Advertisement
Guest User

Untitled

a guest
Jun 19th, 2011
248
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 107.87 KB | None | 0 0
  1. Initializing interface 'wlan1' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
  2. Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf'
  3. Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
  4. Priority group 0
  5. id=0 ssid='dom.ru wi-fi'
  6. Initializing interface (2) 'wlan1'
  7. Interface wlan1 set UP - waiting a second for the driver to complete initialization
  8. SIOCGIWRANGE: WE(compiled)=22 WE(source)=16 enc_capa=0xf
  9. capabilities: key_mgmt 0xf enc 0xf flags 0x0
  10. WEXT: Operstate: linkmode=1, operstate=5
  11. Own MAC address: 00:e0:4c:04:bf:44
  12. wpa_driver_wext_set_wpa
  13. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  14. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  15. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  16. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  17. wpa_driver_wext_set_countermeasures
  18. wpa_driver_wext_set_drop_unencrypted
  19. RSN: flushing PMKID list in the driver
  20. Setting scan request: 0 sec 100000 usec
  21. WPS: UUID based on MAC address - hexdump(len=16): df 3f b3 de aa fe 5c b8 92 49 fa 49 86 eb 7b 33
  22. WPS: Build Beacon and Probe Response IEs
  23. WPS: * Version
  24. WPS: * Wi-Fi Protected Setup State (0)
  25. WPS: * Version
  26. WPS: * Wi-Fi Protected Setup State (0)
  27. WPS: * Response Type (2)
  28. WPS: * UUID-E
  29. WPS: * Manufacturer
  30. WPS: * Model Name
  31. WPS: * Model Number
  32. WPS: * Serial Number
  33. WPS: * Primary Device Type
  34. WPS: * Device Name
  35. WPS: * Config Methods (0)
  36. WPS: * RF Bands (3)
  37. EAPOL: SUPP_PAE entering state DISCONNECTED
  38. EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  39. EAPOL: SUPP_BE entering state INITIALIZE
  40. EAP: EAP entering state DISABLED
  41. Added interface wlan1
  42. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  43. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  44. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  45. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  46. Wireless event: cmd=0x8b06 len=8
  47. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  48. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  49. Wireless event: cmd=0x8b15 len=20
  50. Wireless event: new AP: 00:00:00:00:00:00
  51. Added BSSID 00:00:00:00:00:00 into blacklist
  52. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  53. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  54. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  55. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  56. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  57. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  58. State: DISCONNECTED -> DISCONNECTED
  59. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  60. WEXT: Operstate: linkmode=-1, operstate=5
  61. EAPOL: External notification - portEnabled=0
  62. EAPOL: External notification - portValid=0
  63. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  64. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  65. Wireless event: cmd=0x8b15 len=20
  66. Wireless event: new AP: 00:00:00:00:00:00
  67. BSSID 00:00:00:00:00:00 blacklist count incremented to 2
  68. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  69. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  70. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  71. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  72. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  73. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  74. State: DISCONNECTED -> DISCONNECTED
  75. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  76. WEXT: Operstate: linkmode=-1, operstate=5
  77. EAPOL: External notification - portEnabled=0
  78. EAPOL: External notification - portValid=0
  79. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  80. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  81. Wireless event: cmd=0x8b1a len=40
  82. State: DISCONNECTED -> SCANNING
  83. Starting AP scan (broadcast SSID)
  84. Trying to get current scan results first without requesting a new scan to speed up initial association
  85. Received 217 bytes of scan results (1 BSSes)
  86. New scan results available
  87. Selecting BSS from priority group 0
  88. Try to find WPA-enabled AP
  89. 0: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
  90. skip - SSID mismatch
  91. Try to find non-WPA AP
  92. 0: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
  93. skip - SSID mismatch
  94. No APs found - clear blacklist and try again
  95. Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
  96. Selecting BSS from priority group 0
  97. Try to find WPA-enabled AP
  98. 0: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
  99. skip - SSID mismatch
  100. Try to find non-WPA AP
  101. 0: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
  102. skip - SSID mismatch
  103. No suitable AP found.
  104. Setting scan request: 0 sec 0 usec
  105. Starting AP scan (broadcast SSID)
  106. Scan requested (ret=0) - scan timeout 5 seconds
  107. EAPOL: disable timer tick
  108. Scan timeout - try to get results
  109. Received 482 bytes of scan results (2 BSSes)
  110. New scan results available
  111. Selecting BSS from priority group 0
  112. Try to find WPA-enabled AP
  113. 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
  114. selected based on RSN IE
  115. selected WPA AP 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi'
  116. Trying to associate with 1c:af:f7:8d:83:fc (SSID='dom.ru wi-fi' freq=2452 MHz)
  117. Cancelling scan request
  118. WPA: clearing own WPA/RSN IE
  119. Automatic auth_alg selection: 0x1
  120. RSN: using IEEE 802.11i/D9.0
  121. WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
  122. WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
  123. WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
  124. WPA: using GTK TKIP
  125. WPA: using PTK CCMP
  126. WPA: using KEY_MGMT WPA-PSK
  127. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  128. No keys have been configured - skip key clearing
  129. wpa_driver_wext_set_drop_unencrypted
  130. State: SCANNING -> ASSOCIATING
  131. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  132. WEXT: Operstate: linkmode=-1, operstate=5
  133. wpa_driver_wext_associate
  134. wpa_driver_wext_set_psk
  135. Association request to the driver failed
  136. Setting authentication timeout: 5 sec 0 usec
  137. EAPOL: External notification - EAP success=0
  138. EAPOL: External notification - EAP fail=0
  139. EAPOL: External notification - portControl=Auto
  140. RSN: Ignored PMKID candidate without preauth flag
  141. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  142. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  143. Wireless event: cmd=0x8b06 len=8
  144. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  145. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  146. Wireless event: cmd=0x8b15 len=20
  147. Wireless event: new AP: 00:00:00:00:00:00
  148. Added BSSID 1c:af:f7:8d:83:fc into blacklist
  149. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  150. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  151. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  152. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  153. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  154. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  155. State: ASSOCIATING -> DISCONNECTED
  156. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  157. WEXT: Operstate: linkmode=-1, operstate=5
  158. EAPOL: External notification - portEnabled=0
  159. EAPOL: External notification - portValid=0
  160. EAPOL: External notification - EAP success=0
  161. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  162. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  163. Wireless event: cmd=0x8b1a len=20
  164. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  165. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  166. Wireless event: cmd=0x8b15 len=20
  167. Wireless event: new AP: 00:00:00:00:00:00
  168. Added BSSID 00:00:00:00:00:00 into blacklist
  169. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  170. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  171. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  172. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  173. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  174. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  175. State: DISCONNECTED -> DISCONNECTED
  176. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  177. WEXT: Operstate: linkmode=-1, operstate=5
  178. EAPOL: External notification - portEnabled=0
  179. EAPOL: External notification - portValid=0
  180. EAPOL: External notification - EAP success=0
  181. RX EAPOL from 1c:af:f7:8d:83:fc
  182. Not associated - Delay processing of received EAPOL frame
  183. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  184. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  185. Wireless event: cmd=0x8b15 len=20
  186. Wireless event: new AP: 1c:af:f7:8d:83:fc
  187. State: DISCONNECTED -> ASSOCIATED
  188. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  189. WEXT: Operstate: linkmode=-1, operstate=5
  190. Associated to a new BSS: BSSID=1c:af:f7:8d:83:fc
  191. No keys have been configured - skip key clearing
  192. Associated with 1c:af:f7:8d:83:fc
  193. WPA: Association event - clear replay counter
  194. WPA: Clear old PTK
  195. EAPOL: External notification - portEnabled=0
  196. EAPOL: External notification - portValid=0
  197. EAPOL: External notification - EAP success=0
  198. EAPOL: External notification - portEnabled=1
  199. EAPOL: SUPP_PAE entering state CONNECTING
  200. EAPOL: enable timer tick
  201. EAPOL: SUPP_BE entering state IDLE
  202. Setting authentication timeout: 10 sec 0 usec
  203. Cancelling scan request
  204. Process pending EAPOL frame that was received just before association notification
  205. RX EAPOL from 1c:af:f7:8d:83:fc
  206. Setting authentication timeout: 10 sec 0 usec
  207. IEEE 802.1X RX: version=2 type=3 length=95
  208. EAPOL-Key type=2
  209. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  210. key_length=16 key_data_length=0
  211. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  212. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 4d
  213. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  214. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  215. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  216. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  217. State: ASSOCIATED -> 4WAY_HANDSHAKE
  218. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  219. RSN: msg 1/4 key data - hexdump(len=0):
  220. WPA: Renewed SNonce - hexdump(len=32): 17 85 b7 a3 37 34 63 62 41 ee 52 11 38 22 a5 fd 32 49 bd da f2 b9 07 51 2a 52 8e ca 83 39 80 75
  221. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  222. WPA: PMK - hexdump(len=32): [REMOVED]
  223. WPA: PTK - hexdump(len=48): [REMOVED]
  224. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  225. WPA: Sending EAPOL-Key 2/4
  226. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  227. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  228. RX EAPOL from 1c:af:f7:8d:83:fc
  229. IEEE 802.1X RX: version=2 type=3 length=199
  230. EAPOL-Key type=2
  231. key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  232. key_length=16 key_data_length=104
  233. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  234. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 4d
  235. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  236. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  237. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  238. key_mic - hexdump(len=16): b6 57 36 9b 04 d2 c9 b7 82 5e 33 cd 31 2f e8 2c
  239. WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
  240. WPA: Could not verify EAPOL-Key MIC - dropping packet
  241. RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  242. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  243. EAPOL: startWhen --> 0
  244. EAPOL: disable timer tick
  245. EAPOL: SUPP_PAE entering state CONNECTING
  246. EAPOL: enable timer tick
  247. EAPOL: txStart
  248. WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
  249. RX EAPOL from 1c:af:f7:8d:83:fc
  250. IEEE 802.1X RX: version=2 type=3 length=199
  251. EAPOL-Key type=2
  252. key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  253. key_length=16 key_data_length=104
  254. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  255. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 4d
  256. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  257. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  258. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  259. key_mic - hexdump(len=16): 22 eb fc 28 d7 ca 57 4d 8a d6 81 47 f9 ba 01 c5
  260. WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
  261. WPA: Could not verify EAPOL-Key MIC - dropping packet
  262. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  263. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  264. RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
  265. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  266. Wireless event: cmd=0x8b15 len=20
  267. Wireless event: new AP: 00:00:00:00:00:00
  268. WPA: 4-Way Handshake failed - pre-shared key may be incorrect
  269. Setting scan request: 0 sec 100000 usec
  270. BSSID 1c:af:f7:8d:83:fc blacklist count incremented to 2
  271. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  272. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  273. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  274. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  275. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  276. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  277. State: 4WAY_HANDSHAKE -> DISCONNECTED
  278. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  279. WEXT: Operstate: linkmode=-1, operstate=5
  280. EAPOL: External notification - portEnabled=0
  281. EAPOL: SUPP_PAE entering state DISCONNECTED
  282. EAPOL: SUPP_BE entering state INITIALIZE
  283. EAPOL: External notification - portValid=0
  284. EAPOL: External notification - EAP success=0
  285. State: DISCONNECTED -> SCANNING
  286. Starting AP scan (broadcast SSID)
  287. Scan requested (ret=0) - scan timeout 5 seconds
  288. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  289. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  290. Wireless event: cmd=0x8b06 len=8
  291. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  292. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  293. Wireless event: cmd=0x8b15 len=20
  294. Wireless event: new AP: 00:00:00:00:00:00
  295. BSSID 00:00:00:00:00:00 blacklist count incremented to 2
  296. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  297. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  298. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  299. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  300. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  301. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  302. State: SCANNING -> DISCONNECTED
  303. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  304. WEXT: Operstate: linkmode=-1, operstate=5
  305. EAPOL: External notification - portEnabled=0
  306. EAPOL: External notification - portValid=0
  307. EAPOL: External notification - EAP success=0
  308. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  309. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  310. Wireless event: cmd=0x8b1a len=20
  311. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  312. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  313. Wireless event: cmd=0x8b15 len=20
  314. Wireless event: new AP: 00:00:00:00:00:00
  315. BSSID 00:00:00:00:00:00 blacklist count incremented to 3
  316. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  317. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  318. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  319. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  320. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  321. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  322. State: DISCONNECTED -> DISCONNECTED
  323. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  324. WEXT: Operstate: linkmode=-1, operstate=5
  325. EAPOL: External notification - portEnabled=0
  326. EAPOL: External notification - portValid=0
  327. EAPOL: External notification - EAP success=0
  328. Authentication with 00:00:00:00:00:00 timed out.
  329. BSSID 00:00:00:00:00:00 blacklist count incremented to 4
  330. No keys have been configured - skip key clearing
  331. State: DISCONNECTED -> DISCONNECTED
  332. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  333. WEXT: Operstate: linkmode=-1, operstate=5
  334. EAPOL: External notification - portEnabled=0
  335. EAPOL: External notification - portValid=0
  336. EAPOL: External notification - EAP success=0
  337. Setting scan request: 0 sec 0 usec
  338. State: DISCONNECTED -> SCANNING
  339. Starting AP scan (broadcast SSID)
  340. Scan requested (ret=0) - scan timeout 5 seconds
  341. Scan timeout - try to get results
  342. Received 483 bytes of scan results (2 BSSes)
  343. New scan results available
  344. Selecting BSS from priority group 0
  345. Try to find WPA-enabled AP
  346. 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
  347. skip - blacklisted
  348. 1: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
  349. skip - SSID mismatch
  350. Try to find non-WPA AP
  351. 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
  352. skip - blacklisted
  353. 1: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
  354. skip - SSID mismatch
  355. No APs found - clear blacklist and try again
  356. Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
  357. Removed BSSID 1c:af:f7:8d:83:fc from blacklist (clear)
  358. Selecting BSS from priority group 0
  359. Try to find WPA-enabled AP
  360. 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
  361. selected based on RSN IE
  362. selected WPA AP 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi'
  363. Trying to associate with 1c:af:f7:8d:83:fc (SSID='dom.ru wi-fi' freq=2452 MHz)
  364. Cancelling scan request
  365. WPA: clearing own WPA/RSN IE
  366. Automatic auth_alg selection: 0x1
  367. RSN: using IEEE 802.11i/D9.0
  368. WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
  369. WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
  370. WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
  371. WPA: using GTK TKIP
  372. WPA: using PTK CCMP
  373. WPA: using KEY_MGMT WPA-PSK
  374. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  375. No keys have been configured - skip key clearing
  376. wpa_driver_wext_set_drop_unencrypted
  377. State: SCANNING -> ASSOCIATING
  378. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  379. WEXT: Operstate: linkmode=-1, operstate=5
  380. wpa_driver_wext_associate
  381. wpa_driver_wext_set_psk
  382. Association request to the driver failed
  383. Setting authentication timeout: 5 sec 0 usec
  384. EAPOL: External notification - EAP success=0
  385. EAPOL: External notification - EAP fail=0
  386. EAPOL: External notification - portControl=Auto
  387. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  388. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  389. Wireless event: cmd=0x8b06 len=8
  390. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  391. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  392. Wireless event: cmd=0x8b15 len=20
  393. Wireless event: new AP: 00:00:00:00:00:00
  394. Added BSSID 1c:af:f7:8d:83:fc into blacklist
  395. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  396. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  397. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  398. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  399. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  400. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  401. State: ASSOCIATING -> DISCONNECTED
  402. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  403. WEXT: Operstate: linkmode=-1, operstate=5
  404. EAPOL: External notification - portEnabled=0
  405. EAPOL: External notification - portValid=0
  406. EAPOL: External notification - EAP success=0
  407. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  408. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  409. Wireless event: cmd=0x8b1a len=20
  410. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  411. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  412. Wireless event: cmd=0x8b15 len=20
  413. Wireless event: new AP: 00:00:00:00:00:00
  414. Added BSSID 00:00:00:00:00:00 into blacklist
  415. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  416. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  417. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  418. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  419. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  420. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  421. State: DISCONNECTED -> DISCONNECTED
  422. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  423. WEXT: Operstate: linkmode=-1, operstate=5
  424. EAPOL: External notification - portEnabled=0
  425. EAPOL: External notification - portValid=0
  426. EAPOL: External notification - EAP success=0
  427. RX EAPOL from 1c:af:f7:8d:83:fc
  428. Not associated - Delay processing of received EAPOL frame
  429. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  430. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  431. Wireless event: cmd=0x8b15 len=20
  432. Wireless event: new AP: 1c:af:f7:8d:83:fc
  433. State: DISCONNECTED -> ASSOCIATED
  434. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  435. WEXT: Operstate: linkmode=-1, operstate=5
  436. Associated to a new BSS: BSSID=1c:af:f7:8d:83:fc
  437. No keys have been configured - skip key clearing
  438. Associated with 1c:af:f7:8d:83:fc
  439. WPA: Association event - clear replay counter
  440. WPA: Clear old PTK
  441. EAPOL: External notification - portEnabled=0
  442. EAPOL: External notification - portValid=0
  443. EAPOL: External notification - EAP success=0
  444. EAPOL: External notification - portEnabled=1
  445. EAPOL: SUPP_PAE entering state CONNECTING
  446. EAPOL: SUPP_BE entering state IDLE
  447. Setting authentication timeout: 10 sec 0 usec
  448. Cancelling scan request
  449. Process pending EAPOL frame that was received just before association notification
  450. RX EAPOL from 1c:af:f7:8d:83:fc
  451. Setting authentication timeout: 10 sec 0 usec
  452. IEEE 802.1X RX: version=2 type=3 length=95
  453. EAPOL-Key type=2
  454. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  455. key_length=16 key_data_length=0
  456. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  457. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 4e
  458. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  459. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  460. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  461. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  462. State: ASSOCIATED -> 4WAY_HANDSHAKE
  463. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  464. RSN: msg 1/4 key data - hexdump(len=0):
  465. WPA: Renewed SNonce - hexdump(len=32): 7a 21 98 65 63 11 b3 b5 40 3d d4 54 33 d6 9c ff d6 3c 20 b2 28 7d 7e cd f0 99 a9 64 ea 3a 9b c1
  466. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  467. WPA: PMK - hexdump(len=32): [REMOVED]
  468. WPA: PTK - hexdump(len=48): [REMOVED]
  469. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  470. WPA: Sending EAPOL-Key 2/4
  471. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  472. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  473. EAPOL: startWhen --> 0
  474. EAPOL: disable timer tick
  475. EAPOL: SUPP_PAE entering state CONNECTING
  476. EAPOL: enable timer tick
  477. EAPOL: txStart
  478. WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
  479. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  480. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  481. Wireless event: cmd=0x8b06 len=8
  482. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  483. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  484. Wireless event: cmd=0x8b15 len=20
  485. Wireless event: new AP: 00:00:00:00:00:00
  486. WPA: 4-Way Handshake failed - pre-shared key may be incorrect
  487. Setting scan request: 0 sec 100000 usec
  488. BSSID 1c:af:f7:8d:83:fc blacklist count incremented to 2
  489. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  490. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  491. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  492. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  493. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  494. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  495. State: 4WAY_HANDSHAKE -> DISCONNECTED
  496. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  497. WEXT: Operstate: linkmode=-1, operstate=5
  498. EAPOL: External notification - portEnabled=0
  499. EAPOL: SUPP_PAE entering state DISCONNECTED
  500. EAPOL: SUPP_BE entering state INITIALIZE
  501. EAPOL: External notification - portValid=0
  502. EAPOL: External notification - EAP success=0
  503. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  504. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  505. Wireless event: cmd=0x8b1a len=20
  506. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  507. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  508. Wireless event: cmd=0x8b15 len=20
  509. Wireless event: new AP: 00:00:00:00:00:00
  510. BSSID 00:00:00:00:00:00 blacklist count incremented to 2
  511. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  512. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  513. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  514. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  515. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  516. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  517. State: DISCONNECTED -> DISCONNECTED
  518. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  519. WEXT: Operstate: linkmode=-1, operstate=5
  520. EAPOL: External notification - portEnabled=0
  521. EAPOL: External notification - portValid=0
  522. EAPOL: External notification - EAP success=0
  523. State: DISCONNECTED -> SCANNING
  524. Starting AP scan (broadcast SSID)
  525. Scan requested (ret=0) - scan timeout 5 seconds
  526. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  527. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  528. Scan timeout - try to get results
  529. Received 482 bytes of scan results (2 BSSes)
  530. New scan results available
  531. Selecting BSS from priority group 0
  532. Try to find WPA-enabled AP
  533. 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
  534. skip - blacklisted
  535. 1: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
  536. skip - SSID mismatch
  537. Try to find non-WPA AP
  538. 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
  539. skip - blacklisted
  540. 1: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
  541. skip - SSID mismatch
  542. No APs found - clear blacklist and try again
  543. Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
  544. Removed BSSID 1c:af:f7:8d:83:fc from blacklist (clear)
  545. Selecting BSS from priority group 0
  546. Try to find WPA-enabled AP
  547. 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
  548. selected based on RSN IE
  549. selected WPA AP 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi'
  550. Trying to associate with 1c:af:f7:8d:83:fc (SSID='dom.ru wi-fi' freq=2452 MHz)
  551. Cancelling scan request
  552. WPA: clearing own WPA/RSN IE
  553. Automatic auth_alg selection: 0x1
  554. RSN: using IEEE 802.11i/D9.0
  555. WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
  556. WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
  557. WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
  558. WPA: using GTK TKIP
  559. WPA: using PTK CCMP
  560. WPA: using KEY_MGMT WPA-PSK
  561. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  562. No keys have been configured - skip key clearing
  563. wpa_driver_wext_set_drop_unencrypted
  564. State: SCANNING -> ASSOCIATING
  565. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  566. WEXT: Operstate: linkmode=-1, operstate=5
  567. wpa_driver_wext_associate
  568. wpa_driver_wext_set_psk
  569. Association request to the driver failed
  570. Setting authentication timeout: 5 sec 0 usec
  571. EAPOL: External notification - EAP success=0
  572. EAPOL: External notification - EAP fail=0
  573. EAPOL: External notification - portControl=Auto
  574. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  575. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  576. Wireless event: cmd=0x8b06 len=8
  577. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  578. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  579. Wireless event: cmd=0x8b15 len=20
  580. Wireless event: new AP: 00:00:00:00:00:00
  581. Added BSSID 1c:af:f7:8d:83:fc into blacklist
  582. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  583. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  584. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  585. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  586. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  587. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  588. State: ASSOCIATING -> DISCONNECTED
  589. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  590. WEXT: Operstate: linkmode=-1, operstate=5
  591. EAPOL: External notification - portEnabled=0
  592. EAPOL: External notification - portValid=0
  593. EAPOL: External notification - EAP success=0
  594. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  595. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  596. Wireless event: cmd=0x8b1a len=20
  597. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  598. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  599. Wireless event: cmd=0x8b15 len=20
  600. Wireless event: new AP: 00:00:00:00:00:00
  601. Added BSSID 00:00:00:00:00:00 into blacklist
  602. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  603. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  604. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  605. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  606. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  607. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  608. State: DISCONNECTED -> DISCONNECTED
  609. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  610. WEXT: Operstate: linkmode=-1, operstate=5
  611. EAPOL: External notification - portEnabled=0
  612. EAPOL: External notification - portValid=0
  613. EAPOL: External notification - EAP success=0
  614. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  615. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  616. Wireless event: cmd=0x8b15 len=20
  617. Wireless event: new AP: 1c:af:f7:8d:83:fc
  618. State: DISCONNECTED -> ASSOCIATED
  619. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  620. WEXT: Operstate: linkmode=-1, operstate=5
  621. Associated to a new BSS: BSSID=1c:af:f7:8d:83:fc
  622. No keys have been configured - skip key clearing
  623. Associated with 1c:af:f7:8d:83:fc
  624. WPA: Association event - clear replay counter
  625. WPA: Clear old PTK
  626. EAPOL: External notification - portEnabled=0
  627. EAPOL: External notification - portValid=0
  628. EAPOL: External notification - EAP success=0
  629. EAPOL: External notification - portEnabled=1
  630. EAPOL: SUPP_PAE entering state CONNECTING
  631. EAPOL: SUPP_BE entering state IDLE
  632. Setting authentication timeout: 10 sec 0 usec
  633. Cancelling scan request
  634. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  635. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  636. EAPOL: startWhen --> 0
  637. EAPOL: disable timer tick
  638. EAPOL: SUPP_PAE entering state CONNECTING
  639. EAPOL: enable timer tick
  640. EAPOL: txStart
  641. WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
  642. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  643. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  644. Wireless event: cmd=0x8b06 len=8
  645. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  646. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  647. Wireless event: cmd=0x8b15 len=20
  648. Wireless event: new AP: 00:00:00:00:00:00
  649. Setting scan request: 0 sec 100000 usec
  650. BSSID 1c:af:f7:8d:83:fc blacklist count incremented to 2
  651. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  652. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  653. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  654. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  655. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  656. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  657. State: ASSOCIATED -> DISCONNECTED
  658. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  659. WEXT: Operstate: linkmode=-1, operstate=5
  660. EAPOL: External notification - portEnabled=0
  661. EAPOL: SUPP_PAE entering state DISCONNECTED
  662. EAPOL: SUPP_BE entering state INITIALIZE
  663. EAPOL: External notification - portValid=0
  664. EAPOL: External notification - EAP success=0
  665. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  666. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  667. Wireless event: cmd=0x8b1a len=20
  668. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  669. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  670. Wireless event: cmd=0x8b15 len=20
  671. Wireless event: new AP: 00:00:00:00:00:00
  672. BSSID 00:00:00:00:00:00 blacklist count incremented to 2
  673. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  674. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  675. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  676. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  677. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  678. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  679. State: DISCONNECTED -> DISCONNECTED
  680. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  681. WEXT: Operstate: linkmode=-1, operstate=5
  682. EAPOL: External notification - portEnabled=0
  683. EAPOL: External notification - portValid=0
  684. EAPOL: External notification - EAP success=0
  685. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  686. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  687. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  688. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  689. Wireless event: cmd=0x8b15 len=20
  690. Wireless event: new AP: 1c:af:f7:8d:83:fc
  691. State: DISCONNECTED -> ASSOCIATED
  692. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  693. WEXT: Operstate: linkmode=-1, operstate=5
  694. Associated to a new BSS: BSSID=1c:af:f7:8d:83:fc
  695. No keys have been configured - skip key clearing
  696. Associated with 1c:af:f7:8d:83:fc
  697. WPA: Association event - clear replay counter
  698. WPA: Clear old PTK
  699. EAPOL: External notification - portEnabled=0
  700. EAPOL: External notification - portValid=0
  701. EAPOL: External notification - EAP success=0
  702. EAPOL: External notification - portEnabled=1
  703. EAPOL: SUPP_PAE entering state CONNECTING
  704. EAPOL: SUPP_BE entering state IDLE
  705. Setting authentication timeout: 10 sec 0 usec
  706. Cancelling scan request
  707. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  708. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  709. EAPOL: startWhen --> 0
  710. EAPOL: disable timer tick
  711. EAPOL: SUPP_PAE entering state CONNECTING
  712. EAPOL: enable timer tick
  713. EAPOL: txStart
  714. WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
  715. RX EAPOL from 1c:af:f7:8d:83:fc
  716. Setting authentication timeout: 10 sec 0 usec
  717. IEEE 802.1X RX: version=2 type=3 length=95
  718. EAPOL-Key type=2
  719. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  720. key_length=16 key_data_length=0
  721. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 08
  722. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 79
  723. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  724. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  725. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  726. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  727. State: ASSOCIATED -> 4WAY_HANDSHAKE
  728. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  729. RSN: msg 1/4 key data - hexdump(len=0):
  730. WPA: Renewed SNonce - hexdump(len=32): 2b 3e 69 34 0b 8e 68 ad 89 f3 a5 79 90 01 0f e7 b2 7e 8d 8e a9 85 4f e5 1b 0b 27 64 36 62 59 2b
  731. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  732. WPA: PMK - hexdump(len=32): [REMOVED]
  733. WPA: PTK - hexdump(len=48): [REMOVED]
  734. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  735. WPA: Sending EAPOL-Key 2/4
  736. RX EAPOL from 1c:af:f7:8d:83:fc
  737. IEEE 802.1X RX: version=2 type=3 length=95
  738. EAPOL-Key type=2
  739. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  740. key_length=16 key_data_length=0
  741. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 09
  742. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 7a
  743. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  744. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  745. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  746. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  747. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  748. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  749. RSN: msg 1/4 key data - hexdump(len=0):
  750. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  751. WPA: PMK - hexdump(len=32): [REMOVED]
  752. WPA: PTK - hexdump(len=48): [REMOVED]
  753. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  754. WPA: Sending EAPOL-Key 2/4
  755. RX EAPOL from 1c:af:f7:8d:83:fc
  756. IEEE 802.1X RX: version=2 type=3 length=95
  757. EAPOL-Key type=2
  758. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  759. key_length=16 key_data_length=0
  760. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0a
  761. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 7b
  762. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  763. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  764. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  765. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  766. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  767. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  768. RSN: msg 1/4 key data - hexdump(len=0):
  769. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  770. WPA: PMK - hexdump(len=32): [REMOVED]
  771. WPA: PTK - hexdump(len=48): [REMOVED]
  772. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  773. WPA: Sending EAPOL-Key 2/4
  774. RX EAPOL from 1c:af:f7:8d:83:fc
  775. IEEE 802.1X RX: version=2 type=3 length=95
  776. EAPOL-Key type=2
  777. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  778. key_length=16 key_data_length=0
  779. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0b
  780. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 7c
  781. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  782. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  783. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  784. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  785. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  786. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  787. RSN: msg 1/4 key data - hexdump(len=0):
  788. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  789. WPA: PMK - hexdump(len=32): [REMOVED]
  790. WPA: PTK - hexdump(len=48): [REMOVED]
  791. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  792. WPA: Sending EAPOL-Key 2/4
  793. RX EAPOL from 1c:af:f7:8d:83:fc
  794. IEEE 802.1X RX: version=2 type=3 length=95
  795. EAPOL-Key type=2
  796. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  797. key_length=16 key_data_length=0
  798. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0c
  799. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 7d
  800. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  801. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  802. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  803. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  804. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  805. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  806. RSN: msg 1/4 key data - hexdump(len=0):
  807. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  808. WPA: PMK - hexdump(len=32): [REMOVED]
  809. WPA: PTK - hexdump(len=48): [REMOVED]
  810. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  811. WPA: Sending EAPOL-Key 2/4
  812. RX EAPOL from 1c:af:f7:8d:83:fc
  813. IEEE 802.1X RX: version=2 type=3 length=95
  814. EAPOL-Key type=2
  815. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  816. key_length=16 key_data_length=0
  817. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0d
  818. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 7e
  819. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  820. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  821. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  822. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  823. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  824. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  825. RSN: msg 1/4 key data - hexdump(len=0):
  826. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  827. WPA: PMK - hexdump(len=32): [REMOVED]
  828. WPA: PTK - hexdump(len=48): [REMOVED]
  829. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  830. WPA: Sending EAPOL-Key 2/4
  831. RX EAPOL from 1c:af:f7:8d:83:fc
  832. IEEE 802.1X RX: version=2 type=3 length=95
  833. EAPOL-Key type=2
  834. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  835. key_length=16 key_data_length=0
  836. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0e
  837. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 7f
  838. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  839. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  840. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  841. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  842. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  843. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  844. RSN: msg 1/4 key data - hexdump(len=0):
  845. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  846. WPA: PMK - hexdump(len=32): [REMOVED]
  847. WPA: PTK - hexdump(len=48): [REMOVED]
  848. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  849. WPA: Sending EAPOL-Key 2/4
  850. RX EAPOL from 1c:af:f7:8d:83:fc
  851. IEEE 802.1X RX: version=2 type=3 length=95
  852. EAPOL-Key type=2
  853. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  854. key_length=16 key_data_length=0
  855. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0f
  856. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 80
  857. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  858. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  859. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  860. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  861. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  862. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  863. RSN: msg 1/4 key data - hexdump(len=0):
  864. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  865. WPA: PMK - hexdump(len=32): [REMOVED]
  866. WPA: PTK - hexdump(len=48): [REMOVED]
  867. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  868. WPA: Sending EAPOL-Key 2/4
  869. RX EAPOL from 1c:af:f7:8d:83:fc
  870. IEEE 802.1X RX: version=2 type=3 length=95
  871. EAPOL-Key type=2
  872. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  873. key_length=16 key_data_length=0
  874. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 10
  875. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 81
  876. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  877. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  878. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  879. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  880. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  881. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  882. RSN: msg 1/4 key data - hexdump(len=0):
  883. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  884. WPA: PMK - hexdump(len=32): [REMOVED]
  885. WPA: PTK - hexdump(len=48): [REMOVED]
  886. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  887. WPA: Sending EAPOL-Key 2/4
  888. RX EAPOL from 1c:af:f7:8d:83:fc
  889. IEEE 802.1X RX: version=2 type=3 length=95
  890. EAPOL-Key type=2
  891. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  892. key_length=16 key_data_length=0
  893. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 11
  894. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 82
  895. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  896. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  897. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  898. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  899. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  900. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  901. RSN: msg 1/4 key data - hexdump(len=0):
  902. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  903. WPA: PMK - hexdump(len=32): [REMOVED]
  904. WPA: PTK - hexdump(len=48): [REMOVED]
  905. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  906. WPA: Sending EAPOL-Key 2/4
  907. RX EAPOL from 1c:af:f7:8d:83:fc
  908. IEEE 802.1X RX: version=2 type=3 length=95
  909. EAPOL-Key type=2
  910. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  911. key_length=16 key_data_length=0
  912. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 12
  913. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 83
  914. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  915. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  916. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  917. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  918. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  919. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  920. RSN: msg 1/4 key data - hexdump(len=0):
  921. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  922. WPA: PMK - hexdump(len=32): [REMOVED]
  923. WPA: PTK - hexdump(len=48): [REMOVED]
  924. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  925. WPA: Sending EAPOL-Key 2/4
  926. RX EAPOL from 1c:af:f7:8d:83:fc
  927. IEEE 802.1X RX: version=2 type=3 length=95
  928. EAPOL-Key type=2
  929. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  930. key_length=16 key_data_length=0
  931. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 13
  932. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 84
  933. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  934. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  935. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  936. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  937. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  938. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  939. RSN: msg 1/4 key data - hexdump(len=0):
  940. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  941. WPA: PMK - hexdump(len=32): [REMOVED]
  942. WPA: PTK - hexdump(len=48): [REMOVED]
  943. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  944. WPA: Sending EAPOL-Key 2/4
  945. RX EAPOL from 1c:af:f7:8d:83:fc
  946. IEEE 802.1X RX: version=2 type=3 length=95
  947. EAPOL-Key type=2
  948. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  949. key_length=16 key_data_length=0
  950. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 14
  951. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 85
  952. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  953. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  954. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  955. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  956. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  957. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  958. RSN: msg 1/4 key data - hexdump(len=0):
  959. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  960. WPA: PMK - hexdump(len=32): [REMOVED]
  961. WPA: PTK - hexdump(len=48): [REMOVED]
  962. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  963. WPA: Sending EAPOL-Key 2/4
  964. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  965. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  966. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  967. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  968. Wireless event: cmd=0x8b15 len=20
  969. Wireless event: new AP: 00:00:00:00:00:00
  970. WPA: 4-Way Handshake failed - pre-shared key may be incorrect
  971. Setting scan request: 0 sec 100000 usec
  972. BSSID 1c:af:f7:8d:83:fc blacklist count incremented to 3
  973. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  974. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  975. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  976. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  977. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  978. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  979. State: 4WAY_HANDSHAKE -> DISCONNECTED
  980. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  981. WEXT: Operstate: linkmode=-1, operstate=5
  982. EAPOL: External notification - portEnabled=0
  983. EAPOL: SUPP_PAE entering state DISCONNECTED
  984. EAPOL: SUPP_BE entering state INITIALIZE
  985. EAPOL: External notification - portValid=0
  986. EAPOL: External notification - EAP success=0
  987. State: DISCONNECTED -> SCANNING
  988. Starting AP scan (broadcast SSID)
  989. Scan requested (ret=0) - scan timeout 5 seconds
  990. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  991. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  992. Wireless event: cmd=0x8b15 len=20
  993. Wireless event: new AP: 1c:af:f7:8d:83:fc
  994. State: SCANNING -> ASSOCIATED
  995. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  996. WEXT: Operstate: linkmode=-1, operstate=5
  997. Associated to a new BSS: BSSID=1c:af:f7:8d:83:fc
  998. No keys have been configured - skip key clearing
  999. Associated with 1c:af:f7:8d:83:fc
  1000. WPA: Association event - clear replay counter
  1001. WPA: Clear old PTK
  1002. EAPOL: External notification - portEnabled=0
  1003. EAPOL: External notification - portValid=0
  1004. EAPOL: External notification - EAP success=0
  1005. EAPOL: External notification - portEnabled=1
  1006. EAPOL: SUPP_PAE entering state CONNECTING
  1007. EAPOL: SUPP_BE entering state IDLE
  1008. Setting authentication timeout: 10 sec 0 usec
  1009. Cancelling scan request
  1010. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  1011. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1012. RX EAPOL from 1c:af:f7:8d:83:fc
  1013. Setting authentication timeout: 10 sec 0 usec
  1014. IEEE 802.1X RX: version=2 type=3 length=95
  1015. EAPOL-Key type=2
  1016. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1017. key_length=16 key_data_length=0
  1018. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
  1019. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 8a
  1020. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1021. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1022. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1023. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1024. State: ASSOCIATED -> 4WAY_HANDSHAKE
  1025. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1026. RSN: msg 1/4 key data - hexdump(len=0):
  1027. WPA: Renewed SNonce - hexdump(len=32): 9c 5c f7 b7 d1 2f bd e5 e8 28 4a ca fa d1 a3 74 5b 33 08 fe 9e 9f 7a 3f 81 d4 65 b3 e3 19 7a d8
  1028. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1029. WPA: PMK - hexdump(len=32): [REMOVED]
  1030. WPA: PTK - hexdump(len=48): [REMOVED]
  1031. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1032. WPA: Sending EAPOL-Key 2/4
  1033. RX EAPOL from 1c:af:f7:8d:83:fc
  1034. IEEE 802.1X RX: version=2 type=3 length=95
  1035. EAPOL-Key type=2
  1036. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1037. key_length=16 key_data_length=0
  1038. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06
  1039. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 8b
  1040. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1041. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1042. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1043. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1044. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  1045. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1046. RSN: msg 1/4 key data - hexdump(len=0):
  1047. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1048. WPA: PMK - hexdump(len=32): [REMOVED]
  1049. WPA: PTK - hexdump(len=48): [REMOVED]
  1050. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1051. WPA: Sending EAPOL-Key 2/4
  1052. RX EAPOL from 1c:af:f7:8d:83:fc
  1053. IEEE 802.1X RX: version=2 type=3 length=95
  1054. EAPOL-Key type=2
  1055. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1056. key_length=16 key_data_length=0
  1057. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 07
  1058. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 8c
  1059. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1060. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1061. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1062. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1063. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  1064. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1065. RSN: msg 1/4 key data - hexdump(len=0):
  1066. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1067. WPA: PMK - hexdump(len=32): [REMOVED]
  1068. WPA: PTK - hexdump(len=48): [REMOVED]
  1069. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1070. WPA: Sending EAPOL-Key 2/4
  1071. RX EAPOL from 1c:af:f7:8d:83:fc
  1072. IEEE 802.1X RX: version=2 type=3 length=95
  1073. EAPOL-Key type=2
  1074. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1075. key_length=16 key_data_length=0
  1076. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 08
  1077. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 8d
  1078. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1079. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1080. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1081. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1082. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  1083. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1084. RSN: msg 1/4 key data - hexdump(len=0):
  1085. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1086. WPA: PMK - hexdump(len=32): [REMOVED]
  1087. WPA: PTK - hexdump(len=48): [REMOVED]
  1088. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1089. WPA: Sending EAPOL-Key 2/4
  1090. RX EAPOL from 1c:af:f7:8d:83:fc
  1091. IEEE 802.1X RX: version=2 type=3 length=95
  1092. EAPOL-Key type=2
  1093. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1094. key_length=16 key_data_length=0
  1095. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 09
  1096. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 8e
  1097. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1098. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1099. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1100. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1101. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  1102. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1103. RSN: msg 1/4 key data - hexdump(len=0):
  1104. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1105. WPA: PMK - hexdump(len=32): [REMOVED]
  1106. WPA: PTK - hexdump(len=48): [REMOVED]
  1107. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1108. WPA: Sending EAPOL-Key 2/4
  1109. RX EAPOL from 1c:af:f7:8d:83:fc
  1110. IEEE 802.1X RX: version=2 type=3 length=95
  1111. EAPOL-Key type=2
  1112. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1113. key_length=16 key_data_length=0
  1114. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0d
  1115. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 92
  1116. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1117. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1118. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1119. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1120. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  1121. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1122. RSN: msg 1/4 key data - hexdump(len=0):
  1123. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1124. WPA: PMK - hexdump(len=32): [REMOVED]
  1125. WPA: PTK - hexdump(len=48): [REMOVED]
  1126. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1127. WPA: Sending EAPOL-Key 2/4
  1128. RX EAPOL from 1c:af:f7:8d:83:fc
  1129. IEEE 802.1X RX: version=2 type=3 length=95
  1130. EAPOL-Key type=2
  1131. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1132. key_length=16 key_data_length=0
  1133. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0e
  1134. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 93
  1135. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1136. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1137. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1138. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1139. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  1140. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1141. RSN: msg 1/4 key data - hexdump(len=0):
  1142. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1143. WPA: PMK - hexdump(len=32): [REMOVED]
  1144. WPA: PTK - hexdump(len=48): [REMOVED]
  1145. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1146. WPA: Sending EAPOL-Key 2/4
  1147. RX EAPOL from 1c:af:f7:8d:83:fc
  1148. IEEE 802.1X RX: version=2 type=3 length=95
  1149. EAPOL-Key type=2
  1150. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1151. key_length=16 key_data_length=0
  1152. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0f
  1153. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 94
  1154. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1155. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1156. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1157. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1158. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  1159. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1160. RSN: msg 1/4 key data - hexdump(len=0):
  1161. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1162. WPA: PMK - hexdump(len=32): [REMOVED]
  1163. WPA: PTK - hexdump(len=48): [REMOVED]
  1164. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1165. WPA: Sending EAPOL-Key 2/4
  1166. RX EAPOL from 1c:af:f7:8d:83:fc
  1167. IEEE 802.1X RX: version=2 type=3 length=95
  1168. EAPOL-Key type=2
  1169. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1170. key_length=16 key_data_length=0
  1171. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 10
  1172. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 95
  1173. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1174. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1175. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1176. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1177. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  1178. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1179. RSN: msg 1/4 key data - hexdump(len=0):
  1180. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1181. WPA: PMK - hexdump(len=32): [REMOVED]
  1182. WPA: PTK - hexdump(len=48): [REMOVED]
  1183. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1184. WPA: Sending EAPOL-Key 2/4
  1185. RX EAPOL from 1c:af:f7:8d:83:fc
  1186. IEEE 802.1X RX: version=2 type=3 length=95
  1187. EAPOL-Key type=2
  1188. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1189. key_length=16 key_data_length=0
  1190. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 11
  1191. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 96
  1192. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1193. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1194. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1195. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1196. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  1197. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1198. RSN: msg 1/4 key data - hexdump(len=0):
  1199. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1200. WPA: PMK - hexdump(len=32): [REMOVED]
  1201. WPA: PTK - hexdump(len=48): [REMOVED]
  1202. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1203. WPA: Sending EAPOL-Key 2/4
  1204. RX EAPOL from 1c:af:f7:8d:83:fc
  1205. IEEE 802.1X RX: version=2 type=3 length=95
  1206. EAPOL-Key type=2
  1207. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1208. key_length=16 key_data_length=0
  1209. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 12
  1210. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de 97
  1211. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1212. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1213. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1214. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1215. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  1216. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1217. RSN: msg 1/4 key data - hexdump(len=0):
  1218. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1219. WPA: PMK - hexdump(len=32): [REMOVED]
  1220. WPA: PTK - hexdump(len=48): [REMOVED]
  1221. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1222. WPA: Sending EAPOL-Key 2/4
  1223. EAPOL: startWhen --> 0
  1224. EAPOL: disable timer tick
  1225. EAPOL: SUPP_PAE entering state CONNECTING
  1226. EAPOL: enable timer tick
  1227. EAPOL: txStart
  1228. WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
  1229. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1230. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1231. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1232. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1233. Wireless event: cmd=0x8b15 len=20
  1234. Wireless event: new AP: 00:00:00:00:00:00
  1235. WPA: 4-Way Handshake failed - pre-shared key may be incorrect
  1236. Setting scan request: 0 sec 100000 usec
  1237. BSSID 1c:af:f7:8d:83:fc blacklist count incremented to 4
  1238. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  1239. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1240. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  1241. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  1242. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  1243. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1244. State: 4WAY_HANDSHAKE -> DISCONNECTED
  1245. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  1246. WEXT: Operstate: linkmode=-1, operstate=5
  1247. EAPOL: External notification - portEnabled=0
  1248. EAPOL: SUPP_PAE entering state DISCONNECTED
  1249. EAPOL: SUPP_BE entering state INITIALIZE
  1250. EAPOL: External notification - portValid=0
  1251. EAPOL: External notification - EAP success=0
  1252. State: DISCONNECTED -> SCANNING
  1253. Starting AP scan (broadcast SSID)
  1254. Scan requested (ret=0) - scan timeout 5 seconds
  1255. Scan timeout - try to get results
  1256. Received 483 bytes of scan results (2 BSSes)
  1257. New scan results available
  1258. Selecting BSS from priority group 0
  1259. Try to find WPA-enabled AP
  1260. 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
  1261. skip - blacklisted
  1262. 1: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
  1263. skip - SSID mismatch
  1264. Try to find non-WPA AP
  1265. 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
  1266. skip - blacklisted
  1267. 1: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
  1268. skip - SSID mismatch
  1269. No APs found - clear blacklist and try again
  1270. Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
  1271. Removed BSSID 1c:af:f7:8d:83:fc from blacklist (clear)
  1272. Selecting BSS from priority group 0
  1273. Try to find WPA-enabled AP
  1274. 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
  1275. selected based on RSN IE
  1276. selected WPA AP 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi'
  1277. Trying to associate with 1c:af:f7:8d:83:fc (SSID='dom.ru wi-fi' freq=2452 MHz)
  1278. Cancelling scan request
  1279. WPA: clearing own WPA/RSN IE
  1280. Automatic auth_alg selection: 0x1
  1281. RSN: using IEEE 802.11i/D9.0
  1282. WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
  1283. WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
  1284. WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
  1285. WPA: using GTK TKIP
  1286. WPA: using PTK CCMP
  1287. WPA: using KEY_MGMT WPA-PSK
  1288. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1289. No keys have been configured - skip key clearing
  1290. wpa_driver_wext_set_drop_unencrypted
  1291. State: SCANNING -> ASSOCIATING
  1292. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  1293. WEXT: Operstate: linkmode=-1, operstate=5
  1294. wpa_driver_wext_associate
  1295. wpa_driver_wext_set_psk
  1296. Association request to the driver failed
  1297. Setting authentication timeout: 5 sec 0 usec
  1298. EAPOL: External notification - EAP success=0
  1299. EAPOL: External notification - EAP fail=0
  1300. EAPOL: External notification - portControl=Auto
  1301. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1302. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1303. Wireless event: cmd=0x8b06 len=8
  1304. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1305. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1306. Wireless event: cmd=0x8b15 len=20
  1307. Wireless event: new AP: 00:00:00:00:00:00
  1308. Added BSSID 1c:af:f7:8d:83:fc into blacklist
  1309. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  1310. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1311. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  1312. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  1313. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  1314. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1315. State: ASSOCIATING -> DISCONNECTED
  1316. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  1317. WEXT: Operstate: linkmode=-1, operstate=5
  1318. EAPOL: External notification - portEnabled=0
  1319. EAPOL: External notification - portValid=0
  1320. EAPOL: External notification - EAP success=0
  1321. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1322. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1323. Wireless event: cmd=0x8b1a len=20
  1324. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1325. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1326. Wireless event: cmd=0x8b15 len=20
  1327. Wireless event: new AP: 00:00:00:00:00:00
  1328. Added BSSID 00:00:00:00:00:00 into blacklist
  1329. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  1330. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1331. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  1332. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  1333. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  1334. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1335. State: DISCONNECTED -> DISCONNECTED
  1336. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  1337. WEXT: Operstate: linkmode=-1, operstate=5
  1338. EAPOL: External notification - portEnabled=0
  1339. EAPOL: External notification - portValid=0
  1340. EAPOL: External notification - EAP success=0
  1341. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1342. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1343. Wireless event: cmd=0x8b06 len=8
  1344. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1345. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1346. Wireless event: cmd=0x8b15 len=20
  1347. Wireless event: new AP: 00:00:00:00:00:00
  1348. BSSID 00:00:00:00:00:00 blacklist count incremented to 2
  1349. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  1350. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1351. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  1352. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  1353. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  1354. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1355. State: DISCONNECTED -> DISCONNECTED
  1356. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  1357. WEXT: Operstate: linkmode=-1, operstate=5
  1358. EAPOL: External notification - portEnabled=0
  1359. EAPOL: External notification - portValid=0
  1360. EAPOL: External notification - EAP success=0
  1361. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1362. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1363. Wireless event: cmd=0x8b1a len=20
  1364. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1365. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1366. Wireless event: cmd=0x8b15 len=20
  1367. Wireless event: new AP: 00:00:00:00:00:00
  1368. BSSID 00:00:00:00:00:00 blacklist count incremented to 3
  1369. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  1370. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1371. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  1372. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  1373. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  1374. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1375. State: DISCONNECTED -> DISCONNECTED
  1376. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  1377. WEXT: Operstate: linkmode=-1, operstate=5
  1378. EAPOL: External notification - portEnabled=0
  1379. EAPOL: External notification - portValid=0
  1380. EAPOL: External notification - EAP success=0
  1381. Authentication with 00:00:00:00:00:00 timed out.
  1382. BSSID 00:00:00:00:00:00 blacklist count incremented to 4
  1383. No keys have been configured - skip key clearing
  1384. State: DISCONNECTED -> DISCONNECTED
  1385. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  1386. WEXT: Operstate: linkmode=-1, operstate=5
  1387. EAPOL: External notification - portEnabled=0
  1388. EAPOL: External notification - portValid=0
  1389. EAPOL: External notification - EAP success=0
  1390. Setting scan request: 0 sec 0 usec
  1391. State: DISCONNECTED -> SCANNING
  1392. Starting AP scan (broadcast SSID)
  1393. Scan requested (ret=0) - scan timeout 5 seconds
  1394. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1395. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1396. Wireless event: cmd=0x8b15 len=20
  1397. Wireless event: new AP: 1c:af:f7:8d:83:fc
  1398. State: SCANNING -> ASSOCIATED
  1399. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  1400. WEXT: Operstate: linkmode=-1, operstate=5
  1401. Associated to a new BSS: BSSID=1c:af:f7:8d:83:fc
  1402. No keys have been configured - skip key clearing
  1403. Select network based on association information
  1404. Network configuration found for the current AP
  1405. WPA: Using WPA IE from AssocReq to set cipher suites
  1406. WPA: Selected cipher suites: group 8 pairwise 16 key_mgmt 2 proto 2
  1407. WPA: clearing AP WPA IE
  1408. WPA: clearing AP RSN IE
  1409. WPA: using GTK TKIP
  1410. WPA: using PTK CCMP
  1411. WPA: using KEY_MGMT WPA-PSK
  1412. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1413. EAPOL: External notification - EAP success=0
  1414. EAPOL: External notification - EAP fail=0
  1415. EAPOL: External notification - portControl=Auto
  1416. Associated with 1c:af:f7:8d:83:fc
  1417. WPA: Association event - clear replay counter
  1418. WPA: Clear old PTK
  1419. EAPOL: External notification - portEnabled=0
  1420. EAPOL: External notification - portValid=0
  1421. EAPOL: External notification - EAP success=0
  1422. EAPOL: External notification - portEnabled=1
  1423. EAPOL: SUPP_PAE entering state CONNECTING
  1424. EAPOL: SUPP_BE entering state IDLE
  1425. Setting authentication timeout: 10 sec 0 usec
  1426. Cancelling scan request
  1427. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  1428. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1429. RX EAPOL from 1c:af:f7:8d:83:fc
  1430. Setting authentication timeout: 10 sec 0 usec
  1431. IEEE 802.1X RX: version=2 type=3 length=95
  1432. EAPOL-Key type=2
  1433. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1434. key_length=16 key_data_length=0
  1435. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  1436. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de a4
  1437. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1438. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1439. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1440. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1441. State: ASSOCIATED -> 4WAY_HANDSHAKE
  1442. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1443. RSN: msg 1/4 key data - hexdump(len=0):
  1444. WPA: Renewed SNonce - hexdump(len=32): 03 1c 8d 7f c7 98 59 7e 23 bc 63 b8 7c 32 44 51 19 a6 c3 7c 0e ba 1c 03 c3 60 17 87 be a4 0d 08
  1445. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1446. WPA: PMK - hexdump(len=32): [REMOVED]
  1447. WPA: PTK - hexdump(len=48): [REMOVED]
  1448. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1449. WPA: Sending EAPOL-Key 2/4
  1450. RX EAPOL from 1c:af:f7:8d:83:fc
  1451. IEEE 802.1X RX: version=2 type=3 length=95
  1452. EAPOL-Key type=2
  1453. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1454. key_length=16 key_data_length=0
  1455. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  1456. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de a5
  1457. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1458. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1459. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1460. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1461. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  1462. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1463. RSN: msg 1/4 key data - hexdump(len=0):
  1464. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1465. WPA: PMK - hexdump(len=32): [REMOVED]
  1466. WPA: PTK - hexdump(len=48): [REMOVED]
  1467. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1468. WPA: Sending EAPOL-Key 2/4
  1469. RX EAPOL from 1c:af:f7:8d:83:fc
  1470. IEEE 802.1X RX: version=2 type=3 length=95
  1471. EAPOL-Key type=2
  1472. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1473. key_length=16 key_data_length=0
  1474. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 07
  1475. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de a9
  1476. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1477. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1478. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1479. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1480. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  1481. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1482. RSN: msg 1/4 key data - hexdump(len=0):
  1483. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1484. WPA: PMK - hexdump(len=32): [REMOVED]
  1485. WPA: PTK - hexdump(len=48): [REMOVED]
  1486. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1487. WPA: Sending EAPOL-Key 2/4
  1488. RX EAPOL from 1c:af:f7:8d:83:fc
  1489. IEEE 802.1X RX: version=2 type=3 length=95
  1490. EAPOL-Key type=2
  1491. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1492. key_length=16 key_data_length=0
  1493. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 08
  1494. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de aa
  1495. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1496. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1497. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1498. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1499. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  1500. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1501. RSN: msg 1/4 key data - hexdump(len=0):
  1502. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1503. WPA: PMK - hexdump(len=32): [REMOVED]
  1504. WPA: PTK - hexdump(len=48): [REMOVED]
  1505. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1506. WPA: Sending EAPOL-Key 2/4
  1507. RX EAPOL from 1c:af:f7:8d:83:fc
  1508. IEEE 802.1X RX: version=2 type=3 length=95
  1509. EAPOL-Key type=2
  1510. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1511. key_length=16 key_data_length=0
  1512. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 09
  1513. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de ab
  1514. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1515. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1516. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1517. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1518. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  1519. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1520. RSN: msg 1/4 key data - hexdump(len=0):
  1521. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1522. WPA: PMK - hexdump(len=32): [REMOVED]
  1523. WPA: PTK - hexdump(len=48): [REMOVED]
  1524. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1525. WPA: Sending EAPOL-Key 2/4
  1526. RX EAPOL from 1c:af:f7:8d:83:fc
  1527. IEEE 802.1X RX: version=2 type=3 length=95
  1528. EAPOL-Key type=2
  1529. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1530. key_length=16 key_data_length=0
  1531. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0a
  1532. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de ac
  1533. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1534. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1535. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1536. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1537. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  1538. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1539. RSN: msg 1/4 key data - hexdump(len=0):
  1540. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1541. WPA: PMK - hexdump(len=32): [REMOVED]
  1542. WPA: PTK - hexdump(len=48): [REMOVED]
  1543. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1544. WPA: Sending EAPOL-Key 2/4
  1545. RX EAPOL from 1c:af:f7:8d:83:fc
  1546. IEEE 802.1X RX: version=2 type=3 length=95
  1547. EAPOL-Key type=2
  1548. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1549. key_length=16 key_data_length=0
  1550. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0b
  1551. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de ad
  1552. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1553. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1554. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1555. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1556. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  1557. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1558. RSN: msg 1/4 key data - hexdump(len=0):
  1559. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1560. WPA: PMK - hexdump(len=32): [REMOVED]
  1561. WPA: PTK - hexdump(len=48): [REMOVED]
  1562. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1563. WPA: Sending EAPOL-Key 2/4
  1564. RX EAPOL from 1c:af:f7:8d:83:fc
  1565. IEEE 802.1X RX: version=2 type=3 length=95
  1566. EAPOL-Key type=2
  1567. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1568. key_length=16 key_data_length=0
  1569. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0c
  1570. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de ae
  1571. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1572. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1573. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1574. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1575. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  1576. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1577. RSN: msg 1/4 key data - hexdump(len=0):
  1578. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1579. WPA: PMK - hexdump(len=32): [REMOVED]
  1580. WPA: PTK - hexdump(len=48): [REMOVED]
  1581. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1582. WPA: Sending EAPOL-Key 2/4
  1583. RX EAPOL from 1c:af:f7:8d:83:fc
  1584. IEEE 802.1X RX: version=2 type=3 length=95
  1585. EAPOL-Key type=2
  1586. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1587. key_length=16 key_data_length=0
  1588. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0d
  1589. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de af
  1590. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1591. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1592. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1593. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1594. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  1595. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1596. RSN: msg 1/4 key data - hexdump(len=0):
  1597. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1598. WPA: PMK - hexdump(len=32): [REMOVED]
  1599. WPA: PTK - hexdump(len=48): [REMOVED]
  1600. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1601. WPA: Sending EAPOL-Key 2/4
  1602. RX EAPOL from 1c:af:f7:8d:83:fc
  1603. IEEE 802.1X RX: version=2 type=3 length=95
  1604. EAPOL-Key type=2
  1605. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1606. key_length=16 key_data_length=0
  1607. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0e
  1608. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de b0
  1609. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1610. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1611. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1612. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1613. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  1614. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1615. RSN: msg 1/4 key data - hexdump(len=0):
  1616. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1617. WPA: PMK - hexdump(len=32): [REMOVED]
  1618. WPA: PTK - hexdump(len=48): [REMOVED]
  1619. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1620. WPA: Sending EAPOL-Key 2/4
  1621. RX EAPOL from 1c:af:f7:8d:83:fc
  1622. IEEE 802.1X RX: version=2 type=3 length=95
  1623. EAPOL-Key type=2
  1624. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1625. key_length=16 key_data_length=0
  1626. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 0f
  1627. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de b1
  1628. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1629. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1630. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1631. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1632. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  1633. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1634. RSN: msg 1/4 key data - hexdump(len=0):
  1635. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1636. WPA: PMK - hexdump(len=32): [REMOVED]
  1637. WPA: PTK - hexdump(len=48): [REMOVED]
  1638. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1639. WPA: Sending EAPOL-Key 2/4
  1640. RX EAPOL from 1c:af:f7:8d:83:fc
  1641. IEEE 802.1X RX: version=2 type=3 length=95
  1642. EAPOL-Key type=2
  1643. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1644. key_length=16 key_data_length=0
  1645. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 10
  1646. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de b2
  1647. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1648. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1649. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1650. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1651. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  1652. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1653. RSN: msg 1/4 key data - hexdump(len=0):
  1654. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1655. WPA: PMK - hexdump(len=32): [REMOVED]
  1656. WPA: PTK - hexdump(len=48): [REMOVED]
  1657. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1658. WPA: Sending EAPOL-Key 2/4
  1659. EAPOL: startWhen --> 0
  1660. EAPOL: disable timer tick
  1661. EAPOL: SUPP_PAE entering state CONNECTING
  1662. EAPOL: enable timer tick
  1663. EAPOL: txStart
  1664. WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
  1665. RX EAPOL from 1c:af:f7:8d:83:fc
  1666. IEEE 802.1X RX: version=2 type=3 length=95
  1667. EAPOL-Key type=2
  1668. key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  1669. key_length=16 key_data_length=0
  1670. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 13
  1671. key_nonce - hexdump(len=32): 33 e0 8b f5 a8 bb 31 22 57 36 3d ae 64 0e de b0 7c a9 8f 2a 9d 4b 65 22 e0 c3 c3 d9 db 45 de b4
  1672. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1673. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  1674. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  1675. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  1676. State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  1677. WPA: RX message 1 of 4-Way Handshake from 1c:af:f7:8d:83:fc (ver=2)
  1678. RSN: msg 1/4 key data - hexdump(len=0):
  1679. WPA: PTK derivation - A1=00:e0:4c:04:bf:44 A2=1c:af:f7:8d:83:fc
  1680. WPA: PMK - hexdump(len=32): [REMOVED]
  1681. WPA: PTK - hexdump(len=48): [REMOVED]
  1682. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1683. WPA: Sending EAPOL-Key 2/4
  1684. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1685. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1686. Wireless event: cmd=0x8b15 len=20
  1687. Wireless event: new AP: 00:00:00:00:00:00
  1688. WPA: 4-Way Handshake failed - pre-shared key may be incorrect
  1689. Setting scan request: 0 sec 100000 usec
  1690. BSSID 1c:af:f7:8d:83:fc blacklist count incremented to 2
  1691. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  1692. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1693. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  1694. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  1695. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  1696. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1697. State: 4WAY_HANDSHAKE -> DISCONNECTED
  1698. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  1699. WEXT: Operstate: linkmode=-1, operstate=5
  1700. EAPOL: External notification - portEnabled=0
  1701. EAPOL: SUPP_PAE entering state DISCONNECTED
  1702. EAPOL: SUPP_BE entering state INITIALIZE
  1703. EAPOL: External notification - portValid=0
  1704. EAPOL: External notification - EAP success=0
  1705. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1706. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1707. RX EAPOL from 1c:af:f7:8d:83:fc
  1708. Not associated - Delay processing of received EAPOL frame
  1709. RX EAPOL from 1c:af:f7:8d:83:fc
  1710. Not associated - Delay processing of received EAPOL frame
  1711. State: DISCONNECTED -> SCANNING
  1712. Starting AP scan (broadcast SSID)
  1713. Scan requested (ret=0) - scan timeout 5 seconds
  1714. RX EAPOL from 1c:af:f7:8d:83:fc
  1715. Not associated - Delay processing of received EAPOL frame
  1716. RX EAPOL from 1c:af:f7:8d:83:fc
  1717. Not associated - Delay processing of received EAPOL frame
  1718. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1719. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1720. Wireless event: cmd=0x8b06 len=8
  1721. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1722. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1723. Wireless event: cmd=0x8b15 len=20
  1724. Wireless event: new AP: 00:00:00:00:00:00
  1725. BSSID 00:00:00:00:00:00 blacklist count incremented to 5
  1726. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  1727. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1728. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  1729. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  1730. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  1731. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1732. State: SCANNING -> DISCONNECTED
  1733. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  1734. WEXT: Operstate: linkmode=-1, operstate=5
  1735. EAPOL: External notification - portEnabled=0
  1736. EAPOL: External notification - portValid=0
  1737. EAPOL: External notification - EAP success=0
  1738. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1739. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1740. Wireless event: cmd=0x8b1a len=20
  1741. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1742. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1743. Wireless event: cmd=0x8b15 len=20
  1744. Wireless event: new AP: 00:00:00:00:00:00
  1745. BSSID 00:00:00:00:00:00 blacklist count incremented to 6
  1746. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  1747. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1748. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  1749. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  1750. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  1751. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1752. State: DISCONNECTED -> DISCONNECTED
  1753. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  1754. WEXT: Operstate: linkmode=-1, operstate=5
  1755. EAPOL: External notification - portEnabled=0
  1756. EAPOL: External notification - portValid=0
  1757. EAPOL: External notification - EAP success=0
  1758. Scan timeout - try to get results
  1759. Received 483 bytes of scan results (2 BSSes)
  1760. New scan results available
  1761. Selecting BSS from priority group 0
  1762. Try to find WPA-enabled AP
  1763. 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
  1764. skip - blacklisted
  1765. 1: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
  1766. skip - SSID mismatch
  1767. Try to find non-WPA AP
  1768. 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
  1769. skip - blacklisted
  1770. 1: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
  1771. skip - SSID mismatch
  1772. No APs found - clear blacklist and try again
  1773. Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
  1774. Removed BSSID 1c:af:f7:8d:83:fc from blacklist (clear)
  1775. Selecting BSS from priority group 0
  1776. Try to find WPA-enabled AP
  1777. 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
  1778. selected based on RSN IE
  1779. selected WPA AP 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi'
  1780. Trying to associate with 1c:af:f7:8d:83:fc (SSID='dom.ru wi-fi' freq=2452 MHz)
  1781. Cancelling scan request
  1782. WPA: clearing own WPA/RSN IE
  1783. Automatic auth_alg selection: 0x1
  1784. RSN: using IEEE 802.11i/D9.0
  1785. WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
  1786. WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
  1787. WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
  1788. WPA: using GTK TKIP
  1789. WPA: using PTK CCMP
  1790. WPA: using KEY_MGMT WPA-PSK
  1791. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1792. No keys have been configured - skip key clearing
  1793. wpa_driver_wext_set_drop_unencrypted
  1794. State: DISCONNECTED -> ASSOCIATING
  1795. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  1796. WEXT: Operstate: linkmode=-1, operstate=5
  1797. wpa_driver_wext_associate
  1798. wpa_driver_wext_set_psk
  1799. Association request to the driver failed
  1800. Setting authentication timeout: 5 sec 0 usec
  1801. EAPOL: External notification - EAP success=0
  1802. EAPOL: External notification - EAP fail=0
  1803. EAPOL: External notification - portControl=Auto
  1804. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1805. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1806. Wireless event: cmd=0x8b06 len=8
  1807. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1808. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1809. Wireless event: cmd=0x8b15 len=20
  1810. Wireless event: new AP: 00:00:00:00:00:00
  1811. Added BSSID 1c:af:f7:8d:83:fc into blacklist
  1812. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  1813. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1814. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  1815. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  1816. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  1817. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1818. State: ASSOCIATING -> DISCONNECTED
  1819. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  1820. WEXT: Operstate: linkmode=-1, operstate=5
  1821. EAPOL: External notification - portEnabled=0
  1822. EAPOL: External notification - portValid=0
  1823. EAPOL: External notification - EAP success=0
  1824. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1825. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1826. Wireless event: cmd=0x8b1a len=20
  1827. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1828. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1829. Wireless event: cmd=0x8b15 len=20
  1830. Wireless event: new AP: 00:00:00:00:00:00
  1831. Added BSSID 00:00:00:00:00:00 into blacklist
  1832. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  1833. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1834. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  1835. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  1836. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  1837. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1838. State: DISCONNECTED -> DISCONNECTED
  1839. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  1840. WEXT: Operstate: linkmode=-1, operstate=5
  1841. EAPOL: External notification - portEnabled=0
  1842. EAPOL: External notification - portValid=0
  1843. EAPOL: External notification - EAP success=0
  1844. Authentication with 00:00:00:00:00:00 timed out.
  1845. BSSID 00:00:00:00:00:00 blacklist count incremented to 2
  1846. No keys have been configured - skip key clearing
  1847. State: DISCONNECTED -> DISCONNECTED
  1848. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  1849. WEXT: Operstate: linkmode=-1, operstate=5
  1850. EAPOL: External notification - portEnabled=0
  1851. EAPOL: External notification - portValid=0
  1852. EAPOL: External notification - EAP success=0
  1853. Setting scan request: 0 sec 0 usec
  1854. State: DISCONNECTED -> SCANNING
  1855. Starting AP scan (broadcast SSID)
  1856. Scan requested (ret=0) - scan timeout 5 seconds
  1857. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1858. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1859. Wireless event: cmd=0x8b06 len=8
  1860. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1861. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1862. Wireless event: cmd=0x8b15 len=20
  1863. Wireless event: new AP: 00:00:00:00:00:00
  1864. BSSID 00:00:00:00:00:00 blacklist count incremented to 3
  1865. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  1866. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1867. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  1868. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  1869. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  1870. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1871. State: SCANNING -> DISCONNECTED
  1872. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  1873. WEXT: Operstate: linkmode=-1, operstate=5
  1874. EAPOL: External notification - portEnabled=0
  1875. EAPOL: External notification - portValid=0
  1876. EAPOL: External notification - EAP success=0
  1877. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1878. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1879. Wireless event: cmd=0x8b1a len=20
  1880. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1881. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1882. Wireless event: cmd=0x8b15 len=20
  1883. Wireless event: new AP: 00:00:00:00:00:00
  1884. BSSID 00:00:00:00:00:00 blacklist count incremented to 4
  1885. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  1886. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1887. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  1888. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  1889. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  1890. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1891. State: DISCONNECTED -> DISCONNECTED
  1892. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  1893. WEXT: Operstate: linkmode=-1, operstate=5
  1894. EAPOL: External notification - portEnabled=0
  1895. EAPOL: External notification - portValid=0
  1896. EAPOL: External notification - EAP success=0
  1897. Scan timeout - try to get results
  1898. Received 483 bytes of scan results (2 BSSes)
  1899. New scan results available
  1900. Selecting BSS from priority group 0
  1901. Try to find WPA-enabled AP
  1902. 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
  1903. selected based on RSN IE
  1904. selected WPA AP 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi'
  1905. Trying to associate with 1c:af:f7:8d:83:fc (SSID='dom.ru wi-fi' freq=2452 MHz)
  1906. Cancelling scan request
  1907. WPA: clearing own WPA/RSN IE
  1908. Automatic auth_alg selection: 0x1
  1909. RSN: using IEEE 802.11i/D9.0
  1910. WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
  1911. WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
  1912. WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
  1913. WPA: using GTK TKIP
  1914. WPA: using PTK CCMP
  1915. WPA: using KEY_MGMT WPA-PSK
  1916. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  1917. No keys have been configured - skip key clearing
  1918. wpa_driver_wext_set_drop_unencrypted
  1919. State: DISCONNECTED -> ASSOCIATING
  1920. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  1921. WEXT: Operstate: linkmode=-1, operstate=5
  1922. wpa_driver_wext_associate
  1923. wpa_driver_wext_set_psk
  1924. Association request to the driver failed
  1925. Setting authentication timeout: 5 sec 0 usec
  1926. EAPOL: External notification - EAP success=0
  1927. EAPOL: External notification - EAP fail=0
  1928. EAPOL: External notification - portControl=Auto
  1929. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1930. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1931. Wireless event: cmd=0x8b06 len=8
  1932. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1933. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1934. Wireless event: cmd=0x8b15 len=20
  1935. Wireless event: new AP: 00:00:00:00:00:00
  1936. BSSID 1c:af:f7:8d:83:fc blacklist count incremented to 2
  1937. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  1938. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1939. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  1940. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  1941. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  1942. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1943. State: ASSOCIATING -> DISCONNECTED
  1944. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  1945. WEXT: Operstate: linkmode=-1, operstate=5
  1946. EAPOL: External notification - portEnabled=0
  1947. EAPOL: External notification - portValid=0
  1948. EAPOL: External notification - EAP success=0
  1949. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1950. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1951. Wireless event: cmd=0x8b1a len=20
  1952. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1953. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1954. Wireless event: cmd=0x8b15 len=20
  1955. Wireless event: new AP: 00:00:00:00:00:00
  1956. BSSID 00:00:00:00:00:00 blacklist count incremented to 5
  1957. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  1958. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1959. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  1960. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  1961. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  1962. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1963. State: DISCONNECTED -> DISCONNECTED
  1964. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  1965. WEXT: Operstate: linkmode=-1, operstate=5
  1966. EAPOL: External notification - portEnabled=0
  1967. EAPOL: External notification - portValid=0
  1968. EAPOL: External notification - EAP success=0
  1969. Authentication with 00:00:00:00:00:00 timed out.
  1970. BSSID 00:00:00:00:00:00 blacklist count incremented to 6
  1971. No keys have been configured - skip key clearing
  1972. State: DISCONNECTED -> DISCONNECTED
  1973. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  1974. WEXT: Operstate: linkmode=-1, operstate=5
  1975. EAPOL: External notification - portEnabled=0
  1976. EAPOL: External notification - portValid=0
  1977. EAPOL: External notification - EAP success=0
  1978. Setting scan request: 0 sec 0 usec
  1979. State: DISCONNECTED -> SCANNING
  1980. Starting AP scan (broadcast SSID)
  1981. Scan requested (ret=0) - scan timeout 5 seconds
  1982. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1983. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1984. Wireless event: cmd=0x8b06 len=8
  1985. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  1986. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  1987. Wireless event: cmd=0x8b15 len=20
  1988. Wireless event: new AP: 00:00:00:00:00:00
  1989. BSSID 00:00:00:00:00:00 blacklist count incremented to 7
  1990. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  1991. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1992. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  1993. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  1994. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  1995. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  1996. State: SCANNING -> DISCONNECTED
  1997. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  1998. WEXT: Operstate: linkmode=-1, operstate=5
  1999. EAPOL: External notification - portEnabled=0
  2000. EAPOL: External notification - portValid=0
  2001. EAPOL: External notification - EAP success=0
  2002. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  2003. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  2004. Wireless event: cmd=0x8b1a len=20
  2005. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  2006. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  2007. Wireless event: cmd=0x8b15 len=20
  2008. Wireless event: new AP: 00:00:00:00:00:00
  2009. BSSID 00:00:00:00:00:00 blacklist count incremented to 8
  2010. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  2011. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  2012. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  2013. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  2014. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  2015. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  2016. State: DISCONNECTED -> DISCONNECTED
  2017. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  2018. WEXT: Operstate: linkmode=-1, operstate=5
  2019. EAPOL: External notification - portEnabled=0
  2020. EAPOL: External notification - portValid=0
  2021. EAPOL: External notification - EAP success=0
  2022. Scan timeout - try to get results
  2023. Received 483 bytes of scan results (2 BSSes)
  2024. New scan results available
  2025. Selecting BSS from priority group 0
  2026. Try to find WPA-enabled AP
  2027. 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
  2028. skip - blacklisted
  2029. 1: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
  2030. skip - SSID mismatch
  2031. Try to find non-WPA AP
  2032. 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
  2033. skip - blacklisted
  2034. 1: 48:5b:39:c8:ed:40 ssid='Valya' wpa_ie_len=0 rsn_ie_len=20 caps=0x11
  2035. skip - SSID mismatch
  2036. No APs found - clear blacklist and try again
  2037. Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
  2038. Removed BSSID 1c:af:f7:8d:83:fc from blacklist (clear)
  2039. Selecting BSS from priority group 0
  2040. Try to find WPA-enabled AP
  2041. 0: 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
  2042. selected based on RSN IE
  2043. selected WPA AP 1c:af:f7:8d:83:fc ssid='dom.ru wi-fi'
  2044. Trying to associate with 1c:af:f7:8d:83:fc (SSID='dom.ru wi-fi' freq=2452 MHz)
  2045. Cancelling scan request
  2046. WPA: clearing own WPA/RSN IE
  2047. Automatic auth_alg selection: 0x1
  2048. RSN: using IEEE 802.11i/D9.0
  2049. WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
  2050. WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
  2051. WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
  2052. WPA: using GTK TKIP
  2053. WPA: using PTK CCMP
  2054. WPA: using KEY_MGMT WPA-PSK
  2055. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  2056. No keys have been configured - skip key clearing
  2057. wpa_driver_wext_set_drop_unencrypted
  2058. State: DISCONNECTED -> ASSOCIATING
  2059. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  2060. WEXT: Operstate: linkmode=-1, operstate=5
  2061. wpa_driver_wext_associate
  2062. wpa_driver_wext_set_psk
  2063. Association request to the driver failed
  2064. Setting authentication timeout: 5 sec 0 usec
  2065. EAPOL: External notification - EAP success=0
  2066. EAPOL: External notification - EAP fail=0
  2067. EAPOL: External notification - portControl=Auto
  2068. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  2069. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  2070. Wireless event: cmd=0x8b06 len=8
  2071. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  2072. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  2073. Wireless event: cmd=0x8b15 len=20
  2074. Wireless event: new AP: 00:00:00:00:00:00
  2075. Added BSSID 1c:af:f7:8d:83:fc into blacklist
  2076. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  2077. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  2078. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  2079. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  2080. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  2081. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  2082. State: ASSOCIATING -> DISCONNECTED
  2083. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  2084. WEXT: Operstate: linkmode=-1, operstate=5
  2085. EAPOL: External notification - portEnabled=0
  2086. EAPOL: External notification - portValid=0
  2087. EAPOL: External notification - EAP success=0
  2088. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  2089. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  2090. Wireless event: cmd=0x8b1a len=20
  2091. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  2092. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan1' added
  2093. Wireless event: cmd=0x8b15 len=20
  2094. Wireless event: new AP: 00:00:00:00:00:00
  2095. Added BSSID 00:00:00:00:00:00 into blacklist
  2096. CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
  2097. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  2098. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  2099. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  2100. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  2101. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  2102. State: DISCONNECTED -> DISCONNECTED
  2103. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  2104. WEXT: Operstate: linkmode=-1, operstate=5
  2105. EAPOL: External notification - portEnabled=0
  2106. EAPOL: External notification - portValid=0
  2107. EAPOL: External notification - EAP success=0
  2108. CTRL-EVENT-TERMINATING - signal 2 received
  2109. Removing interface wlan1
  2110. No keys have been configured - skip key clearing
  2111. State: DISCONNECTED -> DISCONNECTED
  2112. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  2113. WEXT: Operstate: linkmode=-1, operstate=5
  2114. EAPOL: External notification - portEnabled=0
  2115. EAPOL: External notification - portValid=0
  2116. EAPOL: External notification - EAP success=0
  2117. wpa_driver_wext_set_wpa
  2118. wpa_driver_wext_set_drop_unencrypted
  2119. wpa_driver_wext_set_countermeasures
  2120. No keys have been configured - skip key clearing
  2121. Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
  2122. Removed BSSID 1c:af:f7:8d:83:fc from blacklist (clear)
  2123. Cancelling scan request
  2124. Cancelling authentication timeout
  2125. WEXT: Operstate: linkmode=0, operstate=6
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement