This week only. Pastebin PRO Accounts Christmas Special! Don't miss out!Want more features on Pastebin? Sign Up, it's FREE!
Guest

Untitled

By: a guest on Mar 26th, 2013  |  syntax: None  |  size: 48.62 KB  |  views: 1  |  expires: Never
download  |  raw  |  embed  |  report abuse  |  print
Text below is selected. Please press Ctrl+C to copy to your clipboard. (⌘+C on Mac)
  1. wpa_supplicant v2.0
  2. random: Trying to read entropy from /dev/random
  3. Successfully initialized wpa_supplicant
  4. Initializing interface 'wlan0' conf 'wpa_networkers.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
  5. Configuration file 'wpa_networkers.conf' -> '//wpa_networkers.conf'
  6. Reading configuration file '//wpa_networkers.conf'
  7. Line: 2 - start of a new network block
  8. ssid - hexdump_ascii(len=10):
  9.      6e 65 74 77 6f 72 6b 65 72 73                     networkers      
  10. key_mgmt: 0x1
  11. eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00
  12. identity - hexdump_ascii(len=6):
  13.      6a 77 69 64 65 6c                                 jwidel          
  14. password - hexdump_ascii(len=10): [REMOVED]
  15. ca_cert - hexdump_ascii(len=22):
  16.      2f 72 6f 6f 74 63 61 2d 6e 65 74 77 6f 72 6b 65   /rootca-networke
  17.      72 73 2e 70 65 6d                                 rs.pem          
  18. phase1 - hexdump_ascii(len=11):
  19.      70 65 61 70 6c 61 62 65 6c 3d 30                  peaplabel=0    
  20. phase2 - hexdump_ascii(len=13):
  21.      61 75 74 68 3d 4d 53 43 48 41 50 56 32            auth=MSCHAPV2  
  22. priority=10 (0xa)
  23. Priority group 10
  24.    id=0 ssid='networkers'
  25. WEXT: cfg80211-based driver detected
  26. wext: interface wlan0 phy: phy0
  27. rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
  28. SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
  29.   capabilities: key_mgmt 0xf enc 0x1f flags 0x0
  30. netlink: Operstate: linkmode=1, operstate=5
  31. wlan0: Own MAC address: b4:74:9f:de:e4:0e
  32. wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  33. wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  34. wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  35. wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  36. wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
  37. Driver did not support SIOCSIWENCODEEXT
  38. wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
  39. Driver did not support SIOCSIWENCODEEXT
  40. wpa_driver_wext_set_countermeasures
  41. wlan0: RSN: flushing PMKID list in the driver
  42. wlan0: Setting scan request: 0 sec 100000 usec
  43. WPS: Set UUID for interface wlan0
  44. WPS: UUID based on MAC address - hexdump(len=16): 28 36 82 c6 8b 58 5b 88 ab d1 0e 1f eb 32 da 43
  45. EAPOL: SUPP_PAE entering state DISCONNECTED
  46. EAPOL: Supplicant port status: Unauthorized
  47. EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  48. EAPOL: SUPP_BE entering state INITIALIZE
  49. EAP: EAP entering state DISABLED
  50. EAPOL: Supplicant port status: Unauthorized
  51. EAPOL: Supplicant port status: Unauthorized
  52. wlan0: Added interface wlan0
  53. wlan0: State: DISCONNECTED -> DISCONNECTED
  54. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  55. netlink: Operstate: linkmode=-1, operstate=5
  56. random: Got 16/20 bytes from /dev/random
  57. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  58. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  59. WEXT: if_removed already cleared - ignore event
  60. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  61. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  62. WEXT: if_removed already cleared - ignore event
  63. Wireless event: cmd=0x8b06 len=12
  64. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  65. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  66. WEXT: if_removed already cleared - ignore event
  67. Wireless event: cmd=0x8b1a len=16
  68. wlan0: State: DISCONNECTED -> SCANNING
  69. wlan0: Starting AP scan for wildcard SSID
  70. Scan requested (ret=0) - scan timeout 10 seconds
  71. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  72. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  73. WEXT: if_removed already cleared - ignore event
  74. Wireless event: cmd=0x8b19 len=16
  75. wlan0: Event SCAN_RESULTS (3) received
  76. Scan results did not fit - trying larger buffer (8192 bytes)
  77. Scan results did not fit - trying larger buffer (16384 bytes)
  78. Received 13432 bytes of scan results (27 BSSes)
  79. wlan0: BSS: Start scan result update 1
  80. wlan0: BSS: Add new id 0 BSSID 00:18:39:a1:f7:c9 SSID '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'
  81. wlan0: BSS: Add new id 1 BSSID 20:3a:07:97:15:72 SSID 'networkers'
  82. wlan0: BSS: Add new id 2 BSSID 20:3a:07:97:15:70 SSID 'networkers-data'
  83. wlan0: BSS: Add new id 3 BSSID 90:94:e4:35:57:ba SSID 'konarskiego 42'
  84. wlan0: BSS: Add new id 4 BSSID 00:12:2a:98:72:d8 SSID 'NETIASPOT-9872D0'
  85. wlan0: BSS: Add new id 5 BSSID f0:7d:68:8e:10:ce SSID ''
  86. wlan0: BSS: Add new id 6 BSSID 00:19:70:79:97:c8 SSID 'FAST3764-4279'
  87. wlan0: BSS: Add new id 7 BSSID 20:3a:07:97:15:71 SSID '\x00'
  88. wlan0: BSS: Add new id 8 BSSID 00:18:f8:3c:01:18 SSID 'piotrnet'
  89. wlan0: BSS: Add new id 9 BSSID c8:3a:35:27:59:70 SSID 'mani'
  90. wlan0: BSS: Add new id 10 BSSID 54:e6:fc:e8:c6:02 SSID 'Ukasz'
  91. wlan0: BSS: Add new id 11 BSSID 8c:e0:81:6b:de:44 SSID 'Livebox-DE44'
  92. wlan0: BSS: Add new id 12 BSSID 00:22:b0:93:8e:55 SSID 'namukai'
  93. wlan0: BSS: Add new id 13 BSSID d8:5d:4c:fa:2e:79 SSID 'Andriusza'
  94. wlan0: BSS: Add new id 14 BSSID 00:19:5b:b3:22:39 SSID 'MAJEX'
  95. wlan0: BSS: Add new id 15 BSSID 00:1f:33:33:99:48 SSID 'STELLA'
  96. wlan0: BSS: Add new id 16 BSSID 00:25:86:ce:7e:ae SSID 'Bors'
  97. wlan0: BSS: Add new id 17 BSSID 00:24:d1:70:92:b9 SSID 'UPC006086'
  98. wlan0: BSS: Add new id 18 BSSID 00:23:69:ab:ab:54 SSID 'link'
  99. wlan0: BSS: Add new id 19 BSSID c8:7b:5b:b9:3a:7d SSID 'lampart'
  100. wlan0: BSS: Add new id 20 BSSID 90:f6:52:fe:35:46 SSID 'comel427'
  101. wlan0: BSS: Add new id 21 BSSID 2c:e4:12:72:d5:37 SSID 'SAGEM_D536'
  102. wlan0: BSS: Add new id 22 BSSID 00:1c:4a:a5:c8:cb SSID 'Yorki_Nikolki'
  103. wlan0: BSS: Add new id 23 BSSID c8:3a:35:29:4c:68 SSID 'PENTAGRAM'
  104. wlan0: BSS: Add new id 24 BSSID e2:b9:c8:62:78:38 SSID '500_JoikuSpot_943AF04AD3F5'
  105. wlan0: BSS: Add new id 25 BSSID 00:4f:62:1c:40:5d SSID 'airlive'
  106. wlan0: BSS: Add new id 26 BSSID 00:12:2a:98:72:da SSID 'FON_NETIA_FREE_INTERNET'
  107. BSS: last_scan_res_used=27/32 last_scan_full=0
  108. wlan0: New scan results available
  109. WPS: Unknown Vendor Extension (Vendor ID 9442)
  110. WPS: Unknown Vendor Extension (Vendor ID 9442)
  111. WPS: Unknown Vendor Extension (Vendor ID 9442)
  112. WPS: AP 90:94:e4:35:57:ba type 0 added
  113. WPS: AP 00:12:2a:98:72:d8 type 0 added
  114. WPS: AP f0:7d:68:8e:10:ce type 0 added
  115. WPS: AP 00:19:70:79:97:c8 type 0 added
  116. WPS: AP 8c:e0:81:6b:de:44 type 0 added
  117. WPS: Unknown Vendor Extension (Vendor ID 9442)
  118. WPS: AP 90:f6:52:fe:35:46 type 0 added
  119. WPS: AP 2c:e4:12:72:d5:37 type 0 added
  120. WPS: AP[0] 90:94:e4:35:57:ba type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  121. WPS: AP[1] 00:12:2a:98:72:d8 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  122. WPS: AP[2] f0:7d:68:8e:10:ce type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  123. WPS: AP[3] 00:19:70:79:97:c8 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  124. WPS: AP[4] 8c:e0:81:6b:de:44 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  125. WPS: AP[5] 90:f6:52:fe:35:46 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  126. WPS: AP[6] 2c:e4:12:72:d5:37 type=0 tries=0 last_attempt=-1 sec ago blacklist=0
  127. wlan0: Selecting BSS from priority group 10
  128. wlan0: 0: 00:18:39:a1:f7:c9 ssid='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-39
  129. wlan0:    skip - SSID mismatch
  130. wlan0: 1: 20:3a:07:97:15:72 ssid='networkers' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-40
  131. wlan0:    selected based on RSN IE
  132. wlan0:    selected BSS 20:3a:07:97:15:72 ssid='networkers'
  133. wlan0: Request association: reassociate: 0  selected: 20:3a:07:97:15:72  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING
  134. wlan0: Trying to associate with 20:3a:07:97:15:72 (SSID='networkers' freq=2412 MHz)
  135. FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
  136. wlan0: Cancelling scan request
  137. wlan0: WPA: clearing own WPA/RSN IE
  138. wlan0: Automatic auth_alg selection: 0x1
  139. RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
  140. RSN: Search for BSSID 20:3a:07:97:15:72
  141. RSN: No PMKSA cache entry found
  142. wlan0: RSN: using IEEE 802.11i/D9.0
  143. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2
  144. wlan0: WPA: Selected mgmt group cipher 32
  145. wlan0: WPA: clearing AP WPA IE
  146. WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
  147. wlan0: WPA: using GTK CCMP
  148. wlan0: WPA: using PTK CCMP
  149. wlan0: WPA: using KEY_MGMT 802.1X
  150. wlan0: WPA: not using MGMT group cipher
  151. WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  152. wlan0: No keys have been configured - skip key clearing
  153. wlan0: State: SCANNING -> ASSOCIATING
  154. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  155. netlink: Operstate: linkmode=-1, operstate=5
  156. Limit connection to BSSID 20:3a:07:97:15:72 freq=2412 MHz based on scan results (bssid_set=0)
  157. wpa_driver_wext_associate
  158. wpa_driver_wext_set_drop_unencrypted
  159. wpa_driver_wext_set_psk
  160. wlan0: Association request to the driver failed
  161. wlan0: Setting authentication timeout: 5 sec 0 usec
  162. EAPOL: External notification - EAP success=0
  163. EAPOL: Supplicant port status: Unauthorized
  164. EAPOL: External notification - EAP fail=0
  165. EAPOL: Supplicant port status: Unauthorized
  166. EAPOL: External notification - portControl=Auto
  167. EAPOL: Supplicant port status: Unauthorized
  168. RSN: Ignored PMKID candidate without preauth flag
  169. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  170. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  171. WEXT: if_removed already cleared - ignore event
  172. Wireless event: cmd=0x8b1a len=16
  173. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  174. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  175. WEXT: if_removed already cleared - ignore event
  176. Wireless event: cmd=0x8b06 len=12
  177. RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  178. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  179. WEXT: if_removed already cleared - ignore event
  180. Wireless event: cmd=0x8b1a len=26
  181. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  182. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  183. WEXT: if_removed already cleared - ignore event
  184. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  185. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  186. WEXT: if_removed already cleared - ignore event
  187. Wireless event: cmd=0x8c08 len=110
  188. AssocResp IE wireless event - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  189. RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  190. RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
  191. WEXT: if_removed already cleared - ignore event
  192. Wireless event: cmd=0x8b15 len=24
  193. Wireless event: new AP: 20:3a:07:97:15:72
  194. wlan0: Event ASSOCINFO (4) received
  195. wlan0: Association info event
  196. resp_ies - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  197. FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
  198. wlan0: Event ASSOC (0) received
  199. wlan0: State: ASSOCIATING -> ASSOCIATED
  200. wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  201. netlink: Operstate: linkmode=-1, operstate=5
  202. wlan0: Associated to a new BSS: BSSID=20:3a:07:97:15:72
  203. wlan0: No keys have been configured - skip key clearing
  204. wlan0: Associated with 20:3a:07:97:15:72
  205. wlan0: WPA: Association event - clear replay counter
  206. wlan0: WPA: Clear old PTK
  207. EAPOL: External notification - portEnabled=0
  208. EAPOL: Supplicant port status: Unauthorized
  209. EAPOL: External notification - portValid=0
  210. EAPOL: Supplicant port status: Unauthorized
  211. EAPOL: External notification - portEnabled=1
  212. EAPOL: SUPP_PAE entering state CONNECTING
  213. EAPOL: SUPP_BE entering state IDLE
  214. EAP: EAP entering state INITIALIZE
  215. EAP: EAP entering state IDLE
  216. wlan0: Setting authentication timeout: 10 sec 0 usec
  217. wlan0: Cancelling scan request
  218. wlan0: RX EAPOL from 20:3a:07:97:15:72
  219. RX EAPOL - hexdump(len=66): 02 00 00 3e 01 01 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31
  220. wlan0: Setting authentication timeout: 70 sec 0 usec
  221. EAPOL: Received EAP-Packet frame
  222. EAPOL: SUPP_PAE entering state RESTART
  223. EAP: EAP entering state INITIALIZE
  224. EAP: EAP entering state IDLE
  225. EAPOL: SUPP_PAE entering state AUTHENTICATING
  226. EAPOL: SUPP_BE entering state REQUEST
  227. EAPOL: getSuppRsp
  228. EAP: EAP entering state RECEIVED
  229. EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0
  230. EAP: EAP entering state IDENTITY
  231. wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started
  232. EAP: EAP-Request Identity data - hexdump_ascii(len=57):
  233.      00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f   _networkid=netwo
  234.      72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d   rkers,nasid=WLC-
  235.      31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31   1-NET-MGMT-MDF-1
  236.      2c 70 6f 72 74 69 64 3d 31                        ,portid=1      
  237. EAP: using real identity - hexdump_ascii(len=6):
  238.      6a 77 69 64 65 6c                                 jwidel          
  239. EAP: EAP entering state SEND_RESPONSE
  240. EAP: EAP entering state IDLE
  241. EAPOL: SUPP_BE entering state RESPONSE
  242. EAPOL: txSuppRsp
  243. TX EAPOL: dst=20:3a:07:97:15:72
  244. TX EAPOL - hexdump(len=15): 01 00 00 0b 02 01 00 0b 01 6a 77 69 64 65 6c
  245. EAPOL: SUPP_BE entering state RECEIVE
  246. EAPOL: startWhen --> 0
  247. wlan0: RX EAPOL from 20:3a:07:97:15:72
  248. RX EAPOL - hexdump(len=26): 02 00 00 16 01 02 00 16 04 10 af 80 b4 fa f1 1a 7a 23 33 d5 e4 a7 8f 5d a1 ce
  249. EAPOL: Received EAP-Packet frame
  250. EAPOL: SUPP_BE entering state REQUEST
  251. EAPOL: getSuppRsp
  252. EAP: EAP entering state RECEIVED
  253. EAP: Received EAP-Request id=2 method=4 vendor=0 vendorMethod=0
  254. EAP: EAP entering state GET_METHOD
  255. EAP: configuration does not allow: vendor 0 method 4
  256. EAP: vendor 0 method 4 not allowed
  257. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK
  258. EAP: Status notification: refuse proposed method (param=MD5)
  259. EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed)
  260. EAP: allowed methods - hexdump(len=1): 19
  261. EAP: EAP entering state SEND_RESPONSE
  262. EAP: EAP entering state IDLE
  263. EAPOL: SUPP_BE entering state RESPONSE
  264. EAPOL: txSuppRsp
  265. TX EAPOL: dst=20:3a:07:97:15:72
  266. TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 03 19
  267. EAPOL: SUPP_BE entering state RECEIVE
  268. wlan0: RX EAPOL from 20:3a:07:97:15:72
  269. RX EAPOL - hexdump(len=10): 02 00 00 06 01 03 00 06 19 20
  270. EAPOL: Received EAP-Packet frame
  271. EAPOL: SUPP_BE entering state REQUEST
  272. EAPOL: getSuppRsp
  273. EAP: EAP entering state RECEIVED
  274. EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0
  275. EAP: EAP entering state GET_METHOD
  276. wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25
  277. EAP: Status notification: accept proposed method (param=PEAP)
  278. EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP)
  279. TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00
  280. TLS: using phase1 config options
  281. TLS: Trusted root certificate(s) loaded
  282. wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected
  283. EAP: EAP entering state METHOD
  284. SSL: Received packet(len=6) - Flags 0x20
  285. EAP-PEAP: Start (server ver=0, own ver=1)
  286. EAP-PEAP: Using PEAP version 0
  287. SSL: (where=0x10 ret=0x1)
  288. SSL: (where=0x1001 ret=0x1)
  289. SSL: SSL_connect:before/connect initialization
  290. SSL: (where=0x1001 ret=0x1)
  291. SSL: SSL_connect:SSLv3 write client hello A
  292. SSL: (where=0x1002 ret=0xffffffff)
  293. SSL: SSL_connect:error in SSLv3 read server hello A
  294. SSL: SSL_connect - want more data
  295. SSL: 223 bytes pending from ssl_out
  296. SSL: 223 bytes left to be sent out (of total 223 bytes)
  297. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  298. EAP: EAP entering state SEND_RESPONSE
  299. EAP: EAP entering state IDLE
  300. EAPOL: SUPP_BE entering state RESPONSE
  301. EAPOL: txSuppRsp
  302. TX EAPOL: dst=20:3a:07:97:15:72
  303. TX EAPOL - hexdump(len=237): 01 00 00 e9 02 03 00 e9 19 80 00 00 00 df 16 03 01 00 da 01 00 00 d6 03 01 51 50 61 9a 2d c2 b1 33 3f ff 1b 47 c1 f1 f3 a9 72 b8 c7 52 3f 1b 23 69 44 96 b4 8d 74 5a a4 3f 00 00 68 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01
  304. EAPOL: SUPP_BE entering state RECEIVE
  305. wlan0: RX EAPOL from 20:3a:07:97:15:72
  306. RX EAPOL - hexdump(len=1028): 02 00 04 00 01 04 04 00 19 c0 00 00 0f 0c 16 03 01 00 31 02 00 00 2d 03 01 51 50 53 87 d9 2c a1 5e 8d 30 65 1a 72 f8 2b e5 71 b0 3c f3 5e a2 ac a6 5e d5 07 fc ab a4 ad ed 00 00 39 00 00 05 ff 01 00 01 00 16 03 01 0c b6 0b 00 0c b2 00 0c af 00 04 13 30 82 04 0f 30 82 02 f7 a0 03 02 01 02 02 01 0d 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 81 83 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 0f 30 0d 06 03 55 04 07 13 06 4b 72 61 6b 6f 77 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 10 30 0e 06 03 55 04 03 13 07 53 55 42 43 41 2d 31 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 1e 17 0d 31 33 30 32 32 32 32 31 32 36 35 32 5a 17 0d 32 38 30 32 31 39 32 31 32 36 35 32 5a 30 81 94 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 0f 30 0d 06 03 55 04 07 13 06 4b 72 61 6b 6f 77 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 21 30 1f 06 03 55 04 03 13 18 72 61 64 69 75 73 31 2e 6e 65 74 77 6f 72 6b 65 72 73 2e 6c 6f 63 61 6c 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 e0 79 50 d8 dc 34 e3 84 41 fb 6d c2 ad 77 1c 2e 0c 7e 06 fa 57 9c 58 1e 6b d1 84 25 a2 12 de 0d 82 18 af d7 ee 9a f1 16 24 26 25 e0 15 8b 70 24 98 17 93 5b 4e 43 04 ac 1c 91 db 6a bf 82 45 65 d5 53 d4 01 8c 78 27 07 5d 5e 6a 02 8e d9 8c 37 47 2b a4 fc a5 f7 f8 dd 3f 7d 3d bc bd 09 e7 0c 13 1a 62 ca 44 2c 1d 96 6e 84 37 83 98 53 a0 ec dd 7e 7a ef 60 31 21 66 07 03 0c bd 5e d9 c7 78 26 11 3f 2f 9f 94 5e 67 ed 27 78 2a 56 86 dc 4f 38 c8 f1 56 f6 aa 2d f7 05 c4 87 f5 ed 08 b2 73 45 fb 52 c5 d4 bd 53 ed 34 d8 90 ab d1 25 d6 fd 0e 92 68 a8 c5 aa 5f 83 70 bb e8 fb cd cf 96 a6 90 e1 f0 61 23 16 9d 2e 34 ed a5 6b be 8e 0b 92 79 de 5f 5f e7 4d 4e 65 b4 32 c6 61 e0 30 f9 e4 fe 06 28 c3 14 69 11 a2 87 33 7b d1 4f 7f 05 91 79 5b c3 5d 7f 6e e2 52 08 3e 9c 40 6f fc 36 93 02 03 01 00 01 a3 7b 30 79 30 09 06 03 55 1d 13 04 02 30 00 30 2c 06 09 60 86 48 01 86 f8 42 01 0d 04 1f 16 1d 4f 70 65 6e 53 53 4c 20 47 65 6e 65 72 61 74 65 64 20 43 65 72 74 69 66 69 63 61 74 65 30 1d 06 03 55 1d 0e 04 16 04 14 55 33 38 cb 7d 01 e7 6d a7 b6 b9 3f e8 33 05 22 95 2a 9b 6c 30 1f 06 03 55 1d 23 04 18 30 16 80 14 b9 84 49 fd 59 01 03 d3 58 21 84 ad 23 92 07 ad 96 1c 7d f2 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 68 cd 51 3b 47 b3 5f 86 55 b7 9f a3 20 59 2f f5 2c 6d 90 58 2f 9f a2 f4 e5 0b 30 ea 7e 4a ed f1 e5 cc 24 86 d2 b8 f1 12 b0 59 be 5a 38 9f 89 12 17 86 69 aa c5 29 61 21 e9 be 6b ae 9c a4 70 de a2 37 50 c7 e4 68 d3 29 d8 79 79 92 1f f8 e0 31 de c2 5f 33 71 a6 fc fb c0 03 54 e0 a8 72 22 d3 d5 6f f0 91 b0 0f 61 d7 35 ff 71 4b 57 65 cd 13 d9 64 d8 f6 df 1d f7 65 f9 47 c2 16 8f 9f 1d 19 bd 98 1f 30 c3 fd ec a2 3b bc a4 1e b2 a4 4b 4f 3b b3 be 89 80 73 d3 81 ff ff cc d3 90 a1
  307. EAPOL: Received EAP-Packet frame
  308. EAPOL: SUPP_BE entering state REQUEST
  309. EAPOL: getSuppRsp
  310. EAP: EAP entering state RECEIVED
  311. EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0
  312. EAP: EAP entering state METHOD
  313. SSL: Received packet(len=1024) - Flags 0xc0
  314. SSL: TLS Message Length: 3852
  315. SSL: Need 2838 bytes more input data
  316. SSL: Building ACK (type=25 id=4 ver=0)
  317. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  318. EAP: EAP entering state SEND_RESPONSE
  319. EAP: EAP entering state IDLE
  320. EAPOL: SUPP_BE entering state RESPONSE
  321. EAPOL: txSuppRsp
  322. TX EAPOL: dst=20:3a:07:97:15:72
  323. TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00
  324. EAPOL: SUPP_BE entering state RECEIVE
  325. wlan0: RX EAPOL from 20:3a:07:97:15:72
  326. RX EAPOL - hexdump(len=1024): 02 00 03 fc 01 05 03 fc 19 40 81 86 8c 71 0d 01 40 f4 81 e1 4a 8c 19 2d 1d 1c 05 b1 98 5e fa 21 b7 d2 0a dc 65 2c e8 99 5d 53 2d c4 13 b2 ab e3 52 46 aa 1f b9 3f ce f2 c1 95 57 98 de 6c fe 88 63 40 13 5a 34 1b 2f 0e ac ec e7 b2 fa 1f c5 46 cf 30 55 09 18 06 7c 57 55 d0 4e 07 be 0f 25 c3 88 fd 19 4d 80 41 e3 12 56 02 34 1f 00 04 53 30 82 04 4f 30 82 03 37 a0 03 02 01 02 02 09 00 bf 88 d2 f5 9d ba 2b ea 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 71 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 0f 30 0d 06 03 55 04 03 13 06 52 4f 4f 54 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 1e 17 0d 31 33 30 32 30 31 32 30 33 30 34 33 5a 17 0d 33 33 30 31 32 37 32 30 33 30 34 33 5a 30 81 83 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 0f 30 0d 06 03 55 04 07 13 06 4b 72 61 6b 6f 77 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 10 30 0e 06 03 55 04 03 13 07 53 55 42 43 41 2d 31 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 dc 31 39 98 9c a1 6f 4e fb 31 7a ec 6d 0c 59 5d 7b 2c 11 74 76 06 87 d2 60 97 c4 95 35 1b 35 89 61 a9 bb 6f 83 6a 76 dd e6 77 4e 9d 1b b0 b0 c0 e0 f7 0b 66 e3 2d 6d d0 f2 63 60 15 cc f1 8b 7a c6 79 28 9f a9 53 06 5b 63 6d b0 e3 d7 9e 17 a0 f2 dc 55 b5 5f 74 31 4d 4c 91 bc 9f 3c ac 6a 17 37 69 6d 03 43 0c 3c 97 fe c4 c3 70 38 6a b3 7a 95 9e 9a 72 b3 50 58 a7 a8 f6 47 74 8b 67 7f fb d4 82 7c 67 12 73 70 28 d5 ff a6 ed 42 07 e5 8d 2f 1c db de 44 f4 b3 6b ff 36 e7 67 cf 18 08 e6 4e 7a d7 9e 5a f5 0f 0e 05 26 42 76 5f 30 ed 5a 94 5b f3 a9 64 1d a1 e8 7c 8f eb 81 64 38 e1 15 fa 75 0a 94 1a 24 0d 71 d0 d4 8e 67 be e3 84 38 e8 1d 48 7e 85 9e b8 a5 5a bf f2 0d bd 3b fc 08 04 48 4b bd 93 39 27 fc f2 bc 79 bc e2 c8 4c 06 e3 3b d9 72 af 25 ce 3e ef 73 99 6e ba 74 ac 73 02 03 01 00 01 a3 81 d6 30 81 d3 30 1d 06 03 55 1d 0e 04 16 04 14 b9 84 49 fd 59 01 03 d3 58 21 84 ad 23 92 07 ad 96 1c 7d f2 30 81 a3 06 03 55 1d 23 04 81 9b 30 81 98 80 14 4f 92 df d1 91 95 08 b5 81 92 98 c8 d3 81 cd 37 24 41 46 35 a1 75 a4 73 30 71 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 0f 30 0d 06 03 55 04 03 13 06 52 4f 4f 54 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 82 09 00 bf 88 d2 f5 9d ba 2b e9 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 53 2a d6 45 13 bc a6 a7 49 b3 a9 32 65 b3 23 fc 97 48 f3 22 ea c7 03 c7 40 bc 4b 44 86 49 cd 3c da b6 7d 4b a0 fb 0d 87 cc 9e 7c 92 14 0c 6d 47 86 8f 26 8a 0a d5 98 8f 30 1d f6 55 66 75
  327. EAPOL: Received EAP-Packet frame
  328. EAPOL: SUPP_BE entering state REQUEST
  329. EAPOL: getSuppRsp
  330. EAP: EAP entering state RECEIVED
  331. EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0
  332. EAP: EAP entering state METHOD
  333. SSL: Received packet(len=1020) - Flags 0x40
  334. SSL: Need 1824 bytes more input data
  335. SSL: Building ACK (type=25 id=5 ver=0)
  336. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  337. EAP: EAP entering state SEND_RESPONSE
  338. EAP: EAP entering state IDLE
  339. EAPOL: SUPP_BE entering state RESPONSE
  340. EAPOL: txSuppRsp
  341. TX EAPOL: dst=20:3a:07:97:15:72
  342. TX EAPOL - hexdump(len=10): 01 00 00 06 02 05 00 06 19 00
  343. EAPOL: SUPP_BE entering state RECEIVE
  344. wlan0: RX EAPOL from 20:3a:07:97:15:72
  345. RX EAPOL - hexdump(len=1024): 02 00 03 fc 01 06 03 fc 19 40 e8 5a 74 a4 94 66 39 f6 8e bd bd 33 a0 bf 10 c5 29 3c c8 9e 50 f9 32 52 42 8f 19 65 75 cf fc ac a2 58 c7 87 c5 bc 04 71 9f 13 82 d4 13 ae 46 67 b1 34 34 20 91 bb b2 a0 f2 e3 d4 17 b5 6a 7e 5c ff 65 09 c1 4a 4d 4d 2e 06 7a 0b 20 c2 12 67 d9 67 67 de a3 86 c4 f2 36 4e 4a 56 c4 ee e4 b2 06 6b e2 4b 0b 33 35 74 3d 3e 74 dc 86 10 cd 54 71 3a 6b b7 c7 e8 9a 01 70 54 f2 2f de cb 67 c9 be 3a ba 01 cc e0 9f 95 ab 7d d7 0b d2 79 a4 c2 7c 48 54 68 b1 23 17 78 b3 1e 59 e4 78 90 a9 9c 01 5d c8 ea 07 76 43 db b0 66 e1 84 10 9f 55 a8 2b 41 99 ab 7b ca f7 6e 0b bd b0 5b 0f c8 95 4d b9 64 b0 00 04 40 30 82 04 3c 30 82 03 24 a0 03 02 01 02 02 09 00 bf 88 d2 f5 9d ba 2b e9 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 71 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 0f 30 0d 06 03 55 04 03 13 06 52 4f 4f 54 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 1e 17 0d 31 33 30 32 30 31 31 38 35 34 34 39 5a 17 0d 34 33 30 31 32 35 31 38 35 34 34 39 5a 30 71 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 0f 30 0d 06 03 55 04 03 13 06 52 4f 4f 54 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 a9 73 32 65 98 c1 13 31 31 63 37 b7 e1 d0 a5 77 e1 07 28 1e 5c 9b c0 21 29 99 29 49 46 61 83 3c 66 f7 cf e7 88 5c da 07 ee 8d 22 1f 77 7c f0 88 34 9d 75 c3 6f cf 54 72 17 1e 11 41 b7 0f 8e 15 c9 c4 ad 90 b8 e0 e4 2d 6b 9f cf 3c 9f e0 00 20 d1 1c 35 df 08 d3 92 25 15 b6 4c d2 58 36 d2 c0 52 8b 80 1c 5c 11 e7 28 7e e1 31 59 5e 81 a4 d7 80 bc 06 92 9f f4 6e 7c 3d a6 f7 a2 c1 ed 7c c5 91 4e fc 03 da ed b7 da 1c e7 b9 c4 4c bc df 69 c6 08 58 b0 f2 02 36 ee 52 d4 04 79 e2 61 87 3f 9e 31 bb ae 9f d8 b8 69 67 3f c4 58 ac 46 94 6f 99 c0 34 e1 85 90 ca 2e 9d c1 e0 2d 3e b7 65 5e bd 8c 6f 9d af 54 70 e8 4c 1b be e4 5d 51 47 1a 8f c9 0c 78 69 f2 bc f6 77 9d cd 06 a4 4a fd 95 a5 2b 7f 73 e3 1d 7a 94 0c a5 2b 3a 1c 9a 9a a9 ff 1d 31 94 1b a9 f4 e8 63 0d 29 bb 38 43 cc 35 02 03 01 00 01 a3 81 d6 30 81 d3 30 1d 06 03 55 1d 0e 04 16 04 14 4f 92 df d1 91 95 08 b5 81 92 98 c8 d3 81 cd 37 24 41 46 35 30 81 a3 06 03 55 1d 23 04 81 9b 30 81 98 80 14 4f 92 df d1 91 95 08 b5 81 92 98 c8 d3 81 cd 37 24 41 46 35 a1 75 a4 73 30 71 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 0f 30 0d 06 03 55 04 03 13 06 52 4f 4f 54 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 82 09 00 bf 88 d2 f5 9d ba 2b e9 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a
  346. EAPOL: Received EAP-Packet frame
  347. EAPOL: SUPP_BE entering state REQUEST
  348. EAPOL: getSuppRsp
  349. EAP: EAP entering state RECEIVED
  350. EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0
  351. EAP: EAP entering state METHOD
  352. SSL: Received packet(len=1020) - Flags 0x40
  353. SSL: Need 810 bytes more input data
  354. SSL: Building ACK (type=25 id=6 ver=0)
  355. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  356. EAP: EAP entering state SEND_RESPONSE
  357. EAP: EAP entering state IDLE
  358. EAPOL: SUPP_BE entering state RESPONSE
  359. EAPOL: txSuppRsp
  360. TX EAPOL: dst=20:3a:07:97:15:72
  361. TX EAPOL - hexdump(len=10): 01 00 00 06 02 06 00 06 19 00
  362. EAPOL: SUPP_BE entering state RECEIVE
  363. wlan0: RX EAPOL from 20:3a:07:97:15:72
  364. RX EAPOL - hexdump(len=820): 02 00 03 30 01 07 03 30 19 00 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 2b d4 1d a8 76 72 e7 52 60 a7 68 fe 7f d7 f0 58 42 9a 94 d4 5f f8 65 5c 2e d9 c1 ff de 33 30 f3 89 c8 67 55 8e eb e5 94 66 ad df ff 95 ea f0 c5 50 4b 5e d1 94 9a b8 3f f3 68 41 f3 68 b8 b2 37 69 36 90 80 27 e9 90 15 b2 0f 12 89 9b 9f af a7 48 25 7d 7c ad 56 04 cd c3 68 7c 8d b1 7c 66 5b 3e 45 90 b2 c8 76 78 3d 6e 4c fd 77 a1 37 d7 e5 15 60 d4 18 fc 40 40 f0 82 d3 45 0e ca c3 5c 49 d8 20 9d 22 63 ca 48 79 9d ca 26 b7 f1 39 e1 e3 7d 82 64 d0 51 b9 05 96 e4 6a fc 59 5a 10 2c 1b 56 ff c3 7f d1 81 db bf ce fb 0f 71 a4 df 22 84 92 87 62 a0 7a 39 ed 2f 0b 26 6c 8f ad d4 32 c0 93 6b c9 7f df 18 73 52 ff 00 cd 54 84 b9 30 bd 7f 03 51 99 ed d9 a7 d2 e8 65 58 0e 73 1d c9 c8 47 53 4b 85 5a 0e 4d dd e9 7a 79 61 e6 ef bd d3 11 a8 93 54 d9 fb 4c 0a b1 3a 0a 77 0c 0b 49 87 16 03 01 02 0d 0c 00 02 09 00 80 e1 1c b9 f7 d1 bd 7a 76 58 0e 61 57 73 03 a4 eb 32 66 db 69 5b f2 c6 fa e8 37 86 dc b6 b2 c4 0d ca 4c 03 61 78 69 af 20 aa c0 12 71 12 4a c6 86 5d c1 45 80 68 9f a9 79 23 bf 23 d5 5d 70 93 f5 7e ce 9a 65 99 8e dd 35 b9 07 c8 cb 31 27 f0 05 4c 6d cf 90 1e ac 1a 8c f1 4d 85 d4 4b ab f4 1a 8a bf 04 c4 83 93 f7 5b 67 da bf 27 c6 0f 61 f3 c7 bf 97 66 4e 36 c9 3f c1 9a 7f db 9a 86 2b 5b 00 01 02 00 80 a7 ab fd 5d 24 2b eb ec 21 b9 3c 5a 12 0e 0d 09 37 f6 9c d1 0d 3e f9 89 55 d6 da 30 68 ba 64 31 f3 eb 48 c8 8f 45 9c 07 a6 6e 9d 37 d8 cf 62 2a ba 91 86 5b 4d 09 59 15 06 74 63 04 eb dc 82 4c b8 b5 3e 28 24 d3 e7 39 aa d4 a6 b2 02 af d7 1c 64 10 68 51 06 48 35 94 61 54 6d c0 96 d6 5b f0 72 2b 6b ac c9 fc 6b fb 6c 48 46 24 87 2f e5 e2 02 74 55 37 28 a1 41 88 80 c7 cf 26 f6 36 48 79 01 00 8e 2a 6b 83 07 ba 7f 35 74 dd db 20 cd e5 8c eb db 46 13 fa df b6 f3 cb 19 a2 34 27 7b 14 f6 ab 77 fb 7d 53 63 cb 51 77 26 18 d1 ca e8 21 81 c0 be f5 35 1e ae 5d 5c 87 62 e4 95 35 f3 36 73 0c ac 4c 33 7b 58 dd 2a 6c b7 fd 65 09 11 88 99 29 1d 61 4d 25 5b 3f 68 22 d5 31 bd 68 84 06 5f 51 66 5d 3a a3 50 bb 2a 41 6e c5 61 56 95 1c 1e 50 44 e3 07 03 cf b3 d6 e8 bf 2f da f1 99 a2 d0 29 7d 76 eb 13 b4 c1 9c f9 8d 72 2b 71 d4 8c 4e 35 fb 65 6c ea 6b 88 2d 6e f2 d3 e5 49 dc 40 6a 2a 26 62 83 87 8f 31 c6 a4 cd 27 cc 98 b7 fa a9 36 44 72 02 d8 49 f9 19 be d1 86 5f 8a 30 9d d8 b9 31 6f f9 51 e1 cf 7b 20 2b b9 00 dd 5d d5 93 c0 b7 93 6e 1c 95 ac 27 5e 05 ba b8 a9 9e 63 8f 33 e7 70 6f a0 11 30 94 57 a2 41 9a 65 ea 33 8e 4c b0 ec 02 fd 97 f9 c2 fe 15 c5 ea 23 db 1d 1c 3f 16 03 01 00 04 0e 00 00 00
  365. EAPOL: Received EAP-Packet frame
  366. EAPOL: SUPP_BE entering state REQUEST
  367. EAPOL: getSuppRsp
  368. EAP: EAP entering state RECEIVED
  369. EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0
  370. EAP: EAP entering state METHOD
  371. SSL: Received packet(len=816) - Flags 0x00
  372. SSL: (where=0x1001 ret=0x1)
  373. SSL: SSL_connect:SSLv3 read server hello A
  374. TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=2 buf='/C=PL/ST=Malopolskie/O=networkers.pl/CN=ROOTCA/emailAddress=nadmin@networkers.pl'
  375. wlan0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=PL/ST=Malopolskie/O=networkers.pl/CN=ROOTCA/emailAddress=nadmin@networkers.pl'
  376. EAP: Status notification: remote certificate verification (param=success)
  377. TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=1 buf='/C=PL/ST=Malopolskie/L=Krakow/O=networkers.pl/CN=SUBCA-1/emailAddress=nadmin@networkers.pl'
  378. wlan0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=PL/ST=Malopolskie/L=Krakow/O=networkers.pl/CN=SUBCA-1/emailAddress=nadmin@networkers.pl'
  379. EAP: Status notification: remote certificate verification (param=success)
  380. TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=0 buf='/C=PL/ST=Malopolskie/L=Krakow/O=networkers.pl/CN=radius1.networkers.local/emailAddress=nadmin@networkers.pl'
  381. wlan0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=PL/ST=Malopolskie/L=Krakow/O=networkers.pl/CN=radius1.networkers.local/emailAddress=nadmin@networkers.pl'
  382. EAP: Status notification: remote certificate verification (param=success)
  383. SSL: (where=0x1001 ret=0x1)
  384. SSL: SSL_connect:SSLv3 read server certificate A
  385. SSL: (where=0x1001 ret=0x1)
  386. SSL: SSL_connect:SSLv3 read server key exchange A
  387. SSL: (where=0x1001 ret=0x1)
  388. SSL: SSL_connect:SSLv3 read server done A
  389. SSL: (where=0x1001 ret=0x1)
  390. SSL: SSL_connect:SSLv3 write client key exchange A
  391. SSL: (where=0x1001 ret=0x1)
  392. SSL: SSL_connect:SSLv3 write change cipher spec A
  393. SSL: (where=0x1001 ret=0x1)
  394. SSL: SSL_connect:SSLv3 write finished A
  395. SSL: (where=0x1001 ret=0x1)
  396. SSL: SSL_connect:SSLv3 flush data
  397. SSL: (where=0x1002 ret=0xffffffff)
  398. SSL: SSL_connect:error in SSLv3 read finished A
  399. SSL: SSL_connect - want more data
  400. SSL: 198 bytes pending from ssl_out
  401. SSL: 198 bytes left to be sent out (of total 198 bytes)
  402. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  403. EAP: EAP entering state SEND_RESPONSE
  404. EAP: EAP entering state IDLE
  405. EAPOL: SUPP_BE entering state RESPONSE
  406. EAPOL: txSuppRsp
  407. TX EAPOL: dst=20:3a:07:97:15:72
  408. TX EAPOL - hexdump(len=212): 01 00 00 d0 02 07 00 d0 19 80 00 00 00 c6 16 03 01 00 86 10 00 00 82 00 80 59 e5 57 fb 0b 80 da ed 7a c1 37 a1 e9 50 a1 a0 4c 8c 9a fe 22 03 6a 33 f1 dc 1b 78 64 a8 0e b9 0a d0 07 6b 7d 9a f5 d3 22 10 08 8c 53 be 0a 8d f7 ed 95 10 6c 91 0a f4 95 fa 30 8b 93 ac bb 8c 5d ea 34 c3 5e 87 3a 7d 2f e8 0e 11 97 6f 08 a9 27 a5 01 5a 9e a1 f7 c9 0d 7b 09 38 c8 ba 09 34 b5 cf 56 07 e3 46 54 5f 6a e1 0f 0a ef 9a 18 5c 56 2c e7 6d 1e a0 e0 0d f7 df 15 bc 7d c6 11 1c 14 03 01 00 01 01 16 03 01 00 30 78 fc 4f 40 93 6c c0 3d 16 65 e4 0b e1 9f 48 26 4d 91 7d 97 df 39 d0 76 46 c4 52 85 b0 87 c8 c2 e3 01 56 ef 7f a2 1b 76 0e 3b 0f ab 65 1f a0 85
  409. EAPOL: SUPP_BE entering state RECEIVE
  410. wlan0: RX EAPOL from 20:3a:07:97:15:72
  411. RX EAPOL - hexdump(len=69): 02 00 00 41 01 08 00 41 19 00 14 03 01 00 01 01 16 03 01 00 30 d1 f1 91 d0 5d 09 f3 99 75 0a e7 2b cb ef b2 b5 fc 7b 3f e3 5c 03 c9 53 cb 40 34 8a 82 a5 d0 c8 77 1f 08 16 da bb e7 4d 30 c6 a8 ed f5 36 d3 0b
  412. EAPOL: Received EAP-Packet frame
  413. EAPOL: SUPP_BE entering state REQUEST
  414. EAPOL: getSuppRsp
  415. EAP: EAP entering state RECEIVED
  416. EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0
  417. EAP: EAP entering state METHOD
  418. SSL: Received packet(len=65) - Flags 0x00
  419. SSL: (where=0x1001 ret=0x1)
  420. SSL: SSL_connect:SSLv3 read finished A
  421. SSL: (where=0x20 ret=0x1)
  422. SSL: (where=0x1002 ret=0x1)
  423. SSL: 0 bytes pending from ssl_out
  424. SSL: No Application Data included
  425. SSL: No data to be sent out
  426. EAP-PEAP: TLS done, proceed to Phase 2
  427. EAP-PEAP: using label 'client EAP encryption' in key derivation
  428. EAP-PEAP: Derived key - hexdump(len=64): [REMOVED]
  429. SSL: Building ACK (type=25 id=8 ver=0)
  430. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  431. EAP: EAP entering state SEND_RESPONSE
  432. EAP: EAP entering state IDLE
  433. EAPOL: SUPP_BE entering state RESPONSE
  434. EAPOL: txSuppRsp
  435. TX EAPOL: dst=20:3a:07:97:15:72
  436. TX EAPOL - hexdump(len=10): 01 00 00 06 02 08 00 06 19 00
  437. EAPOL: SUPP_BE entering state RECEIVE
  438. wlan0: RX EAPOL from 20:3a:07:97:15:72
  439. RX EAPOL - hexdump(len=47): 02 00 00 2b 01 09 00 2b 19 00 17 03 01 00 20 dd 45 11 89 3d 40 4a e3 ad 1a 27 10 09 3a 3b 98 fc cf f9 31 cd ca 0e 90 c0 f7 60 9d 0e e3 26 d2
  440. EAPOL: Received EAP-Packet frame
  441. EAPOL: SUPP_BE entering state REQUEST
  442. EAPOL: getSuppRsp
  443. EAP: EAP entering state RECEIVED
  444. EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0
  445. EAP: EAP entering state METHOD
  446. SSL: Received packet(len=43) - Flags 0x00
  447. EAP-PEAP: received 37 bytes encrypted data for Phase 2
  448. EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 09 00 05 01
  449. EAP-PEAP: received Phase 2: code=1 identifier=9 length=5
  450. EAP-PEAP: Phase 2 Request: type=1
  451. EAP: using real identity - hexdump_ascii(len=6):
  452.      6a 77 69 64 65 6c                                 jwidel          
  453. EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED]
  454. SSL: 74 bytes left to be sent out (of total 74 bytes)
  455. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  456. EAP: EAP entering state SEND_RESPONSE
  457. EAP: EAP entering state IDLE
  458. EAPOL: SUPP_BE entering state RESPONSE
  459. EAPOL: txSuppRsp
  460. TX EAPOL: dst=20:3a:07:97:15:72
  461. TX EAPOL - hexdump(len=84): 01 00 00 50 02 09 00 50 19 00 17 03 01 00 20 67 9f 75 bc f9 0c a0 1c 53 5d 72 26 fb db 83 91 57 c7 4e 7d d2 3c 60 27 1e 0c df dd 56 e7 e2 15 17 03 01 00 20 37 3a f2 1d 1d 9d cf e2 70 a7 8b 69 da d1 43 41 12 2c 36 c0 e1 fe ae 03 e8 d7 6d e9 fe 48 f1 a5
  462. EAPOL: SUPP_BE entering state RECEIVE
  463. wlan0: RX EAPOL from 20:3a:07:97:15:72
  464. RX EAPOL - hexdump(len=79): 02 00 00 4b 01 0a 00 4b 19 00 17 03 01 00 40 12 7f 25 09 c4 66 cd ca 77 bd 99 79 3f 70 99 1c dd 6c 2b 45 9c d6 ec 9d c1 96 d8 1b db a6 2e d5 02 d5 38 cb ac 05 cc 26 d2 fc 86 45 cb 3d d6 04 57 f4 02 03 d0 d3 6d 45 11 c4 cc 51 3e 6c d7 34
  465. EAPOL: Received EAP-Packet frame
  466. EAPOL: SUPP_BE entering state REQUEST
  467. EAPOL: getSuppRsp
  468. EAP: EAP entering state RECEIVED
  469. EAP: Received EAP-Request id=10 method=25 vendor=0 vendorMethod=0
  470. EAP: EAP entering state METHOD
  471. SSL: Received packet(len=75) - Flags 0x00
  472. EAP-PEAP: received 69 bytes encrypted data for Phase 2
  473. EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=28): 1a 01 0a 00 1b 10 d8 ef fe ff da e5 04 fc c1 4c 2c 75 da 5e 95 7e 6a 77 69 64 65 6c
  474. EAP-PEAP: received Phase 2: code=1 identifier=10 length=32
  475. EAP-PEAP: Phase 2 Request: type=26
  476. EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26
  477. EAP-MSCHAPV2: RX identifier 10 mschapv2_id 10
  478. EAP-MSCHAPV2: Received challenge
  479. EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=6):
  480.      6a 77 69 64 65 6c                                 jwidel          
  481. EAP-MSCHAPV2: Generating Challenge Response
  482. Get randomness: len=16 entropy=11
  483. MSCHAPV2: Identity - hexdump_ascii(len=6):
  484.      6a 77 69 64 65 6c                                 jwidel          
  485. MSCHAPV2: Username - hexdump_ascii(len=6):
  486.      6a 77 69 64 65 6c                                 jwidel          
  487. MSCHAPV2: auth_challenge - hexdump(len=16): d8 ef fe ff da e5 04 fc c1 4c 2c 75 da 5e 95 7e
  488. MSCHAPV2: peer_challenge - hexdump(len=16): e7 31 b5 df 12 b5 05 14 9f 2a 20 23 2b 15 a7 8d
  489. MSCHAPV2: username - hexdump_ascii(len=6):
  490.      6a 77 69 64 65 6c                                 jwidel          
  491. MSCHAPV2: password - hexdump_ascii(len=10): [REMOVED]
  492. MSCHAPV2: NT Response - hexdump(len=24): 4c 94 19 f2 c6 c4 b3 f8 8c 31 f5 19 4b 42 c9 96 f4 91 fb 0f 35 b2 97 89
  493. MSCHAPV2: Auth Response - hexdump(len=20): 74 40 31 77 01 0b c9 ba e2 13 da ca 68 15 2f 9b 79 63 a0 e8
  494. MSCHAPV2: Master Key - hexdump(len=16): [REMOVED]
  495. EAP-MSCHAPV2: TX identifier 10 mschapv2_id 10 (response)
  496. EAP-PEAP: Encrypting Phase 2 data - hexdump(len=65): [REMOVED]
  497. SSL: 138 bytes left to be sent out (of total 138 bytes)
  498. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  499. EAP: EAP entering state SEND_RESPONSE
  500. EAP: EAP entering state IDLE
  501. EAPOL: SUPP_BE entering state RESPONSE
  502. EAPOL: txSuppRsp
  503. TX EAPOL: dst=20:3a:07:97:15:72
  504. TX EAPOL - hexdump(len=148): 01 00 00 90 02 0a 00 90 19 00 17 03 01 00 20 f9 3a 51 6b 72 60 ba 41 15 fb 36 21 22 da 36 4a 65 54 c2 5d ea 8a 6b b0 57 e3 fb 74 11 07 9e f5 17 03 01 00 60 38 11 42 3d 07 02 23 d7 0a 1d 8f cd 18 c9 93 35 6b 00 2e 6f 44 49 62 ea d0 09 cd d7 47 53 42 85 17 54 74 85 c9 9e b1 19 11 a0 81 f8 2f ea 16 c6 68 0b 7d 55 53 02 68 3f 7e a1 7c cf ca 2a 58 08 9c 22 82 12 4a fa 50 7b d4 e0 77 0e 18 18 ba 34 49 ab 04 d9 4d b3 44 bf 31 c0 1a fa 66 c9 de 01
  505. EAPOL: SUPP_BE entering state RECEIVE
  506. wlan0: RX EAPOL from 20:3a:07:97:15:72
  507. RX EAPOL - hexdump(len=95): 02 00 00 5b 01 0b 00 5b 19 00 17 03 01 00 50 b7 9c 2f c7 1c 27 61 3c 76 ef 21 93 ae 8f ca ef 2a 4c 27 39 d0 06 96 16 c3 8e 68 da bd be 54 04 03 52 7b 6d 63 77 fc 09 5b 37 47 f1 96 a1 2e 2f 4f db 56 7d b7 24 62 a8 8b 34 33 91 f8 d0 f6 5e ae a7 39 b9 62 1d 72 6c f6 b1 23 ea f3 68 4c d4
  508. EAPOL: Received EAP-Packet frame
  509. EAPOL: SUPP_BE entering state REQUEST
  510. EAPOL: getSuppRsp
  511. EAP: EAP entering state RECEIVED
  512. EAP: Received EAP-Request id=11 method=25 vendor=0 vendorMethod=0
  513. EAP: EAP entering state METHOD
  514. SSL: Received packet(len=91) - Flags 0x00
  515. EAP-PEAP: received 85 bytes encrypted data for Phase 2
  516. EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 0a 00 2e 53 3d 37 34 34 30 33 31 37 37 30 31 30 42 43 39 42 41 45 32 31 33 44 41 43 41 36 38 31 35 32 46 39 42 37 39 36 33 41 30 45 38
  517. EAP-PEAP: received Phase 2: code=1 identifier=11 length=51
  518. EAP-PEAP: Phase 2 Request: type=26
  519. EAP-MSCHAPV2: RX identifier 11 mschapv2_id 10
  520. EAP-MSCHAPV2: Received success
  521. EAP-MSCHAPV2: Success message - hexdump_ascii(len=0):
  522. EAP-MSCHAPV2: Authentication succeeded
  523. EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED]
  524. SSL: 74 bytes left to be sent out (of total 74 bytes)
  525. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
  526. EAP: EAP entering state SEND_RESPONSE
  527. EAP: EAP entering state IDLE
  528. EAPOL: SUPP_BE entering state RESPONSE
  529. EAPOL: txSuppRsp
  530. TX EAPOL: dst=20:3a:07:97:15:72
  531. TX EAPOL - hexdump(len=84): 01 00 00 50 02 0b 00 50 19 00 17 03 01 00 20 58 41 f4 d7 26 d7 bb a4 3a 02 8b 0d 20 b4 6f e9 e3 2f a1 e3 e0 25 c8 13 33 05 ad db 86 5a f7 3c 17 03 01 00 20 97 ba b8 6f 2c 9c ed 79 45 2a 56 fd be 0d c3 c3 f5 dd 4e a8 b6 f6 df e5 f8 b5 03 08 d3 5e 5f b6
  532. EAPOL: SUPP_BE entering state RECEIVE
  533. wlan0: RX EAPOL from 20:3a:07:97:15:72
  534. RX EAPOL - hexdump(len=47): 02 00 00 2b 01 0c 00 2b 19 00 17 03 01 00 20 3a f7 27 b4 14 71 83 97 a2 5c d1 ac 3a e7 13 3f b8 1d 1b 11 57 dc a6 a2 89 21 ff 93 92 fa 43 4f
  535. EAPOL: Received EAP-Packet frame
  536. EAPOL: SUPP_BE entering state REQUEST
  537. EAPOL: getSuppRsp
  538. EAP: EAP entering state RECEIVED
  539. EAP: Received EAP-Request id=12 method=25 vendor=0 vendorMethod=0
  540. EAP: EAP entering state METHOD
  541. SSL: Received packet(len=43) - Flags 0x00
  542. EAP-PEAP: received 37 bytes encrypted data for Phase 2
  543. EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 0c 00 0b 21 80 03 00 02 00 01
  544. EAP-PEAP: received Phase 2: code=1 identifier=12 length=11
  545. EAP-PEAP: Phase 2 Request: type=33
  546. EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01
  547. EAP-TLV: Result TLV - hexdump(len=2): 00 01
  548. EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed
  549. EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED]
  550. SSL: 74 bytes left to be sent out (of total 74 bytes)
  551. EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC
  552. EAP: EAP entering state SEND_RESPONSE
  553. EAP: EAP entering state IDLE
  554. EAPOL: SUPP_BE entering state RESPONSE
  555. EAPOL: txSuppRsp
  556. TX EAPOL: dst=20:3a:07:97:15:72
  557. TX EAPOL - hexdump(len=84): 01 00 00 50 02 0c 00 50 19 00 17 03 01 00 20 68 d1 15 6b f3 a8 1f 8c a3 af 9b 1d db 9b 11 0f d4 d3 7e 2a 62 83 eb 06 a3 4b 1b ef 5d c2 50 46 17 03 01 00 20 fc 4d 71 b5 46 8d 23 00 c7 b2 0a d2 11 f1 9f cc cd 40 22 97 8a 63 fd 3e 4c 01 3b c1 9f 41 c8 1a
  558. EAPOL: SUPP_BE entering state RECEIVE
  559. wlan0: RX EAPOL from 20:3a:07:97:15:72
  560. RX EAPOL - hexdump(len=8): 02 00 00 04 03 0c 00 04
  561. EAPOL: Received EAP-Packet frame
  562. EAPOL: SUPP_BE entering state REQUEST
  563. EAPOL: getSuppRsp
  564. EAP: EAP entering state RECEIVED
  565. EAP: Received EAP-Success
  566. EAP: Status notification: completion (param=success)
  567. EAP: EAP entering state SUCCESS
  568. wlan0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
  569. EAPOL: SUPP_BE entering state RECEIVE
  570. EAPOL: SUPP_BE entering state SUCCESS
  571. EAPOL: SUPP_BE entering state IDLE
  572. wlan0: RX EAPOL from 20:3a:07:97:15:72
  573. RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 59 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 bd 04 10 d1 9a aa 7b 3f e2 91 e2 1a ac 15 2b 04
  574. EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
  575. wlan0: IEEE 802.1X RX: version=2 type=3 length=117
  576. wlan0:   EAPOL-Key type=2
  577. wlan0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  578. wlan0:   key_length=16 key_data_length=22
  579.   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  580.   key_nonce - hexdump(len=32): c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 59 2d
  581.   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  582.   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  583.   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  584.   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  585. WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 59 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 bd 04 10 d1 9a aa 7b 3f e2 91 e2 1a ac 15 2b 04
  586. wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE
  587. wlan0: WPA: RX message 1 of 4-Way Handshake from 20:3a:07:97:15:72 (ver=2)
  588. RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 bd 04 10 d1 9a aa 7b 3f e2 91 e2 1a ac 15 2b 04
  589. WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 bd 04 10 d1 9a aa 7b 3f e2 91 e2 1a ac 15 2b 04
  590. RSN: PMKID from Authenticator - hexdump(len=16): bd 04 10 d1 9a aa 7b 3f e2 91 e2 1a ac 15 2b 04
  591. wlan0: RSN: no matching PMKID found
  592. EAPOL: Successfully fetched key (len=32)
  593. EAPOL: Successfully fetched key (len=64)
  594. WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED]
  595. RSN: Added PMKSA cache entry for 20:3a:07:97:15:72 network_ctx=0x2273620
  596. wlan0: RSN: the new PMK matches with the PMKID
  597. Get randomness: len=32 entropy=0
  598. WPA: Renewed SNonce - hexdump(len=32): d5 de db c9 73 b8 f5 de cf dd 2c bd 44 cc 37 10 c2 7b c2 a1 44 8c d6 cb 8d ff 65 19 dc 9b 29 b4
  599. WPA: PTK derivation - A1=b4:74:9f:de:e4:0e A2=20:3a:07:97:15:72
  600. WPA: Nonce1 - hexdump(len=32): d5 de db c9 73 b8 f5 de cf dd 2c bd 44 cc 37 10 c2 7b c2 a1 44 8c d6 cb 8d ff 65 19 dc 9b 29 b4
  601. WPA: Nonce2 - hexdump(len=32): c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 59 2d
  602. WPA: PMK - hexdump(len=32): [REMOVED]
  603. WPA: PTK - hexdump(len=48): [REMOVED]
  604. WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  605. WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  606. wlan0: WPA: Sending EAPOL-Key 2/4
  607. WPA: KCK - hexdump(len=16): [REMOVED]
  608. WPA: Derived Key MIC - hexdump(len=16): 88 bd 5c 78 00 74 72 ed af 66 46 a1 1d 9d 7f 26
  609. WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 d5 de db c9 73 b8 f5 de cf dd 2c bd 44 cc 37 10 c2 7b c2 a1 44 8c d6 cb 8d ff 65 19 dc 9b 29 b4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 88 bd 5c 78 00 74 72 ed af 66 46 a1 1d 9d 7f 26 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
  610. wlan0: RX EAPOL from 20:3a:07:97:15:72
  611. RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 59 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09 ca f2 f1 32 03 bc d7 91 a6 13 34 96 c4 5c 62 00 38 5f b0 3c e2 34 0a da 9f 0d e7 80 76 1d 7c a3 00 02 d5 24 da 9d 83 4a 37 6e 09 d7 90 61 19 e3 67 b4 91 ff 71 e0 7a 2e 4b a3 af 23 c4 5d 8d fb 07 da dc 27 54 1d 0c 49 29
  612. EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
  613. wlan0: IEEE 802.1X RX: version=2 type=3 length=151
  614. wlan0:   EAPOL-Key type=2
  615. wlan0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  616. wlan0:   key_length=16 key_data_length=56
  617.   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  618.   key_nonce - hexdump(len=32): c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 59 2d
  619.   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  620.   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  621.   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  622.   key_mic - hexdump(len=16): 09 ca f2 f1 32 03 bc d7 91 a6 13 34 96 c4 5c 62
  623. WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 59 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09 ca f2 f1 32 03 bc d7 91 a6 13 34 96 c4 5c 62 00 38 5f b0 3c e2 34 0a da 9f 0d e7 80 76 1d 7c a3 00 02 d5 24 da 9d 83 4a 37 6e 09 d7 90 61 19 e3 67 b4 91 ff 71 e0 7a 2e 4b a3 af 23 c4 5d 8d fb 07 da dc 27 54 1d 0c 49 29
  624. RSN: encrypted key data - hexdump(len=56): 5f b0 3c e2 34 0a da 9f 0d e7 80 76 1d 7c a3 00 02 d5 24 da 9d 83 4a 37 6e 09 d7 90 61 19 e3 67 b4 91 ff 71 e0 7a 2e 4b a3 af 23 c4 5d 8d fb 07 da dc 27 54 1d 0c 49 29
  625. WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
  626. wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  627. wlan0: WPA: RX message 3 of 4-Way Handshake from 20:3a:07:97:15:72 (ver=2)
  628. WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 dd 16 00 0f ac 01 01 00 97 7f e1 1c 22 fb cc a1 61 bc 6b 7c a9 5e dc d9 dd 00
  629. WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00
  630. WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
  631. wlan0: WPA:
clone this paste RAW Paste Data