:13:10:4a:c6:88
IEEE 802.1X RX: version=1 type=3 length=127
EAPOL-Key type=254
key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 7d b7 31 f3 12 4f e8 10
key_nonce - hexdump(len=32): 3c 88 86 c9 2c 12 d9 42 8c 5b 6c 30 7e 47 19 41 3d 52 4a e9 92 66 c6 2f 72 66 0d 16 fd a3 21 53
key_iv - hexdump(len=16): b2 8c 3b ac e6 32 15 2a 94 2c 30 bc 9e d9 2b ff
key_rsc - hexdump(len=8): 7c 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 19 f5 f4 d9 0a ad 89 07 20 09 95 97 13 bd 7e 57
WPA: RX message 1 of Group Key Handshake from 00:13:10:4a:c6:88 (ver=1)
State: CO
^ permalink raw reply [flat|nested] 3+ messages in thread